Show filters
268 Total Results
Displaying 81-90 of 268
Sort by:
Attacker Value
Unknown
CVE-2021-3998
Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
0
Attacker Value
Unknown
CVE-2021-3999
Disclosure Date: August 24, 2022 (last updated November 29, 2024)
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-2938
Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
0
Attacker Value
Unknown
CVE-2022-2873
Disclosure Date: August 22, 2022 (last updated October 08, 2023)
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
0
Attacker Value
Unknown
CVE-2022-1973
Disclosure Date: August 05, 2022 (last updated November 29, 2024)
A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.
0
Attacker Value
Unknown
CVE-2022-37434
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
0
Attacker Value
Unknown
CVE-2022-36123
Disclosure Date: July 29, 2022 (last updated October 08, 2023)
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.
0
Attacker Value
Unknown
CVE-2022-36879
Disclosure Date: July 27, 2022 (last updated February 24, 2025)
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
0
Attacker Value
Unknown
CVE-2022-1671
Disclosure Date: July 26, 2022 (last updated February 24, 2025)
A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.
0
Attacker Value
Unknown
CVE-2022-31160
Disclosure Date: July 20, 2022 (last updated February 24, 2025)
jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.
0