Search Results (40752 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-35019 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 was discovered to contain a segmentation fault.
CVE-2022-35018 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 was discovered to contain a segmentation fault.
CVE-2022-35017 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 was discovered to contain a heap buffer overflow.
CVE-2022-35016 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 was discovered to contain a heap buffer overflow.
CVE-2022-35015 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 was discovered to contain a heap buffer overflow via le_uint32_read at /lib/endianrw.h.
CVE-2022-35014 2 Advancemame, Fedoraproject 2 Advancecomp, Fedora 2024-11-21 5.5 Medium
Advancecomp v2.3 contains a segmentation fault.
CVE-2022-35011 1 Pngdec Project 1 Pngdec 2024-11-21 8.8 High
PNGDec commit 8abf6be was discovered to contain a global buffer overflow via inflate_fast at /src/inffast.c.
CVE-2022-35003 1 Bitbanksoftware 1 Jpegdec 2024-11-21 7.8 High
JPEGDEC commit be4843c was discovered to contain a global buffer overflow via ucDitherBuffer at /src/jpeg.inl.
CVE-2022-34998 1 Bitbanksoftware 1 Jpegdec 2024-11-21 7.8 High
JPEGDEC commit be4843c was discovered to contain a global buffer overflow via JPEGDecodeMCU at /src/jpeg.inl.
CVE-2022-34970 1 Crowcpp 1 Crow 2024-11-21 9.8 Critical
Crow before 1.0+4 has a heap-based buffer overflow via the function qs_parse in query_string.h. On successful exploitation this vulnerability allows attackers to remotely execute arbitrary code in the context of the vulnerable service.
CVE-2022-34918 5 Canonical, Debian, Linux and 2 more 14 Ubuntu Linux, Debian Linux, Linux Kernel and 11 more 2024-11-21 7.8 High
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
CVE-2022-34889 1 Parallels 1 Parallels Desktop 2024-11-21 8.2 High
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 17.1.1 (51537). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the ACPI virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-16554.
CVE-2022-34886 1 Lenovo 6 G263dns, G263dns Firmware, Gm265dn and 3 more 2024-11-21 8.8 High
A remote code execution vulnerability was found in the firmware used in some Lenovo printers, which can be caused by a remote user pushing an illegal string to the server-side interface via a script, resulting in a stack overflow.
CVE-2022-34874 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 3.3 Low
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.2.53575. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17474.
CVE-2022-34873 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 3.3 Low
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16777.
CVE-2022-34764 1 Schneider-electric 4 Opc Ua Module For M580, Opc Ua Module For M580 Firmware, X80 Advanced Rtu Module and 1 more 2024-11-21 5.9 Medium
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause denial of service when parsing the URL. Affected Products: X80 advanced RTU Communication Module (BMENOR2200H) (V1.0), OPC UA Modicon Communication Module (BMENUA0100) (V1.10 and prior)
CVE-2022-34756 1 Schneider-electric 2 Easergy P5, Easergy P5 Firmware 2024-11-21 8.8 High
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution or the crash of HTTPs stack which is used for the device Web HMI. Affected Products: Easergy P5 (V01.401.102 and prior)
CVE-2022-34749 2 Fedoraproject, Mistune Project 2 Fedora, Mistune 2024-11-21 7.5 High
In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.
CVE-2022-34747 1 Zyxel 2 Nas326, Nas326 Firmware 2024-11-21 9.8 Critical
A format string vulnerability in Zyxel NAS326 firmware versions prior to V5.21(AAZF.12)C0 could allow an attacker to achieve unauthorized remote code execution via a crafted UDP packet.
CVE-2022-34743 1 Huawei 3 Emui, Harmonyos, Magic Ui 2024-11-21 7.5 High
The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability.