Show filters
345 Total Results
Displaying 221-230 of 345
Sort by:
Attacker Value
Unknown

CVE-2022-26859

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
Attacker Value
Unknown

CVE-2022-26858

Disclosure Date: August 04, 2022 (last updated February 24, 2025)
Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
Attacker Value
Unknown

CVE-2022-31175

Disclosure Date: August 03, 2022 (last updated February 24, 2025)
CKEditor 5 is a JavaScript rich text editor. A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages in versions prior to 35.0.1. The vulnerability allowed to trigger a JavaScript code after fulfilling special conditions. The affected packages are `@ckeditor/ckeditor5-markdown-gfm`, `@ckeditor/ckeditor5-html-support`, and `@ckeditor/ckeditor5-html-embed`. The specific conditions are 1) Using one of the affected packages. In case of `ckeditor5-html-support` and `ckeditor5-html-embed`, additionally, it was required to use a configuration that allows unsafe markup inside the editor. 2) Destroying the editor instance and 3) Initializing the editor on an element and using an element other than `<textarea>` as a base. The root cause of the issue was a mechanism responsible for updating the source element with the markup coming from the CKEditor 5 data pipeline after destroying the editor. This vulnerability might affect a small percent of inte…
Attacker Value
Unknown

CVE-2022-30791

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-30792

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-34180

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.
Attacker Value
Unknown

CVE-2022-34179

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
Attacker Value
Unknown

CVE-2022-34178

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
Attacker Value
Unknown

CVE-2022-22515

Disclosure Date: June 01, 2022 (last updated February 23, 2025)
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
0
Attacker Value
Unknown

CVE-2021-46744

Disclosure Date: May 10, 2022 (last updated February 23, 2025)
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.