Show filters
329 Total Results
Displaying 141-150 of 329
Sort by:
Attacker Value
Unknown

CVE-2022-1667

Disclosure Date: June 23, 2022 (last updated February 24, 2025)
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
Attacker Value
Unknown

CVE-2022-2102

Disclosure Date: June 23, 2022 (last updated February 24, 2025)
Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
Attacker Value
Unknown

CVE-2022-27782

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
Attacker Value
Unknown

CVE-2021-26635

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
In the code that verifies the file size in the ark library, it is possible to manipulate the offset read from the target file due to the wrong use of the data type. An attacker could use this vulnerability to cause a stack buffer overflow and as a result, perform an attack such as remote code execution.
Attacker Value
Unknown

CVE-2022-1786

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
Attacker Value
Unknown

CVE-2022-31007

Disclosure Date: May 31, 2022 (last updated February 23, 2025)
eLabFTW is an electronic lab notebook manager for research teams. Prior to version 4.3.0, a vulnerability allows an authenticated user with an administrator role in a team to assign itself system administrator privileges within the application, or create a new system administrator account. The issue has been corrected in eLabFTW version 4.3.0. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A system administrator account can manage all accounts, teams and edit system-wide settings within the application. The impact is not deemed as high, as it requires the attacker to have access to an administrator account. Regular user accounts cannot exploit this to gain admin rights. A workaround for one if the issues is removing the ability of administrators to create accounts.
Attacker Value
Unknown

CVE-2021-32965

Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allow an attacker to remotely execute arbitrary code.
Attacker Value
Unknown

CVE-2022-1848

Disclosure Date: May 24, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.
Attacker Value
Unknown

CVE-2022-29209

Disclosure Date: May 21, 2022 (last updated February 23, 2025)
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the macros that TensorFlow uses for writing assertions (e.g., `CHECK_LT`, `CHECK_GT`, etc.) have an incorrect logic when comparing `size_t` and `int` values. Due to type conversion rules, several of the macros would trigger incorrectly. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Attacker Value
Unknown

CVE-2022-29181

Disclosure Date: May 20, 2022 (last updated February 23, 2025)
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.