Show filters
394 Total Results
Displaying 131-140 of 394
Sort by:
Attacker Value
Unknown

CVE-2022-35505

Disclosure Date: August 03, 2022 (last updated February 24, 2025)
A segmentation fault in TripleCross v0.1.0 occurs when sending a control command from the client to the server. This occurs because there is no limit to the length of the output of the executed command.
Attacker Value
Unknown

CVE-2022-35922

Disclosure Date: August 01, 2022 (last updated February 24, 2025)
Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will abort the current process, killing all threads. This affects only sync (non-Tokio) implementation. Async version also does not limit memory, but does not use `with_capacity`, so DoS can happen only when bytes for oversized dataframe or message actually got delivered by the attacker. The crashes are fixed in version 0.26.5 by imposing default dataframe size limits. Affected users are advised to update to this version. Users unable to upgrade are advised to filter websocket traffic externally or to only accept trusted traffic.
Attacker Value
Unknown

CVE-2022-35915

Disclosure Date: August 01, 2022 (last updated February 24, 2025)
OpenZeppelin Contracts is a library for secure smart contract development. The target contract of an EIP-165 `supportsInterface` query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost. The issue has been fixed in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2022-31184

Disclosure Date: August 01, 2022 (last updated February 24, 2025)
Discourse is the an open source discussion platform. In affected versions an email activation route can be abused to send mass spam emails. A fix has been included in the latest stable, beta and tests-passed versions of Discourse which rate limits emails. Users are advised to upgrade. Users unable to upgrade should manually rate limit email.
Attacker Value
Unknown

CVE-2022-35221

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
Teamplus Pro community discussion has an ‘allocation of resource without limits or throttling’ vulnerability on thread subject field. A remote attacker with general user privilege posting a thread subject with large content can cause the server to allocate too much memory, leading to missing partial post content and disrupt partial service.
Attacker Value
Unknown

CVE-2022-35220

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
Teamplus Pro community discussion function has an ‘allocation of resource without limits or throttling’ vulnerability. A remote attacker with general user privilege posting a thread with large content can cause the receiving client device to allocate too much memory, leading to abnormal termination of this client’s Teamplus Pro application.
Attacker Value
Unknown

CVE-2022-35218

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
The NHI card’s web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.
Attacker Value
Unknown

CVE-2022-35219

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
The NHI card’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service.
Attacker Value
Unknown

CVE-2022-29286

Disclosure Date: July 17, 2022 (last updated February 24, 2025)
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
Attacker Value
Unknown

CVE-2022-2406

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API.