Show filters
1,213 Total Results
Displaying 211-220 of 1,213
Sort by:
Attacker Value
Unknown
CVE-2022-40315
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
A limited SQL injection risk was identified in the "browse list of users" site administration page.
0
Attacker Value
Unknown
CVE-2022-40313
Disclosure Date: September 30, 2022 (last updated February 24, 2025)
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
0
Attacker Value
Unknown
CVE-2014-0148
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
0
Attacker Value
Unknown
CVE-2014-0147
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
0
Attacker Value
Unknown
CVE-2014-0144
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
0
Attacker Value
Unknown
CVE-2022-3213
Disclosure Date: September 19, 2022 (last updated February 24, 2025)
A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.
0
Attacker Value
Unknown
CVE-2022-2989
Disclosure Date: September 13, 2022 (last updated February 24, 2025)
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
0
Attacker Value
Unknown
CVE-2020-10735
Disclosure Date: September 09, 2022 (last updated February 24, 2025)
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2022-2739
Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-14370, which was previously fixed via RHSA-2020:5056. This issue could possibly allow an attacker to gain access to sensitive information stored in environment variables.
0
Attacker Value
Unknown
CVE-2022-2738
Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-8945, which was previously fixed via RHSA-2020:2117. This issue could possibly be used to crash or cause potential code execution in Go applications that use the Go GPGME wrapper library, under certain conditions, during GPG signature verification.
0