Show filters
61 Total Results
Displaying 21-30 of 61
Sort by:
Attacker Value
Unknown

CVE-2022-25235

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Attacker Value
Unknown

CVE-2022-0391

Disclosure Date: February 09, 2022 (last updated November 08, 2023)
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Attacker Value
Unknown

CVE-2022-21375

Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
0
Attacker Value
Unknown

CVE-2022-21271

Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplie…
0
Attacker Value
Unknown

CVE-2021-4182

Disclosure Date: December 30, 2021 (last updated November 08, 2023)
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4185

Disclosure Date: December 30, 2021 (last updated November 08, 2023)
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4183

Disclosure Date: December 30, 2021 (last updated November 08, 2023)
Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file
Attacker Value
Unknown

CVE-2021-4181

Disclosure Date: December 30, 2021 (last updated November 08, 2023)
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-4184

Disclosure Date: December 30, 2021 (last updated November 08, 2023)
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2021-44224

Disclosure Date: December 20, 2021 (last updated November 08, 2023)
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).