# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-30598 |
|
|
|
2022-05-18 |
2022-06-13 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
A flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it. |
2 |
CVE-2022-29824 |
190 |
|
Overflow |
2022-05-03 |
2022-06-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. |
3 |
CVE-2022-28390 |
415 |
|
|
2022-04-03 |
2022-06-16 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free. |
4 |
CVE-2022-28389 |
415 |
|
|
2022-04-03 |
2022-06-16 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. |
5 |
CVE-2022-28388 |
415 |
|
|
2022-04-03 |
2022-06-01 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. |
6 |
CVE-2022-28041 |
190 |
|
DoS Overflow |
2022-04-15 |
2022-05-10 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
stb_image.h v2.27 was discovered to contain an integer overflow via the function stbi__jpeg_decode_block_prog_dc. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. |
7 |
CVE-2022-27920 |
79 |
|
XSS |
2022-03-25 |
2022-04-08 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
libkiwix 10.0.0 and 10.0.1 allows XSS in the built-in webserver functionality via the search suggestions URL parameter. This is fixed in 10.1.0. |
8 |
CVE-2022-27666 |
787 |
|
Overflow |
2022-03-23 |
2022-05-10 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat. |
9 |
CVE-2022-27652 |
276 |
|
|
2022-04-18 |
2022-04-27 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. |
10 |
CVE-2022-27651 |
276 |
|
|
2022-04-04 |
2022-05-07 |
4.9 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
None |
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity. |
11 |
CVE-2022-27191 |
327 |
|
|
2022-03-18 |
2022-05-14 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey. |
12 |
CVE-2022-26490 |
120 |
|
Overflow |
2022-03-06 |
2022-06-03 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters. |
13 |
CVE-2022-26361 |
|
|
Mem. Corr. |
2022-04-05 |
2022-06-16 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption. |
14 |
CVE-2022-26360 |
|
|
Mem. Corr. |
2022-04-05 |
2022-06-16 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption. |
15 |
CVE-2022-25601 |
79 |
|
XSS |
2022-03-11 |
2022-04-19 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Reflected Cross-Site Scripting (XSS) vulnerability affecting parameter &tab discovered in Contact Form X WordPress plugin (versions <= 2.4). |
16 |
CVE-2022-25313 |
400 |
|
|
2022-02-18 |
2022-06-14 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element. |
17 |
CVE-2022-25258 |
476 |
|
Mem. Corr. |
2022-02-16 |
2022-05-11 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur. |
18 |
CVE-2022-24958 |
763 |
|
|
2022-02-11 |
2022-04-01 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. |
19 |
CVE-2022-24769 |
732 |
|
+Priv |
2022-03-24 |
2022-06-13 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting. |
20 |
CVE-2022-24737 |
200 |
|
+Info |
2022-03-07 |
2022-05-01 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds. |
21 |
CVE-2022-24302 |
362 |
|
|
2022-03-17 |
2022-05-23 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. |
22 |
CVE-2022-24191 |
835 |
|
Overflow |
2022-04-04 |
2022-05-13 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow. |
23 |
CVE-2022-23598 |
79 |
|
XSS |
2022-01-28 |
2022-03-25 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch to mitigate the vulnerability. A workaround is available. One may manually place code at the top of a view script where one calls the `formElementErrors()` view helper. More information about this workaround is available on the GitHub Security Advisory. |
24 |
CVE-2022-23308 |
416 |
|
|
2022-02-26 |
2022-06-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. |
25 |
CVE-2022-23035 |
459 |
|
|
2022-01-25 |
2022-04-19 |
4.7 |
None |
Local |
Medium |
Not required |
None |
None |
Complete |
Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid. |
26 |
CVE-2022-23033 |
863 |
|
|
2022-01-25 |
2022-04-19 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pagetable on Arm (p2m_remove_mapping, guest_physmap_remove_page, and p2m_set_entry with mfn set to INVALID_MFN) do not actually clear the pagetable entry if the entry doesn't have the valid bit set. It is possible to have a valid pagetable entry without the valid bit set when a guest operating system uses set/way cache maintenance instructions. For instance, a guest issuing a set/way cache maintenance instruction, then calling the XENMEM_decrease_reservation hypercall to give back memory pages to Xen, might be able to retain access to those pages even after Xen started reusing them for other purposes. |
27 |
CVE-2022-22818 |
79 |
|
XSS |
2022-02-03 |
2022-02-22 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. |
28 |
CVE-2022-21986 |
|
|
DoS |
2022-02-09 |
2022-04-01 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
.NET Denial of Service Vulnerability. |
29 |
CVE-2022-21699 |
250 |
|
Exec Code |
2022-01-19 |
2022-03-25 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade. |
30 |
CVE-2022-21682 |
22 |
|
Dir. Trav. |
2022-01-13 |
2022-02-10 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror-screenshots-url` is specified, then flatpak-builder will launch `flatpak build --nofilesystem=host appstream-utils mirror-screenshots` after finalization, which can lead to issues even with the `--nofilesystem=host` protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the `appstream-util` binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of `--nofilesystem=home` and `--nofilesystem=host`. |
31 |
CVE-2022-21339 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). |
32 |
CVE-2022-21304 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). |
33 |
CVE-2022-21303 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). |
34 |
CVE-2022-21270 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). |
35 |
CVE-2022-21264 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). |
36 |
CVE-2022-21249 |
|
|
DoS |
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). |
37 |
CVE-2022-21248 |
|
|
|
2022-01-19 |
2022-05-13 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). |
38 |
CVE-2022-21245 |
|
|
|
2022-01-19 |
2022-04-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). |
39 |
CVE-2022-1769 |
125 |
|
|
2022-05-17 |
2022-05-26 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974. |
40 |
CVE-2022-1733 |
787 |
|
Overflow |
2022-05-17 |
2022-05-26 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968. |
41 |
CVE-2022-1674 |
476 |
|
DoS |
2022-05-12 |
2022-05-23 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input. |
42 |
CVE-2022-1420 |
119 |
|
Overflow |
2022-04-21 |
2022-04-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774. |
43 |
CVE-2022-1348 |
732 |
|
|
2022-05-25 |
2022-06-12 |
4.0 |
None |
Remote |
Low |
??? |
None |
None |
Partial |
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0. |
44 |
CVE-2022-1231 |
79 |
|
Exec Code XSS |
2022-04-15 |
2022-05-13 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web based projects (like the Confluence plugin, etc. see https://plantuml.com/de/running). |
45 |
CVE-2022-1122 |
824 |
|
DoS |
2022-03-29 |
2022-06-16 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service. |
46 |
CVE-2022-1055 |
416 |
|
+Priv |
2022-03-29 |
2022-06-03 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 |
47 |
CVE-2022-1015 |
787 |
|
|
2022-04-29 |
2022-05-11 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue. |
48 |
CVE-2022-1011 |
416 |
|
+Priv |
2022-03-18 |
2022-04-29 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. |
49 |
CVE-2022-0984 |
863 |
|
|
2022-04-29 |
2022-05-10 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges. |
50 |
CVE-2022-0943 |
122 |
|
Overflow |
2022-03-14 |
2022-06-20 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. |