Show filters
486 Total Results
Displaying 81-90 of 486
Sort by:
Attacker Value
Unknown

CVE-2022-23943

Disclosure Date: March 14, 2022 (last updated November 08, 2023)
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
Attacker Value
Unknown

CVE-2022-21716

Disclosure Date: March 03, 2022 (last updated November 29, 2024)
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-25315

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Attacker Value
Unknown

CVE-2022-25314

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Attacker Value
Unknown

CVE-2022-25313

Disclosure Date: February 18, 2022 (last updated October 07, 2023)
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
Attacker Value
Unknown

CVE-2022-25236

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
Attacker Value
Unknown

CVE-2022-25235

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Attacker Value
Unknown

CVE-2022-0391

Disclosure Date: February 09, 2022 (last updated November 08, 2023)
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
Attacker Value
Unknown

CVE-2022-21375

Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
0
Attacker Value
Unknown

CVE-2022-21271

Disclosure Date: January 19, 2022 (last updated November 28, 2024)
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplie…
0