Show filters
608 Total Results
Displaying 131-140 of 608
Sort by:
Attacker Value
Unknown

CVE-2020-15328

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak /opt/axess/var/blobstorage/ permissions.
Attacker Value
Unknown

CVE-2020-15329

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak Data.fs permissions.
Attacker Value
Unknown

CVE-2022-32169

Disclosure Date: September 28, 2022 (last updated February 24, 2025)
The “Bytebase” application does not restrict low privilege user to access “admin issues“ for which an unauthorized user can view the “OPEN” and “CLOSED” issues by “Admin” and the affected endpoint is “/issue”.
0
Attacker Value
Unknown

CVE-2022-40817

Disclosure Date: September 27, 2022 (last updated February 24, 2025)
Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This issue has been fixed in 5.2.2.
Attacker Value
Unknown

CVE-2022-35250

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
A privilege escalation vulnerability exists in Rocket.chat <v5 which made it possible to elevate privileges for any authenticated user to view Direct messages without appropriate permissions.
Attacker Value
Unknown

CVE-2022-40298

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell.
Attacker Value
Unknown

CVE-2022-28802

Disclosure Date: September 21, 2022 (last updated February 24, 2025)
Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)
Attacker Value
Unknown

CVE-2022-2995

Disclosure Date: September 19, 2022 (last updated February 24, 2025)
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
Attacker Value
Unknown

CVE-2022-2332

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster version 4.51, due to insecure permission assignment.
Attacker Value
Unknown

CVE-2022-20399

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
In the SEPolicy configuration of system apps, there is a possible access to the 'ip' utility due to an insecure default value. This could lead to local information disclosure of network data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219808546References: Upstream kernel