Page 92 of 4121 results (0.014 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in faad2 through 2.10.0. A NULL pointer dereference exists in the function get_sample() located in output.c. It allows an attacker to cause Denial of Service. Se ha detectado un problema en faad2 versiones hasta 2.10.0. Se presenta una desreferencia del puntero NULL en la función get_sample() ubicada en el archivo output.c. • https://github.com/knik0/faad2/issues/58 https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html https://www.debian.org/security/2022/dsa-5109 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_analysis_32 located in sbr_qmf.c. It allows an attacker to cause code Execution. Se ha detectado un problema en faad2 versiones hasta 2.10.0. Se presenta un desbordamiento del búfer de la pila en la función sbr_qmf_analysis_32 ubicada en el archivo sbr_qmf.c. • https://github.com/knik0/faad2/issues/59 https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html https://www.debian.org/security/2022/dsa-5109 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution. Se ha detectado un problema en faad2 versiones hasta 2.10.0. Se presenta un desbordamiento del búfer de la pila en la función lt_prediction ubicada en el archivo lt_predict.c. • https://github.com/knik0/faad2/issues/62 https://lists.debian.org/debian-lts-announce/2021/10/msg00020.html https://www.debian.org/security/2022/dsa-5109 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp. Se ha detectado que International Components for Unicode (ICU-20850) versión v66.1, contiene un bug de uso de memoria previamente liberada en la función pkg_createWithAssemblyCode en el archivo tools/pkgdata/pkgdata.cpp • https://github.com/unicode-org/icu/pull/886 https://lists.debian.org/debian-lts-announce/2021/10/msg00008.html https://unicode-org.atlassian.net/browse/ICU-20850 https://www.debian.org/security/2021/dsa-5014 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 1

arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. arch/mips/net/bpf_jit.c en el kernel de Linux anterior a la versión 5.4.10 puede generar código máquina no deseado al transformar programas cBPF sin privilegios, permitiendo la ejecución de código arbitrario dentro del contexto del kernel. Esto ocurre porque las ramas condicionales pueden superar el límite de 128 KB de la arquitectura MIPS • http://www.openwall.com/lists/oss-security/2021/09/15/5 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://security.netapp.com/advisory/ntap-20211008-0003 https://www.debian.org/security/2022/dsa-5096 •