Show filters
433 Total Results
Displaying 41-50 of 433
Sort by:
Attacker Value
Unknown

CVE-2022-41222

Disclosure Date: September 21, 2022 (last updated November 29, 2024)
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
Attacker Value
Unknown

CVE-2022-39177

Disclosure Date: September 02, 2022 (last updated November 29, 2024)
BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c.
Attacker Value
Unknown

CVE-2022-39176

Disclosure Date: September 02, 2022 (last updated November 29, 2024)
BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len.
Attacker Value
Unknown

CVE-2022-1184

Disclosure Date: August 29, 2022 (last updated December 21, 2023)
A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.
Attacker Value
Unknown

CVE-2022-34918

Disclosure Date: July 04, 2022 (last updated November 08, 2023)
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
Attacker Value
Unknown

CVE-2022-29581

Disclosure Date: May 17, 2022 (last updated October 07, 2023)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
Attacker Value
Unknown

CVE-2022-1055

Disclosure Date: March 29, 2022 (last updated May 21, 2024)
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Attacker Value
Unknown

CVE-2021-3748

Disclosure Date: March 23, 2022 (last updated November 29, 2024)
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
Attacker Value
Unknown

CVE-2021-3737

Disclosure Date: March 04, 2022 (last updated October 07, 2023)
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-3640

Disclosure Date: March 03, 2022 (last updated October 07, 2023)
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.