Show filters
139,364 Total Results
Displaying 151-160 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
High
CVE-2022-31199
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
4
Attacker Value
Very High
CVE-2022-21587
Disclosure Date: October 18, 2022 (last updated February 24, 2025)
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
4
Attacker Value
Very High
CVE-2022-41352
Disclosure Date: September 26, 2022 (last updated February 24, 2025)
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
3
Attacker Value
Unknown
CVE-2022-34721
Disclosure Date: September 13, 2022 (last updated January 11, 2025)
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
3
Attacker Value
Very High
CVE-2022-37042
Disclosure Date: August 12, 2022 (last updated February 24, 2025)
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
4
Attacker Value
Very High
CVE-2021-45837
Disclosure Date: April 25, 2022 (last updated October 07, 2023)
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
3
Attacker Value
Very Low
CVE-2022-0540
Disclosure Date: April 20, 2022 (last updated February 23, 2025)
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
4
Attacker Value
High
CVE-2022-26904
Disclosure Date: April 15, 2022 (last updated February 23, 2025)
Windows User Profile Service Elevation of Privilege Vulnerability
4
Attacker Value
Very High
CVE-2022-26809
Disclosure Date: April 15, 2022 (last updated November 29, 2024)
Remote Procedure Call Runtime Remote Code Execution Vulnerability
4
Attacker Value
Low
CVE-2022-22960
Disclosure Date: April 13, 2022 (last updated February 23, 2025)
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.
4