CVE-2021-3629
- EPSS 0.36%
- Veröffentlicht 24.05.2022 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:22:01
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw af...
CVE-2022-22976
- EPSS 0.36%
- Veröffentlicht 19.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:43
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt roun...
CVE-2022-22978
- EPSS 90.41%
- Veröffentlicht 19.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:43
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular ex...
CVE-2022-1586
- EPSS 0.49%
- Veröffentlicht 16.05.2022 21:15:07
- Zuletzt bearbeitet 25.03.2025 19:39:30
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occu...
CVE-2022-1587
- EPSS 0.27%
- Veröffentlicht 16.05.2022 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:41:01
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
CVE-2022-22970
- EPSS 0.16%
- Veröffentlicht 12.05.2022 20:15:15
- Zuletzt bearbeitet 21.11.2024 06:47:42
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model o...
CVE-2022-24823
- EPSS 0.4%
- Veröffentlicht 06.05.2022 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:51:10
Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local in...
CVE-2022-24903
- EPSS 1.07%
- Veröffentlicht 06.05.2022 00:15:07
- Zuletzt bearbeitet 21.11.2024 06:51:21
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vuln...
- EPSS 41.21%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2022-1343
- EPSS 0.15%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 05.05.2025 17:17:34
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...