Show filters
4,156 Total Results
Displaying 91-100 of 4,156
Sort by:
Attacker Value
Unknown

CVE-2022-39176

Disclosure Date: September 02, 2022 (last updated November 29, 2024)
BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len.
Attacker Value
Unknown

CVE-2022-1184

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.
Attacker Value
Unknown

CVE-2021-3975

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
Attacker Value
Unknown

CVE-2021-3905

Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Attacker Value
Unknown

CVE-2022-34918

Disclosure Date: July 04, 2022 (last updated February 24, 2025)
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
Attacker Value
Unknown

CVE-2022-29581

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
Attacker Value
Unknown

CVE-2022-1055

Disclosure Date: March 29, 2022 (last updated February 23, 2025)
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
Attacker Value
Unknown

CVE-2021-3748

Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
Attacker Value
Unknown

CVE-2021-3737

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-3640

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.