Show filters
36 Total Results
Displaying 31-36 of 36
Sort by:
Attacker Value
Unknown

CVE-2022-20107

Disclosure Date: May 03, 2022 (last updated October 07, 2023)
In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.
Attacker Value
Unknown

CVE-2022-20106

Disclosure Date: May 03, 2022 (last updated October 07, 2023)
In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
Attacker Value
Unknown

CVE-2022-20105

Disclosure Date: May 03, 2022 (last updated October 07, 2023)
In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
Attacker Value
Unknown

CVE-2020-14304

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A memory disclosure flaw was found in the Linux kernel's ethernet drivers, in the way it read data from the EEPROM of the device. This flaw allows a local user to read uninitialized values from the kernel memory. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2018-14656

Disclosure Date: October 08, 2018 (last updated November 27, 2024)
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
0
Attacker Value
Unknown

CVE-2018-14641

Disclosure Date: September 18, 2018 (last updated November 27, 2024)
A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial-of-service.
0