Show filters
603 Total Results
Displaying 211-220 of 603
Sort by:
Attacker Value
Unknown

CVE-2022-21426

Disclosure Date: April 19, 2022 (last updated November 29, 2024)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web serv…
0
Attacker Value
Unknown

CVE-2022-28893

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.
Attacker Value
Unknown

CVE-2022-28796

Disclosure Date: April 08, 2022 (last updated February 23, 2025)
jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.
Attacker Value
Unknown

CVE-2021-4203

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
Attacker Value
Unknown

CVE-2022-26104

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
SAP Financial Consolidation - version 10.1, does not perform necessary authorization checks for updating homepage messages, resulting for an unauthorized user to alter the maintenance system message.
Attacker Value
Unknown

CVE-2021-3733

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
Attacker Value
Unknown

CVE-2022-0492

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
Attacker Value
Unknown

CVE-2021-3772

Disclosure Date: March 02, 2022 (last updated February 23, 2025)
A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.
Attacker Value
Unknown

CVE-2022-23308

Disclosure Date: February 26, 2022 (last updated February 23, 2025)
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
Attacker Value
Unknown

CVE-2020-36516

Disclosure Date: February 26, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.