Show filters
1,988 Total Results
Displaying 551-560 of 1,988
Sort by:
Attacker Value
Unknown
CVE-2022-33680
Disclosure Date: July 07, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-30192
Disclosure Date: June 29, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-33639
Disclosure Date: June 29, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2022-31077
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. At the time of writing, no workaround exists.
0
Attacker Value
Unknown
CVE-2022-31076
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message can crash CloudCore by triggering a nil-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud. Additionally it will be affected only when users turn on the unixsocket switch in the config file cloudcore.yaml. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. Users unable to upgrade should sisable the unixsocket switch of CloudHub in the config file cloudcore.yaml.
0
Attacker Value
Unknown
CVE-2022-31805
Disclosure Date: June 23, 2022 (last updated February 24, 2025)
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
0
Attacker Value
Unknown
CVE-2022-22021
Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2022-31066
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
EdgeX Foundry is an open source project for building a common open framework for Internet of Things edge computing. Prior to version 2.1.1, the /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus. Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1) to receive a patch. More information about which go modules, docker containers, and snaps contain patches is available in the GitHub Security Advisory. There are currently no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-30231
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash.
0
Attacker Value
Unknown
CVE-2022-30230
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions.
0