Show filters
1,191 Total Results
Displaying 131-140 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2022-3775
Disclosure Date: December 19, 2022 (last updated February 24, 2025)
When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.
0
Attacker Value
Unknown
CVE-2022-2601
Disclosure Date: December 14, 2022 (last updated February 24, 2025)
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
0
Attacker Value
Unknown
CVE-2022-45332
Disclosure Date: November 30, 2022 (last updated February 24, 2025)
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.
0
Attacker Value
Unknown
CVE-2022-45939
Disclosure Date: November 28, 2022 (last updated February 24, 2025)
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
0
Attacker Value
Unknown
CVE-2021-46848
Disclosure Date: October 24, 2022 (last updated February 24, 2025)
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
0
Attacker Value
Unknown
CVE-2022-41550
Disclosure Date: October 11, 2022 (last updated February 24, 2025)
GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header.
0
Attacker Value
Unknown
CVE-2022-25310
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.
0
Attacker Value
Unknown
CVE-2022-25309
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
0
Attacker Value
Unknown
CVE-2022-25308
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.
0
Attacker Value
Unknown
CVE-2022-39832
Disclosure Date: September 05, 2022 (last updated February 24, 2025)
An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
0