Show filters
732 Total Results
Displaying 241-250 of 732
Sort by:
Attacker Value
Unknown
CVE-2022-28166
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.
0
Attacker Value
Unknown
CVE-2022-32209
Disclosure Date: June 24, 2022 (last updated February 24, 2025)
# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: ["select", "style"] %>```see https://api.rubyonrails.org/classes/ActionView/…
0
Attacker Value
Unknown
CVE-2021-40660
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
An issue was discovered in Delight Nashorn Sandbox 0.2.0. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack.
0
Attacker Value
Unknown
CVE-2022-32268
Disclosure Date: June 03, 2022 (last updated November 29, 2024)
StarWind SAN and NAS v0.2 build 1914 allow remote code execution. A flaw was found in REST API in StarWind Stack. REST command, which allows changing the hostname, doesn’t check a new hostname parameter. It goes directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges.
0
Attacker Value
Unknown
CVE-2022-23237
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
E-Series SANtricity OS Controller Software 11.x versions through 11.70.2 are vulnerable to host header injection attacks that could allow an attacker to redirect users to malicious websites.
0
Attacker Value
Unknown
CVE-2022-23236
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
E-Series SANtricity OS Controller Software versions 11.40 through 11.70.2 store the LDAP BIND password in plaintext within a file accessible only to privileged users.
0
Attacker Value
Unknown
CVE-2022-1678
Disclosure Date: May 25, 2022 (last updated February 23, 2025)
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
0
Attacker Value
Unknown
CVE-2022-22970
Disclosure Date: May 12, 2022 (last updated February 23, 2025)
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
0
Attacker Value
Unknown
CVE-2022-28162
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text.
0
Attacker Value
Unknown
CVE-2022-28161
Disclosure Date: May 09, 2022 (last updated February 23, 2025)
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode.
0