Show filters
255 Total Results
Displaying 131-140 of 255
Sort by:
Attacker Value
Unknown
CVE-2022-4144
Disclosure Date: November 29, 2022 (last updated February 24, 2025)
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
0
Attacker Value
Unknown
CVE-2022-45152
Disclosure Date: November 25, 2022 (last updated February 24, 2025)
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
0
Attacker Value
Unknown
CVE-2022-3374
Disclosure Date: October 31, 2022 (last updated February 24, 2025)
The Ocean Extra WordPress plugin before 2.0.5 unserialises the content of an imported file, which could lead to PHP object injections issues when a high privilege user import (intentionally or not) a malicious Customizer Styling file and a suitable gadget chain is present on the blog.
0
Attacker Value
Unknown
CVE-2022-40316
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
0
Attacker Value
Unknown
CVE-2022-40315
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
A limited SQL injection risk was identified in the "browse list of users" site administration page.
0
Attacker Value
Unknown
CVE-2022-40313
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
0
Attacker Value
Unknown
CVE-2022-3252
Disclosure Date: September 21, 2022 (last updated February 24, 2025)
Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. Most commonly this is HTTP servers, as compressed HTTP messages cannot be negotiated for HTTP requests, but it is possible that users have configured decompression for HTTP requests as well. The attack is low effort, and likely to be reached without requiring any privilege or system access. The impact on availability is high: the process …
0
Attacker Value
Unknown
CVE-2022-3213
Disclosure Date: September 19, 2022 (last updated February 24, 2025)
A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.
0
Attacker Value
Unknown
CVE-2022-37146
Disclosure Date: September 08, 2022 (last updated February 24, 2025)
The PlexTrac platform prior to version 1.28.0 allows for username enumeration via HTTP response times on invalid login attempts for users configured to use the PlexTrac authentication provider. Login attempts for valid, unlocked users configured to use PlexTrac as their authentication provider take significantly longer than those for invalid users, allowing for valid users to be enumerated by an unauthenticated remote attacker. Note that the lockout policy implemented in Plextrac version 1.17.0 makes it impossible to distinguish between valid, locked user accounts and user accounts that do not exist, but does not prevent valid, unlocked users from being enumerated.
0
Attacker Value
Unknown
CVE-2022-37145
Disclosure Date: September 08, 2022 (last updated February 24, 2025)
The PlexTrac platform prior to version 1.17.0 does not restrict excessive authentication attempts for accounts configured to use the PlexTrac authentication provider. An unauthenticated remote attacker could perform a bruteforce attack on the login page with no time or attempt limitation in an attempt to obtain valid credentials for the platform users configured to use the PlexTrac authentication provider.
0