Show filters
1,936 Total Results
Displaying 81-90 of 1,936
Sort by:
Attacker Value
Unknown

CVE-2021-3669

Disclosure Date: August 26, 2022 (last updated October 08, 2023)
A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
Attacker Value
Unknown

CVE-2021-35937

Disclosure Date: August 25, 2022 (last updated November 08, 2023)
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2021-4217

Disclosure Date: August 24, 2022 (last updated October 08, 2023)
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Attacker Value
Unknown

CVE-2021-3714

Disclosure Date: August 23, 2022 (last updated February 02, 2024)
A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged.
Attacker Value
Unknown

CVE-2022-2873

Disclosure Date: August 22, 2022 (last updated October 08, 2023)
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
Attacker Value
Unknown

CVE-2022-2625

Disclosure Date: August 18, 2022 (last updated November 29, 2024)
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
Attacker Value
Unknown

CVE-2020-14394

Disclosure Date: August 17, 2022 (last updated October 08, 2023)
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
Attacker Value
Unknown

CVE-2022-2393

Disclosure Date: July 14, 2022 (last updated October 07, 2023)
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
Attacker Value
Unknown

CVE-2022-32547

Disclosure Date: June 16, 2022 (last updated October 07, 2023)
In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.
Attacker Value
Unknown

CVE-2022-32546

Disclosure Date: June 16, 2022 (last updated October 07, 2023)
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.