Show filters
93 Total Results
Displaying 31-40 of 93
Sort by:
Attacker Value
Unknown
CVE-2022-23852
Disclosure Date: January 24, 2022 (last updated November 28, 2024)
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
0
Attacker Value
Unknown
CVE-2022-22827
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2022-22826
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2022-22825
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2022-22824
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2022-22823
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2022-22822
Disclosure Date: January 10, 2022 (last updated October 07, 2023)
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
0
Attacker Value
Unknown
CVE-2021-46143
Disclosure Date: January 06, 2022 (last updated October 07, 2023)
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
0
Attacker Value
Unknown
CVE-2021-45960
Disclosure Date: January 01, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
0
Attacker Value
Unknown
CVE-2021-20135
Disclosure Date: November 03, 2021 (last updated November 28, 2024)
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus).
0