Show filters
268 Total Results
Displaying 111-120 of 268
Sort by:
Attacker Value
Unknown
CVE-2022-22576
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
0
Attacker Value
Unknown
CVE-2022-1882
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-1678
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
0
Attacker Value
Unknown
CVE-2022-1734
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
0
Attacker Value
Unknown
CVE-2022-1183
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
0
Attacker Value
Unknown
CVE-2022-29581
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
0
Attacker Value
Unknown
CVE-2022-1116
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.
0
Attacker Value
Unknown
CVE-2022-1586
Disclosure Date: May 16, 2022 (last updated February 23, 2025)
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
0
Attacker Value
Unknown
CVE-2022-1587
Disclosure Date: May 16, 2022 (last updated February 23, 2025)
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
0
Attacker Value
Unknown
CVE-2022-1679
Disclosure Date: May 16, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
0