Show filters
1,987 Total Results
Displaying 501-510 of 1,987
Sort by:
Attacker Value
Unknown
CVE-2022-37913
Disclosure Date: October 28, 2022 (last updated December 22, 2024)
Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.
0
Attacker Value
Unknown
CVE-2022-37914
Disclosure Date: October 28, 2022 (last updated December 22, 2024)
Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.
0
Attacker Value
Unknown
CVE-2022-37453
Disclosure Date: October 20, 2022 (last updated February 24, 2025)
An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types.
0
Attacker Value
Unknown
CVE-2022-41983
Disclosure Date: October 19, 2022 (last updated February 24, 2025)
On specific hardware platforms, on BIG-IP versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, while Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions can cause BIG-IP to send data unencrypted even with an SSL Profile applied.
0
Attacker Value
Unknown
CVE-2022-37968
Disclosure Date: October 11, 2022 (last updated January 11, 2025)
Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-41035
Disclosure Date: October 11, 2022 (last updated February 24, 2025)
Microsoft Edge (Chromium-based) Spoofing Vulnerability
0
Attacker Value
Unknown
CVE-2022-40147
Disclosure Date: October 11, 2022 (last updated February 24, 2025)
A vulnerability has been identified in Industrial Edge Management (All versions < V1.5.1). The affected software does not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entity by interfering in the communication path between the client and the intended server.
0
Attacker Value
Unknown
CVE-2022-37864
Disclosure Date: October 11, 2022 (last updated February 24, 2025)
A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627)
0
Attacker Value
Unknown
CVE-2022-32493
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
0
Attacker Value
Unknown
CVE-2022-32485
Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
0