- EPSS 41.21%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2022-1343
- EPSS 0.15%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 05.05.2025 17:17:34
The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...
CVE-2022-1434
- EPSS 0.07%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 21.11.2024 06:40:43
The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...
CVE-2022-1473
- EPSS 0.3%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 05.05.2025 17:17:34
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...
CVE-2022-29824
- EPSS 0.07%
- Veröffentlicht 03.05.2022 03:15:06
- Zuletzt bearbeitet 21.11.2024 06:59:45
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte...
CVE-2022-25647
- EPSS 2.08%
- Veröffentlicht 01.05.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:52:30
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
CVE-2022-24891
- EPSS 1.04%
- Veröffentlicht 27.04.2022 21:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:53
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for ...
CVE-2022-23457
- EPSS 0.39%
- Veröffentlicht 25.04.2022 20:15:41
- Zuletzt bearbeitet 03.11.2025 20:15:52
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, the default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat...
CVE-2022-21486
- EPSS 0.33%
- Veröffentlicht 19.04.2022 21:15:18
- Zuletzt bearbeitet 21.11.2024 06:44:48
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows hi...
- EPSS 9.1%
- Veröffentlicht 19.04.2022 21:15:18
- Zuletzt bearbeitet 21.11.2024 06:44:49
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows hi...