Show filters
1,081 Total Results
Displaying 121-130 of 1,081
Sort by:
Attacker Value
Unknown
CVE-2022-45394
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs.
0
Attacker Value
Unknown
CVE-2022-45389
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
0
Attacker Value
Unknown
CVE-2022-45390
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins loader.io Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2022-45385
Disclosure Date: November 15, 2022 (last updated February 24, 2025)
A missing permission check in Jenkins CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
0
Attacker Value
Unknown
CVE-2022-3538
Disclosure Date: November 14, 2022 (last updated February 24, 2025)
The Webmaster Tools Verification WordPress plugin through 1.2 does not have authorisation and CSRF checks when disabling plugins, allowing unauthenticated users to disable arbitrary plugins
0
Attacker Value
Unknown
CVE-2022-2450
Disclosure Date: November 14, 2022 (last updated February 24, 2025)
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.
0
Attacker Value
Unknown
CVE-2022-20450
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way to bypass user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-210065877
0
Attacker Value
Unknown
CVE-2022-20451
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
In onCallRedirectionComplete of CallsManager.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235098883
0
Attacker Value
Unknown
CVE-2022-20446
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
In AlwaysOnHotwordDetector of AlwaysOnHotwordDetector.java, there is a possible way to access the microphone from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-229793943
0
Attacker Value
Unknown
CVE-2022-3451
Disclosure Date: November 07, 2022 (last updated February 24, 2025)
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options
0