Show filters
1,184 Total Results
Displaying 321-330 of 1,184
Sort by:
Attacker Value
Unknown
CVE-2022-21673
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.
0
Attacker Value
Unknown
CVE-2022-0238
Disclosure Date: January 16, 2022 (last updated February 23, 2025)
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
0
Attacker Value
Unknown
CVE-2022-23094
Disclosure Date: January 15, 2022 (last updated February 23, 2025)
Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.
0
Attacker Value
Unknown
CVE-2022-23222
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
0
Attacker Value
Unknown
CVE-2022-0197
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
0
Attacker Value
Unknown
CVE-2022-0196
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
0
Attacker Value
Unknown
CVE-2021-44648
Disclosure Date: January 12, 2022 (last updated February 23, 2025)
GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals to 12.
0
Attacker Value
Unknown
CVE-2022-0173
Disclosure Date: January 11, 2022 (last updated February 23, 2025)
radare2 is vulnerable to Out-of-bounds Read
0
Attacker Value
Unknown
CVE-2021-44647
Disclosure Date: January 11, 2022 (last updated February 23, 2025)
Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.
0
Attacker Value
Unknown
CVE-2022-21668
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by t…
0