Show filters
585 Total Results
Displaying 91-100 of 585
Sort by:
Attacker Value
Unknown
CVE-2022-1521
Disclosure Date: June 24, 2022 (last updated February 24, 2025)
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
0
Attacker Value
Unknown
CVE-2021-26637
Disclosure Date: June 23, 2022 (last updated February 23, 2025)
There is no account authentication and permission check logic in the firmware and existing apps of SiHAS's SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device.
0
Attacker Value
Unknown
CVE-2022-21952
Disclosure Date: June 20, 2022 (last updated February 23, 2025)
A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37.
0
Attacker Value
Unknown
CVE-2022-24562
Disclosure Date: June 16, 2022 (last updated February 23, 2025)
In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.
0
Attacker Value
Unknown
CVE-2021-41418
Disclosure Date: June 15, 2022 (last updated February 23, 2025)
AriaNg v0.1.0~v1.2.2 is affected by an incorrect access control vulnerability through not authenticating visitors' access rights.
0
Attacker Value
Unknown
CVE-2022-32557
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
An issue was discovered in Couchbase Server before 7.0.4. The Index Service does not enforce authentication for TCP/TLS servers.
0
Attacker Value
Unknown
CVE-2022-32157
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.
0
Attacker Value
Unknown
CVE-2022-32251
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). There is a missing authentication verification for a resource used to change the roles and permissions of a user. This could allow an attacker to change the permissions of any user and gain the privileges of an administrative user.
0
Attacker Value
Unknown
CVE-2022-30230
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions.
0
Attacker Value
Unknown
CVE-2022-30229
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to change data of an user, such as credentials, in case that user's id is known.
0