Show filters
266 Total Results
Displaying 111-120 of 266
Sort by:
Attacker Value
Unknown

CVE-2022-1678

Disclosure Date: May 25, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
Attacker Value
Unknown

CVE-2022-1734

Disclosure Date: May 18, 2022 (last updated February 23, 2025)
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
Attacker Value
Unknown

CVE-2022-1183

Disclosure Date: May 18, 2022 (last updated February 23, 2025)
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
Attacker Value
Unknown

CVE-2022-29581

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
Attacker Value
Unknown

CVE-2022-1116

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.
Attacker Value
Unknown

CVE-2022-1586

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
Attacker Value
Unknown

CVE-2022-1587

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
Attacker Value
Unknown

CVE-2022-1679

Disclosure Date: May 16, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Attacker Value
Unknown

CVE-2022-30594

Disclosure Date: May 12, 2022 (last updated February 23, 2025)
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
Attacker Value
Unknown

CVE-2022-29155

Disclosure Date: May 04, 2022 (last updated February 23, 2025)
In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.