Show filters
490 Total Results
Displaying 51-60 of 490
Sort by:
Attacker Value
Unknown

CVE-2022-34169

Disclosure Date: July 19, 2022 (last updated January 18, 2024)
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Attacker Value
Unknown

CVE-2022-30184

Disclosure Date: June 15, 2022 (last updated November 29, 2024)
.NET and Visual Studio Information Disclosure Vulnerability
0
Attacker Value
Unknown

CVE-2022-30767

Disclosure Date: May 16, 2022 (last updated November 08, 2023)
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
Attacker Value
Unknown

CVE-2022-28919

Disclosure Date: May 12, 2022 (last updated October 07, 2023)
HTMLCreator release_stable_2020-07-29 was discovered to contain a cross-site scripting (XSS) vulnerability via the function _generateFilename.
Attacker Value
Unknown

CVE-2022-29145

Disclosure Date: May 10, 2022 (last updated November 29, 2024)
.NET and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown

CVE-2022-29117

Disclosure Date: May 10, 2022 (last updated November 29, 2024)
.NET and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown

CVE-2022-23267

Disclosure Date: May 10, 2022 (last updated November 29, 2024)
.NET and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown

CVE-2022-1055

Disclosure Date: March 29, 2022 (last updated May 21, 2024)
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Attacker Value
Unknown

CVE-2021-3748

Disclosure Date: March 23, 2022 (last updated November 29, 2024)
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
Attacker Value
Unknown

CVE-2021-25220

Disclosure Date: March 16, 2022 (last updated November 29, 2024)
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
0