Show filters
569 Total Results
Displaying 151-160 of 569
Sort by:
Attacker Value
Unknown
CVE-2022-22411
Disclosure Date: August 04, 2022 (last updated February 24, 2025)
IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
0
Attacker Value
Unknown
CVE-2022-36800
Disclosure Date: August 03, 2022 (last updated February 24, 2025)
Affected versions of Atlassian Jira Service Management Server and Data Center allow remote attackers without the "Browse Users" permission to view groups via an Information Disclosure vulnerability in the browsegroups.action endpoint. The affected versions are before version 4.22.2.
0
Attacker Value
Unknown
CVE-2021-22648
Disclosure Date: July 28, 2022 (last updated February 24, 2025)
Ovarro TBox proprietary Modbus file access functions allow attackers to read, alter, or delete the configuration file.
0
Attacker Value
Unknown
CVE-2022-34112
Disclosure Date: July 22, 2022 (last updated February 24, 2025)
An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator.
0
Attacker Value
Unknown
CVE-2022-1655
Disclosure Date: July 22, 2022 (last updated February 24, 2025)
An Incorrect Permission Assignment for Critical Resource flaw was found in Horizon on Red Hat OpenStack. Horizon session cookies are created without the HttpOnly flag despite HorizonSecureCookies being set to true in the environmental files, possibly leading to a loss of confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2022-34891
Disclosure Date: July 18, 2022 (last updated February 24, 2025)
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop 17.1.1. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the update machanism. The product sets incorrect permissions on sensitive files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16395.
0
Attacker Value
Unknown
CVE-2021-45492
Disclosure Date: July 14, 2022 (last updated February 24, 2025)
In Sage 300 ERP (formerly accpac) through 6.8.x, the installer configures the C:\Sage\Sage300\Runtime directory to be the first entry in the system-wide PATH environment variable. However, this directory is writable by unprivileged users because the Sage installer fails to set explicit permissions and therefore inherits weak permissions from the C:\ folder. Because entries in the system-wide PATH variable are included in the search order for DLLs, an attacker could perform DLL search-order hijacking to escalate their privileges to SYSTEM. Furthermore, if the Global Search or Web Screens functionality is enabled, then privilege escalation is possible via the GlobalSearchService and Sage.CNA.WindowsService services, again via DLL search-order hijacking because unprivileged users would have modify permissions on the application directory. Note that while older versions of the software default to installing in %PROGRAMFILES(X86)% (which would allow the Sage folder to inherit strong permis…
0
Attacker Value
Unknown
CVE-2022-20234
Disclosure Date: July 13, 2022 (last updated February 24, 2025)
In Car Settings app, the NotificationAccessConfirmationActivity is exported. In NotificationAccessConfirmationActivity, it gets both 'mComponentName' and 'pkgTitle' from user.An unprivileged app can use a malicous mComponentName with a benign pkgTitle (e.g. Settings app) to make users enable notification access permission for the malicious app. That is, users believe they enable the notification access permission for the Settings app, but actually they enable the notification access permission for the malicious app.Once the malicious app gets the notification access permission, it can read all notifications, including users' personal information.Product: AndroidVersions: Android-12LAndroid ID: A-225189301
0
Attacker Value
Unknown
CVE-2022-20218
Disclosure Date: July 13, 2022 (last updated February 24, 2025)
In PermissionController, there is a possible way to get and retain permissions without user's consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-223907044
0
Attacker Value
Unknown
CVE-2022-33695
Disclosure Date: July 12, 2022 (last updated February 24, 2025)
Use of improper permission in InputManagerService prior to SMR Jul-2022 Release 1 allows unauthorized access to the service.
0