Show filters
1,213 Total Results
Displaying 211-220 of 1,213
Sort by:
Attacker Value
Unknown

CVE-2022-40315

Disclosure Date: September 30, 2022 (last updated February 24, 2025)
A limited SQL injection risk was identified in the "browse list of users" site administration page.
Attacker Value
Unknown

CVE-2022-40313

Disclosure Date: September 30, 2022 (last updated February 24, 2025)
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
Attacker Value
Unknown

CVE-2014-0148

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
Attacker Value
Unknown

CVE-2014-0147

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Attacker Value
Unknown

CVE-2014-0144

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
Attacker Value
Unknown

CVE-2022-3213

Disclosure Date: September 19, 2022 (last updated February 24, 2025)
A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.
Attacker Value
Unknown

CVE-2022-2989

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Attacker Value
Unknown

CVE-2020-10735

Disclosure Date: September 09, 2022 (last updated February 24, 2025)
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2022-2739

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-14370, which was previously fixed via RHSA-2020:5056. This issue could possibly allow an attacker to gain access to sensitive information stored in environment variables.
Attacker Value
Unknown

CVE-2022-2738

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-8945, which was previously fixed via RHSA-2020:2117. This issue could possibly be used to crash or cause potential code execution in Go applications that use the Go GPGME wrapper library, under certain conditions, during GPG signature verification.