Show filters
510 Total Results
Displaying 81-90 of 510
Sort by:
Attacker Value
Unknown
CVE-2022-1596
Disclosure Date: June 21, 2022 (last updated February 23, 2025)
Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2, REX640 PCL3 allows an authenticated attacker to launch an attack against the user database file and try to take control of an affected system node.
0
Attacker Value
Unknown
CVE-2022-31464
Disclosure Date: June 16, 2022 (last updated February 23, 2025)
Insecure permissions configuration in Adaware Protect v1.2.439.4251 allows attackers to escalate privileges via changing the service binary path.
0
Attacker Value
Unknown
CVE-2022-32155
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
In universal forwarder versions before 9.0, management services are available remotely by default. When not required, it introduces a potential exposure, but it is not a vulnerability. If exposed, we recommend each customer assess the potential severity specific to your environment. In 9.0, the universal forwarder now binds the management port to localhost preventing remote logins by default. If management services are not required in versions before 9.0, set disableDefaultPort = true in server.conf OR allowRemoteLogin = never in server.conf OR mgmtHostPort = localhost in web.conf. See Configure universal forwarder management security (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_universal_forwarder_management_security) for more information on disabling the remote management services.
0
Attacker Value
Unknown
CVE-2022-31465
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in Xpedition Designer VX.2.10 (All versions < VX.2.10 Update 13), Xpedition Designer VX.2.11 (All versions < VX.2.11 Update 11), Xpedition Designer VX.2.12 (All versions < VX.2.12 Update 5), Xpedition Designer VX.2.13 (All versions < VX.2.13 Update 1). The affected application assigns improper access rights to the service executable. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
0
Attacker Value
Unknown
CVE-2021-40649
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the HttpOnly flag set.
0
Attacker Value
Unknown
CVE-2022-33175
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 have an insecure permissions setting on the user.token field that is accessible to everyone through the /cgi/get_param.cgi HTTP API. This leads to disclosing active session ids of currently logged-in administrators. The session id can then be reused to act as the administrator, allowing reading of the cleartext password, or reconfiguring the device.
0
Attacker Value
Unknown
CVE-2022-1412
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Log WP_Mail WordPress plugin through 0.1 saves sent email in a publicly accessible directory using predictable filenames, allowing any unauthenticated visitor to obtain potentially sensitive information like generated passwords.
0
Attacker Value
Unknown
CVE-2022-30700
Disclosure Date: May 27, 2022 (last updated February 23, 2025)
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2022-1348
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
0
Attacker Value
Unknown
CVE-2022-30990
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037
0