Show filters
93 Total Results
Displaying 31-40 of 93
Sort by:
Attacker Value
Unknown

CVE-2022-23852

Disclosure Date: January 24, 2022 (last updated November 28, 2024)
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
Attacker Value
Unknown

CVE-2022-22827

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2022-22826

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2022-22825

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2022-22824

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2022-22823

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2022-22822

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Attacker Value
Unknown

CVE-2021-46143

Disclosure Date: January 06, 2022 (last updated October 07, 2023)
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
Attacker Value
Unknown

CVE-2021-45960

Disclosure Date: January 01, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
Attacker Value
Unknown

CVE-2021-20135

Disclosure Date: November 03, 2021 (last updated November 28, 2024)
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus).