Show filters
1,184 Total Results
Displaying 221-230 of 1,184
Sort by:
Attacker Value
Unknown

CVE-2022-0629

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2021-3773

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.
Attacker Value
Unknown

CVE-2021-3760

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.
Attacker Value
Unknown

CVE-2021-3752

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2021-3578

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
Attacker Value
Unknown

CVE-2021-3781

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2021-3551

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.
Attacker Value
Unknown

CVE-2022-25235

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Attacker Value
Unknown

CVE-2022-21698

Disclosure Date: February 15, 2022 (last updated February 23, 2025)
client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler t…
Attacker Value
Unknown

CVE-2022-0586

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file