Show filters
609 Total Results
Displaying 21-30 of 609
Sort by:
Attacker Value
Unknown
CVE-2021-39663
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
In openFileAndEnforcePathPermissionsHelper of MediaProvider.java, there is a possible bypass of a permissions check due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-200682135
0
Attacker Value
Unknown
CVE-2021-45387
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() at tree.c.
0
Attacker Value
Unknown
CVE-2021-45386
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
0
Attacker Value
Unknown
CVE-2021-30326
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Possible assertion due to improper size validation while processing the DownlinkPreemption IE in an RRC Reconfiguration/RRC Setup message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
0
Attacker Value
Unknown
CVE-2022-21220
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Improper restriction of XML external entity for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2022-21205
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Improper restriction of XML external entity reference in DSP Builder Pro for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an unauthenticated user to potentially enable information disclosure via network access.
0
Attacker Value
Unknown
CVE-2021-25992
Disclosure Date: February 08, 2022 (last updated February 23, 2025)
In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a user’s session even after the user initiated logout. It makes it possible for an attacker to reuse the admin cookies either via local/network access or by other hypothetical attacks.
0
Attacker Value
Unknown
CVE-2022-23588
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
0
Attacker Value
Unknown
CVE-2022-23586
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
0
Attacker Value
Unknown
CVE-2022-23583
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
0