Show filters
192 Total Results
Displaying 71-80 of 192
Sort by:
Attacker Value
Unknown

CVE-2022-25648

Disclosure Date: April 19, 2022 (last updated February 23, 2025)
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Attacker Value
Unknown

CVE-2022-0983

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
Attacker Value
Unknown

CVE-2022-27191

Disclosure Date: March 18, 2022 (last updated November 08, 2023)
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
Attacker Value
Unknown

CVE-2022-0725

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.
Attacker Value
Unknown

CVE-2021-3733

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
Attacker Value
Unknown

CVE-2022-0546

Disclosure Date: February 24, 2022 (last updated February 23, 2025)
A missing bounds check in the image loader used in Blender 3.x and 2.93.8 leads to out-of-bounds heap access, allowing an attacker to cause denial of service, memory corruption or potentially code execution.
Attacker Value
Unknown

CVE-2022-21698

Disclosure Date: February 15, 2022 (last updated February 23, 2025)
client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler t…
Attacker Value
Unknown

CVE-2022-0571

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.
Attacker Value
Unknown

CVE-2022-22766

Disclosure Date: February 12, 2022 (last updated February 23, 2025)
Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.
Attacker Value
Unknown

CVE-2021-45079

Disclosure Date: January 31, 2022 (last updated February 23, 2025)
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.