Show filters
1,184 Total Results
Displaying 291-300 of 1,184
Sort by:
Attacker Value
Unknown
CVE-2022-24122
Disclosure Date: January 29, 2022 (last updated February 23, 2025)
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.
0
Attacker Value
Unknown
CVE-2022-23598
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory.
0
Attacker Value
Unknown
CVE-2022-0393
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
0
Attacker Value
Unknown
CVE-2022-23990
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
0
Attacker Value
Unknown
CVE-2021-22570
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
0
Attacker Value
Unknown
CVE-2022-23035
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.
0
Attacker Value
Unknown
CVE-2022-23034
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.
0
Attacker Value
Unknown
CVE-2022-23033
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pagetable on Arm (p2m_remove_mapping, guest_physmap_remove_page, and p2m_set_entry with mfn set to INVALID_MFN) do not actually clear the pagetable entry if the entry doesn't have the valid bit set. It is possible to have a valid pagetable entry without the valid bit set when a guest operating system uses set/way cache maintenance instructions. For instance, a guest issuing a set/way cache maintenance instruction, then calling the XENMEM_decrease_reservation hypercall to give back memory pages to Xen, might be able to retain access to those pages even after Xen started reusing them for other purposes.
0
Attacker Value
Unknown
CVE-2021-45343
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document.
0
Attacker Value
Unknown
CVE-2021-45342
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document.
0