Show filters
3,546 Total Results
Displaying 311-320 of 3,546
Sort by:
Attacker Value
Unknown

CVE-2022-43752

Disclosure Date: October 31, 2022 (last updated February 24, 2025)
Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon.
Attacker Value
Unknown

CVE-2022-28763

Disclosure Date: October 24, 2022 (last updated February 24, 2025)
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.
Attacker Value
Unknown

CVE-2020-12744

Disclosure Date: October 20, 2022 (last updated February 24, 2025)
The MSI installer in Verint Desktop Resources 15.2 allows an unprivileged local user to elevate their privileges during install or repair.
Attacker Value
Unknown

CVE-2022-39428

Disclosure Date: October 18, 2022 (last updated October 08, 2023)
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Attacker Value
Unknown

CVE-2022-33882

Disclosure Date: October 03, 2022 (last updated October 08, 2023)
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
Attacker Value
Unknown

CVE-2015-1931

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.
Attacker Value
Unknown

CVE-2014-0148

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.
Attacker Value
Unknown

CVE-2014-0147

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.
Attacker Value
Unknown

CVE-2014-0144

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
Attacker Value
Unknown

CVE-2022-35257

Disclosure Date: September 23, 2022 (last updated October 08, 2023)
A local privilege escalation vulnerability in UI Desktop for Windows (Version 0.55.1.2 and earlier) allows a malicious actor with local access to a Windows device with UI Desktop to run arbitrary commands as SYSTEM.