Vulnerabilities (CVE)

Filtered by vendor Serenityos Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-33186 1 Serenityos 1 Serenityos 2021-06-22 5.0 MEDIUM 7.5 HIGH
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185 1 Serenityos 1 Serenityos 2021-06-22 5.0 MEDIUM 7.5 HIGH
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-31272 1 Serenityos 1 Serenityos 2021-06-22 7.5 HIGH 9.8 CRITICAL
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-30045 1 Serenityos 1 Serenity 2021-04-12 6.4 MEDIUM 9.1 CRITICAL
SerenityOS 2021-03-27 contains a buffer overflow vulnerability in the EndOfCentralDirectory::read() function.
CVE-2021-28874 1 Serenityos 1 Serenity 2021-04-09 6.8 MEDIUM 7.8 HIGH
SerenityOS fixed as of c9f25bca048443e317f1994ba9b106f2386688c3 contains a buffer overflow vulnerability in LibTextCode through opening a crafted file.
CVE-2021-27343 1 Serenityos 1 Serenity 2021-04-09 5.0 MEDIUM 7.5 HIGH
SerenityOS Unspecified is affected by: Buffer Overflow. The impact is: obtain sensitive information (context-dependent). The component is: /Userland/Libraries/LibCrypto/ASN1/DER.h Crypto::der_decode_sequence() function. The attack vector is: Parsing RSA Key ASN.1.
CVE-2019-20172 1 Serenityos 1 Serenity 2020-08-24 4.6 MEDIUM 7.8 HIGH
Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.