Show filters
482 Total Results
Displaying 271-280 of 482
Sort by:
Attacker Value
Unknown

CVE-2022-39329

Disclosure Date: October 27, 2022 (last updated February 24, 2025)
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 23.0.9 and 24.0.5 are vulnerable to exposure of information that cannot be controlled by administrators without direct database access. Versions 23.0.9 and 24.0.5 contains patches for this issue. No known workarounds are available.
Attacker Value
Unknown

CVE-2022-39342

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue.
Attacker Value
Unknown

CVE-2022-39341

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users who have wildcard (`*`) defined on tupleset relations in their authorization model are vulnerable. Version 0.2.4 contains a patch for this issue.
Attacker Value
Unknown

CVE-2022-39340

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
OpenFGA is an authorization/permission engine. Prior to version 0.2.4, the `streamed-list-objects` endpoint was not validating the authorization header, resulting in disclosure of objects in the store. Users `openfga/openfga` versions 0.2.3 and prior who are exposing the OpenFGA service to the internet are vulnerable. Version 0.2.4 contains a patch for this issue.
Attacker Value
Unknown

CVE-2022-39322

Disclosure Date: October 25, 2022 (last updated February 24, 2025)
@keystone-6/core is a core package for Keystone 6, a content management system for Node.js. Starting with version 2.2.0 and prior to version 2.3.1, users who expected their `multiselect` fields to use the field-level access control - if configured - are vulnerable to their field-level access control not being used. List-level access control is not affected. Field-level access control for fields other than `multiselect` are not affected. Version 2.3.1 contains a fix for this issue. As a workaround, stop using the `multiselect` field.
Attacker Value
Unknown

CVE-2022-39873

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Improper authorization vulnerability in Samsung Internet prior to version 18.0.4.14 allows physical attackers to add bookmarks in secret mode without user authentication.
Attacker Value
Unknown

CVE-2022-39862

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Improper authorization in Dynamic Lockscreen prior to SMR Sep-2022 Release 1 in Android R(11) and 3.3.03.66 in Android S(12) allows unauthorized use of javascript interface api.
Attacker Value
Unknown

CVE-2022-32170

Disclosure Date: September 28, 2022 (last updated February 24, 2025)
The “Bytebase” application does not restrict low privilege user to access admin “projects“ for which an unauthorized user can view the “projects“ created by “Admin” and the affected endpoint is “/api/project?user=${userId}”.
0
Attacker Value
Unknown

CVE-2022-32169

Disclosure Date: September 28, 2022 (last updated February 24, 2025)
The “Bytebase” application does not restrict low privilege user to access “admin issues“ for which an unauthorized user can view the “OPEN” and “CLOSED” issues by “Admin” and the affected endpoint is “/issue”.
0
Attacker Value
Unknown

CVE-2022-34434

Disclosure Date: September 15, 2022 (last updated February 24, 2025)
Cloud Mobility for Dell Storage versions 1.3.0 and earlier contains an Improper Access Control vulnerability within the Postgres database. A threat actor with root level access to either the vApp or containerized versions of Cloud Mobility may potentially exploit this vulnerability, leading to the modification or deletion of tables that are required for many of the core functionalities of Cloud Mobility. Exploitation may lead to the compromise of integrity and availability of the normal functionality of the Cloud Mobility application.