Show filters
198 Total Results
Displaying 11-20 of 198
Sort by:
Attacker Value
Unknown
CVE-2023-38426
Disclosure Date: July 18, 2023 (last updated December 23, 2023)
An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.
0
Attacker Value
Unknown
CVE-2023-32250
Disclosure Date: July 10, 2023 (last updated August 22, 2024)
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2022-36946
Disclosure Date: July 27, 2022 (last updated March 25, 2024)
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.
0
Attacker Value
Unknown
CVE-2022-2048
Disclosure Date: July 07, 2022 (last updated October 07, 2023)
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
0
Attacker Value
Unknown
CVE-2022-2047
Disclosure Date: July 07, 2022 (last updated October 07, 2023)
In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
0
Attacker Value
Unknown
CVE-2022-27781
Disclosure Date: June 02, 2022 (last updated March 28, 2024)
libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
0
Attacker Value
Unknown
CVE-2022-27780
Disclosure Date: June 02, 2022 (last updated March 28, 2024)
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
0
Attacker Value
Unknown
CVE-2022-27779
Disclosure Date: June 02, 2022 (last updated March 28, 2024)
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
0
Attacker Value
Unknown
CVE-2022-27774
Disclosure Date: June 02, 2022 (last updated March 28, 2024)
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
0
Attacker Value
Unknown
CVE-2022-30115
Disclosure Date: June 02, 2022 (last updated March 28, 2024)
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
0