cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.
Max CVSS
6.1
Published
2020-12-28
Updated
2021-07-21
EPSS
0.12%
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Max CVSS
5.5
Published
2020-11-24
Updated
2021-12-02
EPSS
0.06%
There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
Max CVSS
7.8
Published
2020-12-11
Updated
2022-08-06
EPSS
0.14%
A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.
Max CVSS
4.3
Published
2020-12-08
Updated
2022-06-15
EPSS
0.25%
The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.
Max CVSS
5.5
Published
2020-10-06
Updated
2021-11-30
EPSS
0.05%
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.
Max CVSS
5.5
Published
2020-10-06
Updated
2021-11-30
EPSS
0.04%
The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
Max CVSS
5.5
Published
2020-10-06
Updated
2021-11-29
EPSS
0.05%
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
Max CVSS
9.8
Published
2020-09-30
Updated
2023-01-31
EPSS
2.15%
A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.
Max CVSS
8.1
Published
2020-12-03
Updated
2021-05-05
EPSS
0.30%
An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.
Max CVSS
7.0
Published
2020-09-23
Updated
2022-04-28
EPSS
0.05%
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
Max CVSS
7.8
Published
2020-08-13
Updated
2021-01-26
EPSS
0.14%
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service.
Max CVSS
7.5
Published
2020-10-19
Updated
2022-04-08
EPSS
0.36%
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service.
Max CVSS
7.5
Published
2020-10-19
Updated
2022-04-08
EPSS
0.36%
PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version().
Max CVSS
7.8
Published
2020-11-20
Updated
2022-01-01
EPSS
0.14%
Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.
Max CVSS
8.8
Published
2020-11-03
Updated
2021-03-11
EPSS
0.41%
Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Max CVSS
6.5
Published
2020-11-03
Updated
2021-07-21
EPSS
0.68%
Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Max CVSS
8.8
Published
2020-11-03
Updated
2021-07-21
EPSS
0.68%
Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
Max CVSS
8.8
Published
2020-11-03
Updated
2021-01-30
EPSS
0.72%
Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
Max CVSS
8.8
Published
2020-09-21
Updated
2021-01-29
EPSS
0.40%
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
Max CVSS
7.8
Published
2020-09-11
Updated
2021-11-04
EPSS
0.04%
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
Max CVSS
6.7
Published
2020-08-05
Updated
2022-11-29
EPSS
0.05%
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
Max CVSS
8.8
Published
2020-03-12
Updated
2022-08-12
EPSS
0.42%
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Max CVSS
6.5
Published
2020-09-15
Updated
2022-04-22
EPSS
0.61%
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
Max CVSS
7.8
Published
2020-09-18
Updated
2022-05-24
EPSS
0.05%
Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Max CVSS
6.8
Published
2020-09-21
Updated
2021-07-21
EPSS
0.71%
33 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!