Lucene search

K
FedoraprojectFedora

5312 matches found

CVE
CVE
added 2021/05/13 5:15 p.m.156 views

CVE-2021-29623

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A read of uninitialized memory was found in Exiv2 versions v0.27.3 and earlier. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying t...

4.3CVSS5AI score0.00633EPSS
CVE
CVE
added 2021/11/29 4:15 p.m.156 views

CVE-2021-3802

A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.

6.3CVSS3.7AI score0.00035EPSS
CVE
CVE
added 2021/11/15 9:15 p.m.156 views

CVE-2021-42374

An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that

5.3CVSS5.9AI score0.00071EPSS
CVE
CVE
added 2021/11/15 9:15 p.m.156 views

CVE-2021-42382

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function

7.2CVSS7.5AI score0.00197EPSS
CVE
CVE
added 2022/09/26 4:15 p.m.156 views

CVE-2022-2861

Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.101 allowed an attacker who convinced a user to install a malicious extension to inject arbitrary scripts into WebUI via a crafted HTML page.

6.5CVSS6.5AI score0.00425EPSS
CVE
CVE
added 2024/02/06 6:15 p.m.156 views

CVE-2024-1048

A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be...

3.3CVSS4.2AI score0.00038EPSS
CVE
CVE
added 2024/02/07 12:15 a.m.156 views

CVE-2024-1284

Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

9.8CVSS9.4AI score0.01508EPSS
CVE
CVE
added 2019/04/18 6:29 p.m.155 views

CVE-2018-16877

A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.

8.8CVSS7.4AI score0.00056EPSS
CVE
CVE
added 2019/12/11 6:16 p.m.155 views

CVE-2019-19578

An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at itself, or to anothe...

8.8CVSS7.5AI score0.00675EPSS
CVE
CVE
added 2020/06/08 5:15 p.m.155 views

CVE-2020-13696

An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to ...

4.4CVSS4.4AI score0.00053EPSS
CVE
CVE
added 2020/10/22 9:15 p.m.155 views

CVE-2020-27670

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.

7.8CVSS7.5AI score0.00044EPSS
CVE
CVE
added 2021/07/21 3:15 p.m.155 views

CVE-2021-2342

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL S...

4.9CVSS4.9AI score0.0044EPSS
CVE
CVE
added 2024/01/08 7:15 p.m.155 views

CVE-2021-3600

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

7.8CVSS7.5AI score0.00164EPSS
CVE
CVE
added 2021/11/15 9:15 p.m.155 views

CVE-2021-42377

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

9.8CVSS9.5AI score0.01858EPSS
CVE
CVE
added 2022/06/23 5:15 p.m.155 views

CVE-2022-33068

An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

5.5CVSS5.4AI score0.00074EPSS
CVE
CVE
added 2022/07/05 1:15 p.m.155 views

CVE-2022-33741

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-3...

7.1CVSS7.2AI score0.00045EPSS
CVE
CVE
added 2023/06/13 6:15 p.m.155 views

CVE-2023-3215

Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

8.8CVSS8.8AI score0.15777EPSS
CVE
CVE
added 2018/12/13 9:29 p.m.154 views

CVE-2018-16872

A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, ...

5.3CVSS5.8AI score0.0027EPSS
CVE
CVE
added 2019/10/31 2:15 p.m.154 views

CVE-2019-18424

An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to a...

6.9CVSS8AI score0.00118EPSS
CVE
CVE
added 2019/12/11 6:16 p.m.154 views

CVE-2019-19580

An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type cha...

6.6CVSS8.1AI score0.0196EPSS
CVE
CVE
added 2021/07/21 3:15 p.m.154 views

CVE-2021-2367

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful att...

4.9CVSS4.7AI score0.0044EPSS
CVE
CVE
added 2021/03/15 6:15 p.m.154 views

CVE-2021-28363

The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for ...

6.5CVSS6.4AI score0.00107EPSS
CVE
CVE
added 2021/10/08 9:15 p.m.154 views

CVE-2021-30626

Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8CVSS8.7AI score0.00754EPSS
CVE
CVE
added 2021/08/09 6:15 p.m.154 views

CVE-2021-32815

Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial ...

5.5CVSS5.4AI score0.00153EPSS
CVE
CVE
added 2023/03/27 9:15 p.m.154 views

CVE-2021-3923

A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be ...

2.3CVSS4.6AI score0.00012EPSS
CVE
CVE
added 2021/09/07 3:15 p.m.154 views

CVE-2021-39254

A crafted NTFS image can cause an integer overflow in memmove, leading to a heap-based buffer overflow in the function ntfs_attr_record_resize, in NTFS-3G

7.8CVSS7.6AI score0.00018EPSS
CVE
CVE
added 2022/03/03 11:15 p.m.154 views

CVE-2022-0730

Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.

