Show filters
332 Total Results
Displaying 161-170 of 332
Sort by:
Attacker Value
Unknown
CVE-2022-30670
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
RoboHelp Server earlier versions than RHS 11 Update 3 are affected by an Improper Authorization vulnerability which could lead to privilege escalation. An authenticated attacker could leverage this vulnerability to achieve full administrator privileges. Exploitation of this issue does not require user interaction.
0
Attacker Value
Unknown
CVE-2022-2019
Disclosure Date: June 09, 2022 (last updated February 23, 2025)
A vulnerability classified as critical was found in SourceCodester Prison Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php?f=save of the component New User Creation. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2022-30746
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Missing caller check in Smart Things prior to version 1.7.85.12 allows attacker to access senstive information remotely using javascript interface API.
0
Attacker Value
Unknown
CVE-2022-30730
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Improper authorization in Samsung Pass prior to 1.0.00.33 allows physical attackers to acess account list without authentication.
0
Attacker Value
Unknown
CVE-2022-30722
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Implicit Intent hijacking vulnerability in Samsung Account prior to SMR Jun-2022 Release 1 allows attackers to bypass user confirmation of Samsung Account.
0
Attacker Value
Unknown
CVE-2022-30717
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Improper caller check in AR Emoji prior to SMR Jun-2022 Release 1 allows untrusted applications to use some camera functions via deeplink.
0
Attacker Value
Unknown
CVE-2022-31025
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches. As a workaround, disable invites or increase `min_trust_level_to_allow_invite` to reduce the attack surface to more trusted users.
0
Attacker Value
Unknown
CVE-2022-29236
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4-rc-6, an attacker can circumvent access restrictions for drawing on the whiteboard. The permission check is inadvertently skipped on the server, due to a previously introduced grace period. The attacker must be a meeting participant. The problem has been patched in versions 2.3.18 and 2.4-rc-6. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-29234
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4.1, an attacker could send messages to a locked chat within a grace period of 5s any lock setting in the meeting was changed. The attacker needs to be a participant in the meeting. Versions 2.3.18 and 2.4.1 contain a patch for this issue. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-29233
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. In BigBlueButton starting with 2.2 but before 2.3.18 and 2.4-rc-1, an attacker can circumvent access controls to gain access to all breakout rooms of the meeting they are in. The permission checks rely on knowledge of internal ids rather than on verification of the role of the user. Versions 2.3.18 and 2.4-rc-1 contain a patch for this issue. There are currently no known workarounds.
0