Show filters
538 Total Results
Displaying 171-180 of 538
Sort by:
Attacker Value
Unknown
CVE-2022-36958
Disclosure Date: October 19, 2022 (last updated February 24, 2025)
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2022-36966
Disclosure Date: October 19, 2022 (last updated February 24, 2025)
Users with Node Management rights were able to view and edit all nodes due to Insufficient control on URL parameter causing insecure direct object reference (IDOR) vulnerability in SolarWinds Platform 2022.3 and previous.
0
Attacker Value
Unknown
CVE-2022-36961
Disclosure Date: September 28, 2022 (last updated February 24, 2025)
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.
0
Attacker Value
Unknown
CVE-2022-40132
Disclosure Date: September 23, 2022 (last updated February 24, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Seriously Simple Podcasting plugin <= 2.16.0 at WordPress, leading to plugin settings change.
0
Attacker Value
Unknown
CVE-2022-2714
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
Improper Handling of Length Parameter Inconsistency in GitHub repository francoisjacquet/rosariosis prior to 10.0.
0
Attacker Value
Unknown
CVE-2022-3072
Disclosure Date: September 01, 2022 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.
0
Attacker Value
Unknown
CVE-2022-30317
Disclosure Date: August 31, 2022 (last updated February 24, 2025)
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices …
0
Attacker Value
Unknown
CVE-2022-37059
Disclosure Date: August 29, 2022 (last updated February 24, 2025)
Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field
0
Attacker Value
Unknown
CVE-2022-25999
Disclosure Date: August 18, 2022 (last updated February 24, 2025)
Uncontrolled search path element in the Intel(R) Enpirion(R) Digital Power Configurator GUI software, all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2022-23173
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.
0