cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-25308,https://securityvulnerability.io/vulnerability/CVE-2022-25308,Stack-based Buffer Overflow in Fribidi Package,"A stack-based buffer overflow vulnerability exists in the Fribidi package, allowing attackers to craft a malicious file that, when processed by Fribidi, can result in potential memory leaks or cause denial of service. This flaw emphasizes the critical need for secure coding practices and regular updates to prevent exploitation.",Gnu,Fribidi,7.8,HIGH,0.0018400000408291817,false,,false,false,false,,,false,false,,2022-09-06T17:18:52.000Z,0 CVE-2022-25309,https://securityvulnerability.io/vulnerability/CVE-2022-25309,Heap-based Buffer Overflow in Fribidi Package,"A heap-based buffer overflow flaw exists in the Fribidi package, specifically in the fribidi_cap_rtl_to_unicode() function located in fribidi-char-sets-cap-rtl.c. By supplying a specially crafted file with the '--caprtl' option to the Fribidi application, an attacker can trigger this vulnerability, which may result in a crash and consequently lead to a Denial of Service. This security flaw could affect the availability and reliability of systems relying on this package.",Gnu,Fribidi,5.5,MEDIUM,0.0013200000394135714,false,,false,false,false,,,false,false,,2022-09-06T17:18:52.000Z,0 CVE-2022-25310,https://securityvulnerability.io/vulnerability/CVE-2022-25310,Segmentation Fault in Fribidi Package from FRIBIDI,"A segmentation fault flaw exists in the Fribidi package that impacts the fribidi_remove_bidi_marks() function. This vulnerability can be exploited by an attacker with the ability to pass specially crafted files to the Fribidi library. Such an exploit can lead to application crashes, potentially resulting in a denial of service condition. Organizations using this package should review their implementations and apply mitigations where necessary.",Gnu,Fribidi,5.5,MEDIUM,0.001180000021122396,false,,false,false,false,,,false,false,,2022-09-06T17:18:52.000Z,0 CVE-2019-18397,https://securityvulnerability.io/vulnerability/CVE-2019-18397,Buffer Overflow Vulnerability in GNU FriBidi Affects Multiple Applications,"A buffer overflow exists in the fribidi_get_par_embedding_levels_ex() function within GNU FriBidi, affecting versions up to 1.0.7. This vulnerability allows attackers to create specially crafted text inputs that, when processed by applications utilizing FriBidi for text layout, can lead to denial of service or even the execution of arbitrary code. Applications such as GEdit and HexChat are notably susceptible, as they rely on Pango, which incorporates FriBidi for bidirectional text layout. Mitigating this risk is crucial for users relying on these applications.",Gnu,Fribidi,7.8,HIGH,0.003370000049471855,false,,false,false,false,,,false,false,,2019-11-13T13:55:35.000Z,0