Neueste Warnungen
| CVE-2022-23267 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-29117 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-29145 |
.NET and Visual Studio Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30130 |
.NET Framework Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Niedrig |
| CVE-2022-1195 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-1353 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1227 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1015 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-1048 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-21484 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Niedrig |
| CVE-2022-21451 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-24735 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-21486 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Niedrig |
| CVE-2022-21483 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-21479 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-21482 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-21485 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Niedrig |
| CVE-2022-21478 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-24736 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-29869 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-27405 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-29582 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-24769 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-27239 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30789 |
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30788 |
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30786 |
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate in NTFS-3G through 2021.8.22.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30784 |
A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2021-3750 |
A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service condition or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30785 |
A file handle created in fuse_lib_opendir and later used in fuse_lib_readdir enables arbitrary memory read and write operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-1734 |
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1215 |
A format string vulnerability was found in libinput
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-26691 |
A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina macOS Monterey 12.3 macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2021-3611 |
A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-1786 |
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1882 |
A use-after-free flaw was found in the Linux kernel’s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30065 |
A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1348 |
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist it is created with world-readable permission allowing an unprivileged user to lock the state file stopping any rotation. This flaw affects logrotate versions before 3.20.0.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-26923 |
Active Directory Domain Services Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-22576 |
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S) IMAP(S) POP3(S) and LDAP(S) (openldap only).
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-30787 |
An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-30783 |
An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel in NTFS-3G through 2021.8.22 when using libfuse-lite.
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-28948 |
An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-29968 |
An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1586 |
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2022-1587 |
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2022-29127 |
BitLocker Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2022-1629 |
Buffer Over-read in function find_next_quote in vim/vim
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-1769 |
Buffer Over-read in vim/vim
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2022-24903 |
Buffer overflow in TCP syslog server (receiver) components in rsyslog
|
MSRC | 2026‑02‑21 | Hoch |
Seite 1