Show filters
1,988 Total Results
Displaying 551-560 of 1,988
Sort by:
Attacker Value
Unknown

CVE-2022-33680

Disclosure Date: July 07, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2022-30192

Disclosure Date: June 29, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2022-33639

Disclosure Date: June 29, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown

CVE-2022-31077

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. At the time of writing, no workaround exists.
Attacker Value
Unknown

CVE-2022-31076

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
KubeEdge is built upon Kubernetes and extends native containerized application orchestration and device management to hosts at the Edge. In affected versions a malicious message can crash CloudCore by triggering a nil-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud. Additionally it will be affected only when users turn on the unixsocket switch in the config file cloudcore.yaml. This bug has been fixed in Kubeedge 1.11.0, 1.10.1, and 1.9.3. Users should update to these versions to resolve the issue. Users unable to upgrade should sisable the unixsocket switch of CloudHub in the config file cloudcore.yaml.
Attacker Value
Unknown

CVE-2022-31805

Disclosure Date: June 23, 2022 (last updated February 24, 2025)
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
0
Attacker Value
Unknown

CVE-2022-22021

Disclosure Date: June 15, 2022 (last updated November 29, 2024)
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2022-31066

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
EdgeX Foundry is an open source project for building a common open framework for Internet of Things edge computing. Prior to version 2.1.1, the /api/v2/config endpoint exposes message bus credentials to local unauthenticated users. In security-enabled mode, message bus credentials are supposed to be kept in the EdgeX secret store and require authentication to access. This vulnerability bypasses the access controls on message bus credentials when running in security-enabled mode. (No credentials are required when running in security-disabled mode.) As a result, attackers could intercept data or inject fake data into the EdgeX message bus. Users should upgrade to EdgeXFoundry Kamakura release (2.2.0) or to the June 2022 EdgeXFoundry LTS Jakarta release (2.1.1) to receive a patch. More information about which go modules, docker containers, and snaps contain patches is available in the GitHub Security Advisory. There are currently no known workarounds for this issue.
Attacker Value
Unknown

CVE-2022-30231

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software discloses password hashes of other users upon request. This could allow an authenticated user to retrieve another users password hash.
Attacker Value
Unknown

CVE-2022-30230

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions.