Show filters
794 Total Results
Displaying 151-160 of 794
Sort by:
Attacker Value
Unknown

CVE-2022-2953

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
Attacker Value
Unknown

CVE-2022-31773

Disclosure Date: August 25, 2022 (last updated February 24, 2025)
IBM DataPower Gateway V10CD, 10.0.1, and 2018.4.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 228357.
Attacker Value
Unknown

CVE-2021-4214

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.
Attacker Value
Unknown

CVE-2021-3998

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
Attacker Value
Unknown

CVE-2021-4189

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
Attacker Value
Unknown

CVE-2021-3999

Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Attacker Value
Unknown

CVE-2021-3975

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
Attacker Value
Unknown

CVE-2021-3905

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Attacker Value
Unknown

CVE-2021-3839

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.
Attacker Value
Unknown

CVE-2022-36344

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
An unquoted search path vulnerability exists in 'JustSystems JUST Online Update for J-License' bundled with multiple products for corporate users as in Ichitaro through Pro5 and others. Since the affected product starts another program with an unquoted file path, a malicious file may be executed with the privilege of the Windows service if it is placed in a certain path. Affected products are bundled with the following product series: Office and Office Integrated Software, ATOK, Hanako, JUST PDF, Shuriken, Homepage Builder, JUST School, JUST Smile Class, JUST Smile, JUST Frontier, JUST Jump, and Tri-De DetaProtect.