Show filters
352 Total Results
Displaying 71-80 of 352
Sort by:
Attacker Value
Unknown
CVE-2021-4083
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
0
Attacker Value
Unknown
CVE-2022-23219
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
0
Attacker Value
Unknown
CVE-2022-20616
Disclosure Date: January 12, 2022 (last updated February 23, 2025)
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.
0
Attacker Value
Unknown
CVE-2019-25055
Disclosure Date: December 27, 2021 (last updated October 07, 2023)
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary.
0
Attacker Value
Unknown
CVE-2018-25028
Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_context can cause a use-after-free.
0
Attacker Value
Unknown
CVE-2018-25027
Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_format_info can cause a use-after-free.
0
Attacker Value
Unknown
CVE-2021-45486
Disclosure Date: December 25, 2021 (last updated February 23, 2025)
In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.
0
Attacker Value
Unknown
CVE-2021-45485
Disclosure Date: December 25, 2021 (last updated February 23, 2025)
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
0
Attacker Value
Unknown
CVE-2021-43818
Disclosure Date: December 13, 2021 (last updated February 23, 2025)
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available.
0
Attacker Value
Unknown
CVE-2021-43797
Disclosure Date: December 09, 2021 (last updated February 23, 2025)
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. Netty prior to version 4.1.71.Final skips control chars when they are present at the beginning / end of the header name. It should instead fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore, and therefore does not do the validation itself. Users should upgrade to version 4.1.71.Final.
0