Show filters
794 Total Results
Displaying 131-140 of 794
Sort by:
Attacker Value
Unknown
CVE-2022-32221
Disclosure Date: December 05, 2022 (last updated February 24, 2025)
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
0
Attacker Value
Unknown
CVE-2022-4292
Disclosure Date: December 05, 2022 (last updated February 24, 2025)
Use After Free in GitHub repository vim/vim prior to 9.0.0882.
0
Attacker Value
Unknown
CVE-2022-46366
Disclosure Date: December 02, 2022 (last updated February 24, 2025)
Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
0
Attacker Value
Unknown
CVE-2022-40304
Disclosure Date: November 23, 2022 (last updated February 24, 2025)
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
0
Attacker Value
Unknown
CVE-2022-40303
Disclosure Date: November 23, 2022 (last updated February 24, 2025)
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
0
Attacker Value
Unknown
CVE-2022-40228
Disclosure Date: November 22, 2022 (last updated February 24, 2025)
IBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527.
0
Attacker Value
Unknown
CVE-2022-37967
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-38023
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Netlogon RPC Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-37966
Disclosure Date: November 09, 2022 (last updated January 11, 2025)
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-45061
Disclosure Date: November 09, 2022 (last updated February 24, 2025)
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
0