Show filters
1,987 Total Results
Displaying 501-510 of 1,987
Sort by:
Attacker Value
Unknown

CVE-2022-37913

Disclosure Date: October 28, 2022 (last updated December 22, 2024)
Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.
Attacker Value
Unknown

CVE-2022-37914

Disclosure Date: October 28, 2022 (last updated December 22, 2024)
Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.
Attacker Value
Unknown

CVE-2022-37453

Disclosure Date: October 20, 2022 (last updated February 24, 2025)
An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types.
Attacker Value
Unknown

CVE-2022-41983

Disclosure Date: October 19, 2022 (last updated February 24, 2025)
On specific hardware platforms, on BIG-IP versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, while Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions can cause BIG-IP to send data unencrypted even with an SSL Profile applied.
Attacker Value
Unknown

CVE-2022-37968

Disclosure Date: October 11, 2022 (last updated January 11, 2025)
Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.
Attacker Value
Unknown

CVE-2022-41035

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
Microsoft Edge (Chromium-based) Spoofing Vulnerability
Attacker Value
Unknown

CVE-2022-40147

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
A vulnerability has been identified in Industrial Edge Management (All versions < V1.5.1). The affected software does not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entity by interfering in the communication path between the client and the intended server.
Attacker Value
Unknown

CVE-2022-37864

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627)
Attacker Value
Unknown

CVE-2022-32493

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
Attacker Value
Unknown

CVE-2022-32485

Disclosure Date: September 29, 2022 (last updated February 24, 2025)
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.