CVE-2022-29900
- EPSS 1.41%
- Veröffentlicht 12.07.2022 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:59:55
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
- EPSS 0.07%
- Veröffentlicht 12.07.2022 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:59:56
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve ...
CVE-2022-35414
- EPSS 0.3%
- Veröffentlicht 11.07.2022 02:15:07
- Zuletzt bearbeitet 21.11.2024 07:11:07
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i...
CVE-2022-35410
- EPSS 0.36%
- Veröffentlicht 08.07.2022 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:11:07
mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
- EPSS 1.19%
- Veröffentlicht 07.07.2022 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:13
In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead...
CVE-2022-2048
- EPSS 1.29%
- Veröffentlicht 07.07.2022 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:13
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service s...
CVE-2022-32205
- EPSS 2.59%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:12
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...
CVE-2022-32206
- EPSS 4.55%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
CVE-2022-32207
- EPSS 0.2%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32208
- EPSS 0.17%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.