Show filters
105 Total Results
Displaying 11-20 of 105
Sort by:
Attacker Value
Unknown

CVE-2023-24329

Disclosure Date: February 17, 2023 (last updated October 08, 2023)
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Attacker Value
Unknown

CVE-2022-23491

Disclosure Date: December 07, 2022 (last updated February 13, 2025)
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.
Attacker Value
Unknown

CVE-2022-37967

Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2022-38023

Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Netlogon RPC Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2022-37966

Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
Attacker Value
Unknown

CVE-2022-45061

Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
Attacker Value
Unknown

CVE-2022-35252

Disclosure Date: September 23, 2022 (last updated March 28, 2024)
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
Attacker Value
Unknown

CVE-2022-36033

Disclosure Date: August 29, 2022 (last updated November 29, 2024)
jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/…
Attacker Value
Unknown

CVE-2022-37434

Disclosure Date: August 05, 2022 (last updated November 29, 2024)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
Attacker Value
Unknown

CVE-2022-2048

Disclosure Date: July 07, 2022 (last updated October 07, 2023)
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.