Show filters
1,191 Total Results
Displaying 121-130 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2022-48337

Disclosure Date: February 20, 2023 (last updated October 08, 2023)
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
Attacker Value
Unknown

CVE-2023-0361

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
Attacker Value
Unknown

CVE-2022-46663

Disclosure Date: February 07, 2023 (last updated November 02, 2023)
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
Attacker Value
Unknown

CVE-2023-0687

Disclosure Date: February 06, 2023 (last updated February 15, 2024)
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
Attacker Value
Unknown

CVE-2023-25139

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.
Attacker Value
Unknown

CVE-2022-48303

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
Attacker Value
Unknown

CVE-2022-4285

Disclosure Date: January 27, 2023 (last updated October 08, 2023)
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
Attacker Value
Unknown

CVE-2022-3515

Disclosure Date: January 12, 2023 (last updated February 24, 2025)
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
Attacker Value
Unknown

CVE-2022-3715

Disclosure Date: January 05, 2023 (last updated February 24, 2025)
A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.
Attacker Value
Unknown

CVE-2022-47629

Disclosure Date: December 20, 2022 (last updated February 24, 2025)
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.