Show filters
538 Total Results
Displaying 171-180 of 538
Sort by:
Attacker Value
Unknown

CVE-2022-36958

Disclosure Date: October 19, 2022 (last updated February 24, 2025)
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.
Attacker Value
Unknown

CVE-2022-36966

Disclosure Date: October 19, 2022 (last updated February 24, 2025)
Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous.
Attacker Value
Unknown

CVE-2022-36961

Disclosure Date: September 28, 2022 (last updated February 24, 2025)
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.
Attacker Value
Unknown

CVE-2022-40132

Disclosure Date: September 23, 2022 (last updated February 24, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Seriously Simple Podcasting plugin <= 2.16.0 at WordPress, leading to plugin settings change.
Attacker Value
Unknown

CVE-2022-2714

Disclosure Date: September 06, 2022 (last updated February 24, 2025)
Improper Handling of Length Parameter Inconsistency in GitHub repository francoisjacquet/rosariosis prior to 10.0.
Attacker Value
Unknown

CVE-2022-3072

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.
Attacker Value
Unknown

CVE-2022-30317

Disclosure Date: August 31, 2022 (last updated February 24, 2025)
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices …
Attacker Value
Unknown

CVE-2022-37059

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field
Attacker Value
Unknown

CVE-2022-25999

Disclosure Date: August 18, 2022 (last updated February 24, 2025)
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software, all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-23173

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.