Show filters
1,087 Total Results
Displaying 81-90 of 1,087
Sort by:
Attacker Value
Unknown
CVE-2023-2491
Disclosure Date: May 17, 2023 (last updated October 08, 2023)
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-2203
Disclosure Date: May 17, 2023 (last updated October 08, 2023)
A flaw was found in the WebKitGTK package. An improper input validation issue may lead to a use-after-free vulnerability. This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. This CVE exists because of a CVE-2023-28205 security regression for the WebKitGTK package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
0
Attacker Value
Unknown
CVE-2023-0179
Disclosure Date: March 27, 2023 (last updated October 08, 2023)
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
0
Attacker Value
Unknown
CVE-2023-0494
Disclosure Date: March 27, 2023 (last updated October 08, 2023)
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
0
Attacker Value
Unknown
CVE-2022-4283
Disclosure Date: December 14, 2022 (last updated October 08, 2023)
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
0
Attacker Value
Unknown
CVE-2022-2601
Disclosure Date: December 14, 2022 (last updated October 08, 2023)
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
0
Attacker Value
Unknown
CVE-2022-2850
Disclosure Date: October 14, 2022 (last updated October 08, 2023)
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
0
Attacker Value
Unknown
CVE-2022-34303
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
0
Attacker Value
Unknown
CVE-2022-34302
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
0
Attacker Value
Unknown
CVE-2022-34301
Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
0