Show filters
460 Total Results
Displaying 61-70 of 460
Sort by:
Attacker Value
Unknown

CVE-2022-26281

Disclosure Date: April 05, 2022 (last updated February 23, 2025)
BigAnt Server v5.6.06 was discovered to contain an incorrect access control issue.
Attacker Value
Unknown

CVE-2021-36290

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
Dell VNX2 for File version 8.1.21.266 and earlier, contain a privilege escalation vulnerability. A local malicious admin may potentially exploit vulnerability and gain privileges.
Attacker Value
Unknown

CVE-2022-23869

Disclosure Date: March 30, 2022 (last updated February 23, 2025)
In RuoYi v4.7.2 through the WebUI, user test1 does not have permission to reset the password of user test3, but the password of user test3 can be reset through the /system/user/resetPwd request.
Attacker Value
Unknown

CVE-2022-22941

Disclosure Date: March 29, 2022 (last updated February 23, 2025)
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
Attacker Value
Unknown

CVE-2022-24769

Disclosure Date: March 24, 2022 (last updated February 23, 2025)
Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most direct…
Attacker Value
Unknown

CVE-2022-0652

Disclosure Date: March 22, 2022 (last updated February 23, 2025)
Confd log files contain local users', including root’s, SHA512crypt password hashes with insecure access permissions. This allows a local attacker to attempt off-line brute-force attacks against these password hashes in Sophos UTM before version 9.710.
Attacker Value
Unknown

CVE-2022-24236

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
An insecure permissions vulnerability in Snapt Aria v12.8 allows unauthenticated attackers to send e-mails from spoofed users' accounts.
Attacker Value
Unknown

CVE-2022-26247

Disclosure Date: March 20, 2022 (last updated February 23, 2025)
TMS v2.28.0 contains an insecure permissions vulnerability via the component /TMS/admin/user/Update2. This vulnerability allows attackers to modify the administrator account and password.
Attacker Value
Unknown

CVE-2022-26526

Disclosure Date: March 17, 2022 (last updated February 23, 2025)
Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.
Attacker Value
Unknown

CVE-2022-0593

Disclosure Date: March 14, 2022 (last updated February 23, 2025)
The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.