Show filters
424 Total Results
Displaying 21-30 of 424
Sort by:
Attacker Value
Unknown
CVE-2023-6377
Disclosure Date: December 13, 2023 (last updated April 25, 2024)
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
0
Attacker Value
Unknown
CVE-2023-5380
Disclosure Date: October 25, 2023 (last updated May 22, 2024)
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
0
Attacker Value
Unknown
CVE-2023-5367
Disclosure Date: October 25, 2023 (last updated April 25, 2024)
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
0
Attacker Value
Unknown
CVE-2023-44488
Disclosure Date: September 30, 2023 (last updated November 16, 2023)
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
0
Attacker Value
Unknown
CVE-2023-5217
Disclosure Date: September 28, 2023 (last updated December 21, 2024)
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
0
Attacker Value
Unknown
CVE-2023-39417
Disclosure Date: August 11, 2023 (last updated April 25, 2024)
IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
0
Attacker Value
Unknown
CVE-2022-40982
Disclosure Date: August 11, 2023 (last updated October 08, 2023)
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2023-4273
Disclosure Date: August 09, 2023 (last updated April 25, 2024)
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
0
Attacker Value
Unknown
CVE-2023-4194
Disclosure Date: August 07, 2023 (last updated April 25, 2024)
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
0
Attacker Value
Unknown
CVE-2023-4147
Disclosure Date: August 07, 2023 (last updated August 27, 2024)
A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
0