DE EN FR
hlukh.ch Stand: 2026-02-25T21:01:10.471Z · week: 2022-W28

Sicherheitswarnungen

Kuratiert aus öffentlich verfügbaren Advisories. Fokus: Sichtbarkeit, Einordnung und schneller Export – ohne Clickbait.

Neueste Warnungen
CVE-2022-2058
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2058
MSRC 2026‑02‑21 Mittel
CVE-2022-1852
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-1852
MSRC 2026‑02‑21 Mittel
CVE-2022-2056
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2056
MSRC 2026‑02‑21 Mittel
CVE-2022-2206
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2206
MSRC 2026‑02‑21 Hoch
CVE-2022-2207
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2207
MSRC 2026‑02‑21 Hoch
CVE-2022-2057
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2057
MSRC 2026‑02‑21 Mittel
CVE-2022-2078
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2078
MSRC 2026‑02‑21 Mittel
CVE-2022-2257
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2257
MSRC 2026‑02‑21 Hoch
CVE-2022-2208
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2208
MSRC 2026‑02‑21 Mittel
CVE-2022-2210
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-2210
MSRC 2026‑02‑21 Hoch
CVE-2022-34495
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-34495
MSRC 2026‑02‑21 Mittel
CVE-2022-34494
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-34494
MSRC 2026‑02‑21 Mittel
CVE-2021-3695
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.
2026‑02‑21 · CVE-2021-3695
MSRC 2026‑02‑21 Mittel
CVE-2021-3697
A crafted JPEG image may lead the JPEG reader to underflow its data pointer allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
2026‑02‑21 · CVE-2021-3697
MSRC 2026‑02‑21 Hoch
CVE-2022-0670
A flaw was found in Openstack manilla owning a Ceph File system "share" which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.
2026‑02‑21 · CVE-2022-0670
MSRC 2026‑02‑21 Kritisch
CVE-2021-3696
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
2026‑02‑21 · CVE-2021-3696
MSRC 2026‑02‑21 Mittel
CVE-2022-32205
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl &lt; 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this or other servers to which the cookies match create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept match and haven't expired. Due to cookie matching rules a server on `foo.example.com` can set cookies that also would match for `bar.example.com` making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.
2026‑02‑21 · CVE-2022-32205
MSRC 2026‑02‑21 Mittel
CVE-2022-1651
A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information causing a denial of service.
2026‑02‑21 · CVE-2022-1651
MSRC 2026‑02‑21 Hoch
CVE-2021-4135
A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.
2026‑02‑21 · CVE-2021-4135
MSRC 2026‑02‑21 Mittel
CVE-2022-2476
A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING
2026‑02‑21 · CVE-2022-2476
MSRC 2026‑02‑21 Mittel
CVE-2022-1671
A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.
2026‑02‑21 · CVE-2022-1671
MSRC 2026‑02‑21 Hoch
CVE-2022-32212
A OS Command Injection vulnerability exists in Node.js versions &lt;14.20.0 &lt;16.20.0 &lt;18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
2026‑02‑21 · CVE-2022-32212
MSRC 2026‑02‑21 Hoch
CVE-2022-34526
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
2026‑02‑21 · CVE-2022-34526
MSRC 2026‑02‑21 Mittel
CVE-2022-30215
Active Directory Federation Services Elevation of Privilege Vulnerability
2026‑02‑21 · CVE-2022-30215
MSRC 2026‑02‑21 Hoch
CVE-2022-2097
AES OCB fails to encrypt some bytes
2026‑02‑21 · CVE-2022-2097
MSRC 2026‑02‑21 Mittel
CVE-2022-33099
An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
2026‑02‑21 · CVE-2022-33099
MSRC 2026‑02‑21 Hoch
CVE-2022-35409
An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up to 571 bytes with a custom cookie check function.
2026‑02‑21 · CVE-2022-35409
MSRC 2026‑02‑21 Kritisch
CVE-2021-33450
An issue was discovered in NASM version 2.16rc0. There are memory leaks in nasm_calloc() in nasmlib/alloc.c.
2026‑02‑21 · CVE-2021-33450
MSRC 2026‑02‑21 Mittel
CVE-2021-33452
An issue was discovered in NASM version 2.16rc0. There are memory leaks in nasm_malloc() in nasmlib/alloc.c.
2026‑02‑21 · CVE-2021-33452
MSRC 2026‑02‑21 Mittel
CVE-2022-30550
An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.
2026‑02‑21 · CVE-2022-30550
MSRC 2026‑02‑21 Hoch
CVE-2022-36879
An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
2026‑02‑21 · CVE-2022-36879
MSRC 2026‑02‑21 Mittel
CVE-2022-34918
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges a different vulnerability than CVE-2022-32250. (The attacker can obtain root access but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
2026‑02‑21 · CVE-2022-34918
MSRC 2026‑02‑21 Hoch
CVE-2021-33464
An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33464
MSRC 2026‑02‑21 Mittel
CVE-2021-33455
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33455
MSRC 2026‑02‑21 Mittel
CVE-2021-33457
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33457
MSRC 2026‑02‑21 Mittel
CVE-2021-33465
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmacro() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33465
MSRC 2026‑02‑21 Mittel
CVE-2021-33466
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_smacro() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33466
MSRC 2026‑02‑21 Mittel
CVE-2021-33460
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33460
MSRC 2026‑02‑21 Mittel
CVE-2021-33459
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c.
2026‑02‑21 · CVE-2021-33459
MSRC 2026‑02‑21 Mittel
CVE-2021-33463
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr__copy_except() in libyasm/expr.c.
2026‑02‑21 · CVE-2021-33463
MSRC 2026‑02‑21 Mittel
CVE-2021-33454
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr_get_intnum() in libyasm/expr.c.
2026‑02‑21 · CVE-2021-33454
MSRC 2026‑02‑21 Mittel
CVE-2021-33468
An issue was discovered in yasm version 1.3.0. There is a use-after-free in error() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33468
MSRC 2026‑02‑21 Mittel
CVE-2021-33462
An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c.
2026‑02‑21 · CVE-2021-33462
MSRC 2026‑02‑21 Mittel
CVE-2021-33467
An issue was discovered in yasm version 1.3.0. There is a use-after-free in pp_getline() in modules/preprocs/nasm/nasm-pp.c.
2026‑02‑21 · CVE-2021-33467
MSRC 2026‑02‑21 Mittel
CVE-2021-33461
An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c.
2026‑02‑21 · CVE-2021-33461
MSRC 2026‑02‑21 Mittel
CVE-2022-34169
Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets
2026‑02‑21 · CVE-2022-34169
MSRC 2026‑02‑21 Hoch
CVE-2022-33744
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held resulting in a small race window which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0 e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.
2026‑02‑21 · CVE-2022-33744
MSRC 2026‑02‑21 Mittel
CVE-2022-35798
Azure Arc Jumpstart Information Disclosure Vulnerability
2026‑02‑21 · CVE-2022-35798
MSRC 2026‑02‑21 Niedrig
CVE-2022-33641
Azure Site Recovery Elevation of Privilege Vulnerability
2026‑02‑21 · CVE-2022-33641
MSRC 2026‑02‑21 Mittel
CVE-2022-33642
Azure Site Recovery Elevation of Privilege Vulnerability
2026‑02‑21 · CVE-2022-33642
MSRC 2026‑02‑21 Mittel
Seite 1