Show filters
222 Total Results
Displaying 91-100 of 222
Sort by:
Attacker Value
Unknown
CVE-2021-39300
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-39299
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-39297
Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-0145
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2021-43859
Disclosure Date: February 01, 2022 (last updated February 23, 2025)
XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
0
Attacker Value
Unknown
CVE-2021-4083
Disclosure Date: January 18, 2022 (last updated February 23, 2025)
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
0
Attacker Value
Unknown
CVE-2022-23218
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
0
Attacker Value
Unknown
CVE-2022-23219
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
0
Attacker Value
Unknown
CVE-2021-22569
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
0
Attacker Value
Unknown
CVE-2021-45485
Disclosure Date: December 25, 2021 (last updated February 23, 2025)
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
0