Show filters
1,184 Total Results
Displaying 211-220 of 1,184
Sort by:
Attacker Value
Unknown

CVE-2020-25719

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
Attacker Value
Unknown

CVE-2020-25717

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
Attacker Value
Unknown

CVE-2016-2124

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Attacker Value
Unknown

CVE-2022-0585

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
Attacker Value
Unknown

CVE-2022-25315

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Attacker Value
Unknown

CVE-2022-25314

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Attacker Value
Unknown

CVE-2022-25313

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
Attacker Value
Unknown

CVE-2021-4120

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Attacker Value
Unknown

CVE-2021-44731

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
Attacker Value
Unknown

CVE-2021-44730

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1