PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 4912

of 246

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Debian, Fedoraproject, Google
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Debian, Fedoraproject, Google
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Type confusion

Vendor(s):  Debian, Fedoraproject, Google
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Type Confusion in Spellcheck in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Debian, Fedoraproject, Google
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Debian, Fedoraproject, Google
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Integer overflow

Vendor(s):  Debian, Fedoraproject, Google
Immediate
Remediate Within 48 Hours
CVSS v2N/ACVSS v39.6

Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

Published:   Updated:

Vulnerability Type: Memory corruption

Vendor(s):  Fedoraproject, Libtiff
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.

Published:   Updated:

Vulnerability Type: Null pointer dereference

Vendor(s):  Fedoraproject, Linux
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Fedoraproject, Linux
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. An unprivileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.

Published:   Updated:

Vulnerability Type: Heap overflow

Vendor(s):  Fedoraproject, Imagemagick
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Vim
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Published:   Updated:

Vulnerability Type: Security feature bypass

Vendor(s):  Fedoraproject, Kubernetes
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Debian, Fedoraproject, Openvpn
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined behavoir, leaking memory buffers or remote execution when sending network buffers to a remote peer.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Debian, Fedoraproject, Openvpn
Significant
Remediate Within one Month
CVSS v2N/ACVSS v37.5

Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.

of 246