cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-3094,https://securityvulnerability.io/vulnerability/CVE-2024-3094,"Malicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages","The XZ utility has been compromised due to malicious code introduced in the upstream tarballs starting from version 5.6.0. A sophisticated obfuscation technique is employed where the liblzma build process extracts a prebuilt object file hidden within a disguised test file in the source code. This manipulation alters specific functions in the liblzma library, which can be exploited by any software linked against it. Consequently, the modified liblzma library poses a risk as it can intercept and manipulate data interactions with software using this library, leading to potential data breaches and integrity issues across affected platforms.",Red Hat,"Xz,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Jboss Enterprise Application Platform 8,Fedora 38,Fedora 39",10,CRITICAL,0.635200023651123,false,true,false,true,true,true,true,2024-03-29T16:51:12.588Z,262103 CVE-2023-5557,https://securityvulnerability.io/vulnerability/CVE-2023-5557,Tracker-miners: sandbox escape,"A flaw in the Tracker-miners package exposes a security weakness within its sandbox environment. This vulnerability allows an attacker to execute arbitrary code outside the sandbox if the tracker-extract process has already been compromised through another vulnerability, potentially leading to a severe breach of system integrity.",Red Hat,"tracker-miners,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.2 Telecommunications Update Service,Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions,Red Hat Enterprise Linux 8.6 Extended Update Support,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Extended Update Support,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 7,Fedora 37,Fedora 38",7.7,HIGH,0.007259999867528677,false,false,false,false,,false,false,2023-10-13T02:15:00.000Z,0 CVE-2023-43090,https://securityvulnerability.io/vulnerability/CVE-2023-43090,Screenshot tool allows viewing open windows when session is locked,A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.,Red Hat,"gnome-shell,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 37,Fedora 38",5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-09-22T06:15:00.000Z,0 CVE-2023-29499,https://securityvulnerability.io/vulnerability/CVE-2023-29499,Gvariant offset table entry size is not checked in is_normal(),"A vulnerability in GLib occurs when the GVariant deserialization process does not properly verify the input format, potentially leading to a denial of service. This flaw can disrupt systems that rely on GLib for handling data serialization and deserialization, making it crucial for developers and system administrators to implement necessary updates and fixes to maintain software stability and security.",Red Hat,"glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages for Enterprise Linux,Fedora 37,Fedora 38",7.5,HIGH,0.002050000010058284,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0 CVE-2023-32611,https://securityvulnerability.io/vulnerability/CVE-2023-32611,G_variant_byteswap() can take a long time with some non-normal inputs,"A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.",Red Hat,"glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Extra Packages for Enterprise Linux,Fedora 38,Fedora 37",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0 CVE-2023-32665,https://securityvulnerability.io/vulnerability/CVE-2023-32665,Gvariant deserialisation does not match spec for non-normal data,"A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.",Red Hat,"Glib2,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Fedora 38,Extra Packages For Enterprise Linux,Fedora,Fedora 37",5.5,MEDIUM,0.0005799999926239252,false,false,false,false,,false,false,2023-09-14T20:15:00.000Z,0