Show filters
979 Total Results
Displaying 591-600 of 979
Sort by:
Attacker Value
Unknown
CVE-2022-21819
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components.
0
Attacker Value
Unknown
CVE-2022-22148
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
0
Attacker Value
Unknown
CVE-2022-22141
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
0
Attacker Value
Unknown
CVE-2022-21946
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
A Incorrect Permission Assignment for Critical Resource vulnerability in the sudoers configuration in cscreen of openSUSE Factory allows any local users to gain the privileges of the tty and dialout groups and access and manipulate any running cscreen seesion. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions.
0
Attacker Value
Unknown
CVE-2021-3631
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2022-25010
Disclosure Date: March 01, 2022 (last updated February 23, 2025)
The component /rootfs in RageFile of Stepmania v5.1b2 and below allows attackers access to the entire file system.
0
Attacker Value
Unknown
CVE-2022-24327
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
In JetBrains Hub before 2021.1.13890, integration with JetBrains Account exposed an API key with excessive permissions.
0
Attacker Value
Unknown
CVE-2022-0247
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
An issue exists in Fuchsia where VMO data can be modified through access to copy-on-write snapshots. A local attacker could modify objects in the VMO that they do not have permission to. We recommend upgrading past commit d97c05d2301799ed585620a9c5c739d36e7b5d3d or any of the listed versions.
0
Attacker Value
Unknown
CVE-2022-25151
Disclosure Date: February 23, 2022 (last updated February 23, 2025)
Within the Service Desk module of the ITarian platform (SAAS and on-premise), a remote attacker can obtain sensitive information, caused by the failure to set the HTTP Only flag. A remote attacker could exploit this vulnerability to gain access to the management interface by using this vulnerability in combination with a successful Cross-Site Scripting attack on a user.
0
Attacker Value
Unknown
CVE-2021-42855
Disclosure Date: February 23, 2022 (last updated February 23, 2025)
It was discovered that the SteelCentral AppInternals Dynamic Sampling Agent (DSA) uses the ".debug_command.config" file to store a json string that contains a list of IDs and pre-configured commands. The config file is subsequently used by the "/api/appInternals/1.0/agent/configuration" API to map the corresponding ID to a command to be executed.
0