Show filters
1,191 Total Results
Displaying 91-100 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2023-39129

Disclosure Date: July 25, 2023 (last updated October 08, 2023)
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.
Attacker Value
Unknown

CVE-2023-39128

Disclosure Date: July 25, 2023 (last updated October 08, 2023)
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.
Attacker Value
Unknown

CVE-2022-28736

Disclosure Date: July 20, 2023 (last updated October 08, 2023)
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
Attacker Value
Unknown

CVE-2022-28735

Disclosure Date: July 20, 2023 (last updated October 08, 2023)
The GRUB2's shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. Allowing such files to be loaded may lead to unverified code and modules to be loaded in GRUB2 breaking the secure boot trust-chain.
Attacker Value
Unknown

CVE-2022-28734

Disclosure Date: July 20, 2023 (last updated January 17, 2024)
Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Attacker Value
Unknown

CVE-2022-28733

Disclosure Date: July 20, 2023 (last updated October 08, 2023)
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
Attacker Value
Unknown

CVE-2021-32256

Disclosure Date: July 18, 2023 (last updated October 08, 2023)
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c.
Attacker Value
Unknown

CVE-2020-25969

Disclosure Date: July 05, 2023 (last updated October 08, 2023)
gnuplot v5.5 was discovered to contain a buffer overflow via the function plotrequest().
Attacker Value
Unknown

CVE-2015-20109

Disclosure Date: June 25, 2023 (last updated October 08, 2023)
end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.
Attacker Value
Unknown

CVE-2023-36274

Disclosure Date: June 23, 2023 (last updated October 08, 2023)
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.