Show filters
1,213 Total Results
Displaying 241-250 of 1,213
Sort by:
Attacker Value
Unknown
CVE-2022-2625
Disclosure Date: August 18, 2022 (last updated February 24, 2025)
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
0
Attacker Value
Unknown
CVE-2020-14394
Disclosure Date: August 17, 2022 (last updated February 24, 2025)
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2022-2719
Disclosure Date: August 10, 2022 (last updated February 24, 2025)
In ImageMagick, a crafted file could trigger an assertion failure when a call to WriteImages was made in MagickWand/operation.c, due to a NULL image list. This could potentially cause a denial of service. This was fixed in upstream ImageMagick version 7.1.0-30.
0
Attacker Value
Unknown
CVE-2022-1158
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
0
Attacker Value
Unknown
CVE-2022-2509
Disclosure Date: August 01, 2022 (last updated February 24, 2025)
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
0
Attacker Value
Unknown
CVE-2022-2163
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Use after free in Cast UI and Toolbar in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via UI interaction.
0
Attacker Value
Unknown
CVE-2022-2296
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 103.0.5060.114 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via direct UI interactions.
0
Attacker Value
Unknown
CVE-2022-2295
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Type confusion in V8 in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2022-2158
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Type confusion in V8 in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2022-35653
Disclosure Date: July 25, 2022 (last updated February 24, 2025)
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.
0