Show filters
496 Total Results
Displaying 131-140 of 496
Sort by:
Attacker Value
Unknown

CVE-2022-26247

Disclosure Date: March 20, 2022 (last updated February 23, 2025)
TMS v2.28.0 contains an insecure permissions vulnerability via the component /TMS/admin/user/Update2. This vulnerability allows attackers to modify the administrator account and password.
Attacker Value
Unknown

CVE-2022-26526

Disclosure Date: March 17, 2022 (last updated February 23, 2025)
Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.
Attacker Value
Unknown

CVE-2022-21819

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components.
Attacker Value
Unknown

CVE-2022-22148

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
Attacker Value
Unknown

CVE-2022-22141

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.
Attacker Value
Unknown

CVE-2022-21946

Disclosure Date: March 11, 2022 (last updated February 23, 2025)
A Incorrect Permission Assignment for Critical Resource vulnerability in the sudoers configuration in cscreen of openSUSE Factory allows any local users to gain the privileges of the tty and dialout groups and access and manipulate any running cscreen seesion. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions.
Attacker Value
Unknown

CVE-2021-3631

Disclosure Date: March 02, 2022 (last updated February 23, 2025)
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
Attacker Value
Unknown

CVE-2022-25010

Disclosure Date: March 01, 2022 (last updated February 23, 2025)
The component /rootfs in RageFile of Stepmania v5.1b2 and below allows attackers access to the entire file system.
Attacker Value
Unknown

CVE-2022-24327

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
In JetBrains Hub before 2021.1.13890, integration with JetBrains Account exposed an API key with excessive permissions.
Attacker Value
Unknown

CVE-2022-0247

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
An issue exists in Fuchsia where VMO data can be modified through access to copy-on-write snapshots. A local attacker could modify objects in the VMO that they do not have permission to. We recommend upgrading past commit d97c05d2301799ed585620a9c5c739d36e7b5d3d or any of the listed versions.