Show filters
1,073 Total Results
Displaying 111-120 of 1,073
Sort by:
Attacker Value
Unknown

CVE-2022-20941

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information. This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device.
Attacker Value
Unknown

CVE-2022-45399

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics.
Attacker Value
Unknown

CVE-2022-45394

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs.
Attacker Value
Unknown

CVE-2022-45389

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
Attacker Value
Unknown

CVE-2022-45390

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins loader.io Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Attacker Value
Unknown

CVE-2022-45385

Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
Attacker Value
Unknown

CVE-2022-3538

Disclosure Date: November 14, 2022 (last updated February 24, 2025)
The Webmaster Tools Verification WordPress plugin through 1.2 does not have authorisation and CSRF checks when disabling plugins, allowing unauthenticated users to disable arbitrary plugins
Attacker Value
Unknown

CVE-2022-2450

Disclosure Date: November 14, 2022 (last updated February 24, 2025)
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.
Attacker Value
Unknown

CVE-2022-20450

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way to bypass user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-210065877
Attacker Value
Unknown

CVE-2022-20451

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
In onCallRedirectionComplete of CallsManager.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235098883