9.8CVSS9.4AI score0.00329EPSS
CVE
CVE
added 2022/01/14 5:15 p.m.154 views

CVE-2022-21681

Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression inline.reflinkSearch may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a...

7.5CVSS7.2AI score0.00483EPSS
CVE
CVE
added 2022/06/27 12:15 p.m.154 views

CVE-2022-2207

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.

7.8CVSS7.8AI score0.00114EPSS
CVE
CVE
added 2022/07/08 10:15 p.m.154 views

CVE-2022-2345

Use After Free in GitHub repository vim/vim prior to 9.0.0046.

7.8CVSS7.8AI score0.00036EPSS
CVE
CVE
added 2022/02/04 11:15 p.m.154 views

CVE-2022-23614

Twig is an open source template language for PHP. When in a sandbox mode, the arrow parameter of the sort filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitra...

9.8CVSS9.4AI score0.43119EPSS
CVE
CVE
added 2022/08/12 8:15 p.m.154 views

CVE-2022-2617

Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.

8.8CVSS8.9AI score0.00201EPSS
CVE
CVE
added 2022/09/09 3:15 p.m.154 views

CVE-2022-3169

A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.

5.5CVSS6.1AI score0.00022EPSS
CVE
CVE
added 2022/10/31 6:15 a.m.154 views

CVE-2022-40617

strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example)...

7.5CVSS7.1AI score0.00199EPSS
CVE
CVE
added 2023/02/28 6:15 p.m.154 views

CVE-2023-27320

Sudo before 1.9.13p2 has a double free in the per-command chroot feature.

7.2CVSS6.9AI score0.0017EPSS
CVE
CVE
added 2010/11/29 4:0 p.m.153 views

CVE-2010-4249

The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system...

4.9CVSS6.8AI score0.001EPSS
CVE
CVE
added 2019/08/18 7:15 p.m.153 views

CVE-2019-15143

In DjVuLibre 3.5.27, the bitmap reader component allows attackers to cause a denial-of-service error (resource exhaustion caused by a GBitmap::read_rle_raw infinite loop) by crafting a corrupted image file, related to libdjvu/DjVmDir.cpp and libdjvu/GBitmap.cpp.

5.5CVSS5.3AI score0.00053EPSS
CVE
CVE
added 2019/11/18 6:15 a.m.153 views

CVE-2019-19050

A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.

7.8CVSS7.5AI score0.00909EPSS
CVE
CVE
added 2019/12/09 1:15 a.m.153 views

CVE-2019-19647

radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.

7.8CVSS8AI score0.0049EPSS
CVE
CVE
added 2019/02/19 2:29 p.m.153 views

CVE-2019-3812

QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.

5.5CVSS5.4AI score0.00078EPSS
CVE
CVE
added 2020/04/14 1:15 p.m.153 views

CVE-2020-11743

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to retur...

5.5CVSS6.5AI score0.00032EPSS
CVE
CVE
added 2020/07/07 1:15 p.m.153 views

CVE-2020-15563

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM ...

6.5CVSS7.2AI score0.00036EPSS
CVE
CVE
added 2020/09/23 10:15 p.m.153 views

CVE-2020-25602

An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_E...

6CVSS6.3AI score0.00027EPSS
CVE
CVE
added 2020/12/15 5:15 p.m.153 views

CVE-2020-29570

An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can...

6.2CVSS7AI score0.0006EPSS
CVE
CVE
added 2021/03/03 4:15 p.m.153 views

CVE-2021-26813

markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.

7.5CVSS7.2AI score0.00478EPSS
CVE
CVE
added 2022/01/10 4:15 p.m.153 views

CVE-2022-0156

vim is vulnerable to Use After Free

6.8CVSS6.3AI score0.00123EPSS
CVE
CVE
added 2022/07/19 10:15 p.m.153 views

CVE-2022-21515

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Ser...

4.9CVSS4.9AI score0.00152EPSS
CVE
CVE
added 2023/08/29 4:15 a.m.153 views

CVE-2023-41360

An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.

9.1CVSS8.8AI score0.00244EPSS
CVE
CVE
added 2024/01/04 2:15 a.m.153 views

CVE-2024-0225

Use after free in WebGPU in Google Chrome prior to 120.0.6099.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

8.8CVSS8.8AI score0.00471EPSS
CVE
CVE
added 2016/10/07 2:59 p.m.152 views

CVE-2015-2080

The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.

7.5CVSS7.2AI score0.92764EPSS
Total number of security vulnerabilities5312