Show filters
815 Total Results
Displaying 481-490 of 815
Sort by:
Attacker Value
Unknown

CVE-2022-24826

Disclosure Date: April 20, 2022 (last updated October 07, 2023)
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended progr…
Attacker Value
Unknown

CVE-2022-1058

Disclosure Date: March 24, 2022 (last updated October 07, 2023)
Open Redirect on login in GitHub repository go-gitea/gitea prior to 1.16.5.
Attacker Value
Unknown

CVE-2022-24766

Disclosure Date: March 21, 2022 (last updated October 07, 2023)
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless mitmproxy is used to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 8.0.0 and above. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-0742

Disclosure Date: March 18, 2022 (last updated October 07, 2023)
Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
Attacker Value
Unknown

CVE-2022-27191

Disclosure Date: March 18, 2022 (last updated November 08, 2023)
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
Attacker Value
Unknown

CVE-2021-42219

Disclosure Date: March 17, 2022 (last updated October 07, 2023)
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
Attacker Value
Unknown

CVE-2022-0905

Disclosure Date: March 10, 2022 (last updated October 07, 2023)
Missing Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.
Attacker Value
Unknown

CVE-2022-26496

Disclosure Date: March 06, 2022 (last updated October 07, 2023)
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Attacker Value
Unknown

CVE-2022-26495

Disclosure Date: March 06, 2022 (last updated October 07, 2023)
In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.
Attacker Value
Unknown

CVE-2022-24921

Disclosure Date: March 05, 2022 (last updated November 29, 2024)
regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.