CVE-2022-39177
- EPSS 0.06%
- Veröffentlicht 02.09.2022 04:15:11
- Zuletzt bearbeitet 04.11.2025 16:15:51
BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c.
CVE-2022-1184
- EPSS 0.02%
- Veröffentlicht 29.08.2022 15:15:10
- Zuletzt bearbeitet 21.11.2024 06:40:12
A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.
CVE-2021-3975
- EPSS 0.48%
- Veröffentlicht 23.08.2022 20:15:08
- Zuletzt bearbeitet 21.11.2024 06:23:17
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAl...
CVE-2021-3905
- EPSS 0.17%
- Veröffentlicht 23.08.2022 16:15:10
- Zuletzt bearbeitet 21.11.2024 06:22:44
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
CVE-2022-34918
- EPSS 35.44%
- Veröffentlicht 04.07.2022 21:15:07
- Zuletzt bearbeitet 21.11.2024 07:10:26
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacke...
CVE-2022-29581
- EPSS 0.39%
- Veröffentlicht 17.05.2022 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:59:20
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
CVE-2022-1055
- EPSS 0.03%
- Veröffentlicht 29.03.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:39:56
A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4...
CVE-2021-3748
- EPSS 0.04%
- Veröffentlicht 23.03.2022 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:22:19
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious gues...
CVE-2021-3737
- EPSS 0.12%
- Veröffentlicht 04.03.2022 19:15:08
- Zuletzt bearbeitet 17.12.2025 22:15:56
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from...
- EPSS 0.01%
- Veröffentlicht 03.03.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 06:22:03
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with...