Show filters
859 Total Results
Displaying 191-200 of 859
Sort by:
Attacker Value
Unknown
CVE-2022-21282
Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the AP…
0
Attacker Value
Unknown
CVE-2022-21296
Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the AP…
0
Attacker Value
Unknown
CVE-2022-0261
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2021-40011
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity.
0
Attacker Value
Unknown
CVE-2021-39969
Disclosure Date: January 03, 2022 (last updated October 07, 2023)
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
0
Attacker Value
Unknown
CVE-2021-39967
Disclosure Date: January 03, 2022 (last updated February 23, 2025)
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
0
Attacker Value
Unknown
CVE-2021-37133
Disclosure Date: January 03, 2022 (last updated October 07, 2023)
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
0
Attacker Value
Unknown
CVE-2021-37119
Disclosure Date: January 03, 2022 (last updated October 07, 2023)
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
0
Attacker Value
Unknown
CVE-2021-37117
Disclosure Date: January 03, 2022 (last updated October 07, 2023)
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
0
Attacker Value
Unknown
CVE-2021-37113
Disclosure Date: January 03, 2022 (last updated October 07, 2023)
There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
0