5 results (0.007 seconds)

CVSS: 4.8EPSS: 0%CPEs: 54EXPL: 0

25 Mar 2025 — A vulnerability classified as problematic has been found in GNOME libgsf up to 1.14.53. Affected is the function sorting_key_copy. The manipulation of the argument Name leads to out-of-bounds read. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way. • https://vuldb.com/?ctiid.300744 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 5.3EPSS: 0%CPEs: 54EXPL: 0

25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. • https://vuldb.com/?ctiid.300743 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.3EPSS: 0%CPEs: 54EXPL: 0

25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been declared as critical. This vulnerability affects the function gsf_prop_settings_collect_va. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Local access is required to approach this attack. • https://vuldb.com/?ctiid.300742 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.3EPSS: 0%CPEs: 54EXPL: 0

25 Mar 2025 — A vulnerability was found in GNOME libgsf up to 1.14.53. It has been classified as critical. This affects the function gsf_base64_encode_simple. The manipulation of the argument size_t leads to heap-based buffer overflow. An attack has to be approached locally. • https://vuldb.com/?ctiid.300741 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

08 Dec 2016 — An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File Library before 1.14.41 can be exploited to trigger a Null pointer dereference and subsequently cause a crash via a crafted TAR file. Un error dentro de la función "tar_directory_for_file()" (gsf-infile-tar.c) en GNOME Structured File Library en versiones anteriores a 1.14.41 puede ser explotado para desencadenar una referencia a puntero Null y subsecuentemente provocar una caída a través de un archivo TAR man... • http://www.securityfocus.com/bid/94860 • CWE-476: NULL Pointer Dereference •