Show filters
366 Total Results
Displaying 51-60 of 366
Sort by:
Attacker Value
Unknown
CVE-2021-46270
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.
0
Attacker Value
Unknown
CVE-2021-45074
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session.
0
Attacker Value
Unknown
CVE-2022-20762
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges.
0
Attacker Value
Unknown
CVE-2022-0824
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
0
Attacker Value
Unknown
CVE-2021-24688
Disclosure Date: February 28, 2022 (last updated February 23, 2025)
The Orange Form WordPress plugin through 1.0.1 does not have any authorisation and CSRF checks in all of its AJAX calls, for example the or_delete_filed one which is available to both unauthenticated and authenticated users could allow attackers to delete arbitrary posts.The AJAX calls performing actions on posts also do not ensure that the post belong to them (or that they are allowed to perform such action on it)
0
Attacker Value
Unknown
CVE-2021-3967
Disclosure Date: February 26, 2022 (last updated February 23, 2025)
Improper Access Control in GitHub repository zulip/zulip prior to 4.10.
0
Attacker Value
Unknown
CVE-2022-21706
Disclosure Date: February 26, 2022 (last updated February 23, 2025)
Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches _Has the problem been patched? What versions should users upgrade to?_ ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References _Are there any links users can visit to find out more?_ ### For more inf…
0
Attacker Value
Unknown
CVE-2022-0731
Disclosure Date: February 23, 2022 (last updated February 23, 2025)
Improper Access Control (IDOR) in GitHub repository dolibarr/dolibarr prior to 16.0.
0
Attacker Value
Unknown
CVE-2022-0727
Disclosure Date: February 23, 2022 (last updated February 23, 2025)
Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.
0
Attacker Value
Unknown
CVE-2021-42855
Disclosure Date: February 23, 2022 (last updated February 23, 2025)
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the ".debug_command.config" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the "/api/appInternals/1.0/agent/configuration" API to map the corresponding ID to a command to be executed.
0