Show filters
563 Total Results
Displaying 171-180 of 563
Sort by:
Attacker Value
Unknown

CVE-2022-29503

Disclosure Date: September 22, 2022 (last updated February 24, 2025)
A memory corruption vulnerability exists in the libpthread linuxthreads functionality of uClibC 0.9.33.2 and uClibC-ng 1.0.40. Thread allocation can lead to memory corruption. An attacker can create threads to trigger this vulnerability.
Attacker Value
Unknown

CVE-2022-25897

Disclosure Date: September 08, 2022 (last updated February 24, 2025)
The package org.eclipse.milo:sdk-server before 0.6.8 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
Attacker Value
Unknown

CVE-2022-2996

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
Attacker Value
Unknown

CVE-2022-2838

Disclosure Date: August 16, 2022 (last updated February 24, 2025)
In Eclipse Sphinx™ before version 0.13.1, Apache Xerces XML Parser was used without disabling processing of referenced external entities allowing the injection of arbitrary definitions which is able to access local files and expose their contents via HTTP requests.
Attacker Value
Unknown

CVE-2020-23622

Disclosure Date: August 15, 2022 (last updated February 24, 2025)
An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header
Attacker Value
Unknown

CVE-2022-2576

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
In Eclipse Californium version 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load (DoS own peer). The misbehavior occurs only with DTLS_VERIFY_PEERS_ON_RESUMPTION_THRESHOLD values larger than 0.
Attacker Value
Unknown

CVE-2015-8031

Disclosure Date: July 18, 2022 (last updated February 24, 2025)
Hudson (aka org.jvnet.hudson.main:hudson-core) before 3.3.2 allows XXE attacks.
Attacker Value
Unknown

CVE-2021-41037

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source.
Attacker Value
Unknown

CVE-2022-2191

Disclosure Date: July 07, 2022 (last updated February 24, 2025)
In Eclipse Jetty versions 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, SslConnection does not release ByteBuffers from configured ByteBufferPool in case of error code paths.
Attacker Value
Unknown

CVE-2022-2048

Disclosure Date: July 07, 2022 (last updated February 24, 2025)
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.