Show filters
164 Total Results
Displaying 31-40 of 164
Sort by:
Attacker Value
Unknown

CVE-2022-1354

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
Attacker Value
Unknown

CVE-2022-1355

Disclosure Date: August 31, 2022 (last updated November 29, 2024)
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
Attacker Value
Unknown

CVE-2022-39046

Disclosure Date: August 31, 2022 (last updated November 07, 2023)
An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.
Attacker Value
Unknown

CVE-2022-2953

Disclosure Date: August 29, 2022 (last updated November 29, 2024)
LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
Attacker Value
Unknown

CVE-2021-4214

Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.
Attacker Value
Unknown

CVE-2021-3998

Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
Attacker Value
Unknown

CVE-2021-4189

Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
Attacker Value
Unknown

CVE-2021-3999

Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
Attacker Value
Unknown

CVE-2021-3975

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
Attacker Value
Unknown

CVE-2022-37434

Disclosure Date: August 05, 2022 (last updated November 29, 2024)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).