Show filters
310 Total Results
Displaying 141-150 of 310
Sort by:
Attacker Value
Unknown
CVE-2022-30115
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
0
Attacker Value
Unknown
CVE-2022-27776
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
0
Attacker Value
Unknown
CVE-2022-1786
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-1652
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
0
Attacker Value
Unknown
CVE-2022-22576
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
0
Attacker Value
Unknown
CVE-2022-1882
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-1678
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
0
Attacker Value
Unknown
CVE-2022-1734
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
0
Attacker Value
Unknown
CVE-2022-1183
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
0
Attacker Value
Unknown
CVE-2022-29581
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
0