Show filters
256 Total Results
Displaying 161-170 of 256
Sort by:
Attacker Value
Unknown
CVE-2021-3733
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
0
Attacker Value
Unknown
CVE-2022-0546
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.
0
Attacker Value
Unknown
CVE-2022-24614
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
0
Attacker Value
Unknown
CVE-2022-24613
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
0
Attacker Value
Unknown
CVE-2022-21698
Disclosure Date: February 15, 2022 (last updated February 23, 2025)
client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler t…
0
Attacker Value
Unknown
CVE-2022-0571
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.
0
Attacker Value
Unknown
CVE-2021-25110
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
The Futurio Extra WordPress plugin before 1.6.3 allows any logged in user, such as subscriber, to extract any other user's email address.
0
Attacker Value
Unknown
CVE-2021-25109
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
The Futurio Extra WordPress plugin before 1.6.3 is affected by a SQL Injection vulnerability that could be used by high privilege users to extract data from the database as well as used to perform Cross-Site Scripting (XSS) against logged in admins by making send open a malicious link.
0
Attacker Value
Unknown
CVE-2021-45079
Disclosure Date: January 31, 2022 (last updated February 23, 2025)
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
0
Attacker Value
Unknown
CVE-2022-23437
Disclosure Date: January 24, 2022 (last updated February 23, 2025)
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
0