cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-5557,https://securityvulnerability.io/vulnerability/CVE-2023-5557,Tracker-miners: sandbox escape,"A flaw in the Tracker-miners package exposes a security weakness within its sandbox environment. This vulnerability allows an attacker to execute arbitrary code outside the sandbox if the tracker-extract process has already been compromised through another vulnerability, potentially leading to a severe breach of system integrity.",Red Hat,"tracker-miners,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.2 Telecommunications Update Service,Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 7,Fedora 37,Fedora 38",7.7,HIGH,0.007259999867528677,false,false,false,false,,false,false,2023-10-13T02:15:00.000Z,0 CVE-2023-43090,https://securityvulnerability.io/vulnerability/CVE-2023-43090,Screenshot tool allows viewing open windows when session is locked,A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.,Red Hat,"gnome-shell,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 37,Fedora 38",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-09-22T06:15:00.000Z,0 CVE-2023-25586,https://securityvulnerability.io/vulnerability/CVE-2023-25586,Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized,A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.,Red Hat,"binutils,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 36,Fedora 37,Extra Packages for Enterprise Linux 7,Fedora,Extra Packages for Enterprise Linux 8",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T21:15:00.000Z,0 CVE-2023-25588,https://securityvulnerability.io/vulnerability/CVE-2023-25588,Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`,"A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.",Red Hat,"binutils,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 37,Extra Packages for Enterprise Linux 8,Fedora 36,Extra Packages for Enterprise Linux 7,Fedora",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T21:15:00.000Z,0 CVE-2023-25584,https://securityvulnerability.io/vulnerability/CVE-2023-25584,Out of bounds read in parse_module function in bfd/vms-alpha.c,An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.,Red Hat,"Binutils,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages For Enterprise Linux 8,Fedora 37,Fedora 36,Fedora,Extra Packages For Enterprise Linux 7",6.3,MEDIUM,0.000590000010561198,false,false,false,false,,false,false,2023-09-14T21:15:00.000Z,0 CVE-2023-25585,https://securityvulnerability.io/vulnerability/CVE-2023-25585,Field `file_table` of `struct module *module` is uninitialized,A flaw was found in Binutils. The use of an uninitialized field in the struct module *module may lead to application crash and local denial of service.,Red Hat,"binutils,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 37,Fedora 36,Extra Packages for Enterprise Linux 8,Extra Packages for Enterprise Linux 7,Fedora",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T21:15:00.000Z,0 CVE-2023-32665,https://securityvulnerability.io/vulnerability/CVE-2023-32665,Gvariant deserialisation does not match spec for non-normal data,"A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.",Red Hat,"Glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 38,Extra Packages For Enterprise Linux,Fedora,Fedora 37",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0 CVE-2023-32611,https://securityvulnerability.io/vulnerability/CVE-2023-32611,G_variant_byteswap() can take a long time with some non-normal inputs,"A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.",Red Hat,"glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages for Enterprise Linux,Fedora 38,Fedora 37",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0 CVE-2023-29499,https://securityvulnerability.io/vulnerability/CVE-2023-29499,Gvariant offset table entry size is not checked in is_normal(),"A vulnerability in GLib occurs when the GVariant deserialization process does not properly verify the input format, potentially leading to a denial of service. This flaw can disrupt systems that rely on GLib for handling data serialization and deserialization, making it crucial for developers and system administrators to implement necessary updates and fixes to maintain software stability and security.",Red Hat,"glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages for Enterprise Linux,Fedora 37,Fedora 38",7.5,HIGH,0.002050000010058284,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0