5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.5%
A vulnerability in the Glib library is related to GVariant deserialization. Exploitation of the vulnerability could allow
an attacker to cause a denial of service
Vulnerability of Glib library function g_byte_array_new_take() is related to buffer copying without checking the
the size of the input data. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code
Vulnerability in the g_bytes_new function of the gbytes.c component of the Glib library is caused by integer overflow
due to implicit conversion of a variable of type gsize to type guint. Exploitation of the vulnerability could allow
an attacker acting remotely to modify the contents of dynamic memory by using a specially
a specially crafted request to a vulnerable function
Glib library vulnerability is related to additional input validation. Exploitation of the vulnerability could
Allow an attacker acting remotely to cause a denial of service
A vulnerability in the g_variant_byteswap() function of the Glib library is related to uncontrolled resource consumption.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
A vulnerability in the is_normal() function of the Glib library is associated with an uncontrolled resource consumption.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
A vulnerability in the Glib library is related to the recovery of invalid data in memory. Exploitation
exploitation of the vulnerability could allow an attacker to cause a denial of service
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.3 High
AI Score
Confidence
High
0.01 Low
EPSS
Percentile
83.5%