Show filters
1,191 Total Results
Displaying 101-110 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2023-36273
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
0
Attacker Value
Unknown
CVE-2023-36272
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c.
0
Attacker Value
Unknown
CVE-2023-36271
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c.
0
Attacker Value
Unknown
CVE-2023-2789
Disclosure Date: May 18, 2023 (last updated October 08, 2023)
A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-2491
Disclosure Date: May 17, 2023 (last updated October 08, 2023)
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-1972
Disclosure Date: May 17, 2023 (last updated October 08, 2023)
A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.
0
Attacker Value
Unknown
CVE-2021-34337
Disclosure Date: April 15, 2023 (last updated October 08, 2023)
An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces.
0
Attacker Value
Unknown
CVE-2023-29491
Disclosure Date: April 14, 2023 (last updated October 08, 2023)
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
0
Attacker Value
Unknown
CVE-2023-30630
Disclosure Date: April 13, 2023 (last updated October 08, 2023)
Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible.
0
Attacker Value
Unknown
CVE-2023-24626
Disclosure Date: April 08, 2023 (last updated October 08, 2023)
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
0