Show filters
16,479 Total Results
Displaying 61-70 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2022-30973
Disclosure Date: May 31, 2022 (last updated February 23, 2025)
We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the 1.28.2 release. In Apache Tika, a regular expression in the StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.3.
0
Attacker Value
Unknown
CVE-2022-30584
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
Archer Platform 6.3 before 6.11 (6.11.0.0) contains an Improper Access Control Vulnerability within SSO ADFS functionality that could potentially be exploited by malicious users to compromise the affected system. 6.10 P3 (6.10.0.3) and 6.9 SP3 P4 (6.9.3.4) are also fixed releases.
0
Attacker Value
Unknown
CVE-2022-29633
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
An access control issue in Linglong v1.0 allows attackers to access the background of the application via a crafted cookie.
0
Attacker Value
Unknown
CVE-2022-26703
Disclosure Date: May 26, 2022 (last updated February 23, 2025)
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.5 and iPadOS 15.5. A person with physical access to an iOS device may be able to access photos from the lock screen.
0
Attacker Value
Unknown
CVE-2022-23775
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
TrueStack Direct Connect 1.4.7 has Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2021-44719
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
Docker Desktop 4.3.0 has Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2022-1678
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
0
Attacker Value
Unknown
CVE-2022-22127
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
Tableau is aware of a broken access control vulnerability present in Tableau Server affecting Tableau Server customers using Local Identity Store for managing users. The vulnerability allows a malicious site administrator to change passwords for users in different sites hosted on the same Tableau Server, resulting in the potential for unauthorized access to data.Tableau Server versions affected are:2020.4.16, 2021.1.13, 2021.2.10, 2021.3.9, 2021.4.4 and earlierNote: All future releases of Tableau Server will address this security issue. Versions that are no longer supported are not tested and may be vulnerable.
0
Attacker Value
Unknown
CVE-2021-41834
Disclosure Date: May 23, 2022 (last updated February 23, 2025)
JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.
0
Attacker Value
Unknown
CVE-2022-29201
Disclosure Date: May 20, 2022 (last updated February 23, 2025)
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
0