Show filters
321 Total Results
Displaying 131-140 of 321
Sort by:
Attacker Value
Unknown
CVE-2022-34918
Disclosure Date: July 04, 2022 (last updated February 24, 2025)
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
0
Attacker Value
Unknown
CVE-2022-2105
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters.
0
Attacker Value
Unknown
CVE-2022-1667
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
0
Attacker Value
Unknown
CVE-2022-2102
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
0
Attacker Value
Unknown
CVE-2022-27782
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
0
Attacker Value
Unknown
CVE-2021-26635
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
In the code that verifies the file size in the ark library, it is possible to manipulate the offset read from the target file due to the wrong use of the data type. An attacker could use this vulnerability to cause a stack buffer overflow and as a result, perform an attack such as remote code execution.
0
Attacker Value
Unknown
CVE-2022-1786
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
0
Attacker Value
Unknown
CVE-2022-31007
Disclosure Date: May 31, 2022 (last updated February 23, 2025)
eLabFTW is an electronic lab notebook manager for research teams. Prior to version 4.3.0, a vulnerability allows an authenticated user with an administrator role in a team to assign itself system administrator privileges within the application, or create a new system administrator account. The issue has been corrected in eLabFTW version 4.3.0. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A system administrator account can manage all accounts, teams and edit system-wide settings within the application. The impact is not deemed as high, as it requires the attacker to have access to an administrator account. Regular user accounts cannot exploit this to gain admin rights. A workaround for one if the issues is removing the ability of administrators to create accounts.
0
Attacker Value
Unknown
CVE-2021-32965
Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allow an attacker to remotely execute arbitrary code.
0
Attacker Value
Unknown
CVE-2022-1848
Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.
0