Show filters
86 Total Results
Displaying 61-70 of 86
Sort by:
Attacker Value
Unknown

CVE-2022-1745

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.
Attacker Value
Unknown

CVE-2022-1744

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
Applications on the tested version of Dominion Voting Systems ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
Attacker Value
Unknown

CVE-2022-1743

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.
Attacker Value
Unknown

CVE-2022-1742

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
Attacker Value
Unknown

CVE-2022-1741

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.
Attacker Value
Unknown

CVE-2022-1740

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
Attacker Value
Unknown

CVE-2022-1739

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
Attacker Value
Unknown

CVE-2022-31028

Disclosure Date: June 07, 2022 (last updated February 23, 2025)
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
Attacker Value
Unknown

CVE-2022-1027

Disclosure Date: April 25, 2022 (last updated February 23, 2025)
The Page Restriction WordPress (WP) WordPress plugin before 1.2.7 allows bad actors with administrator privileges to the settings page to inject Javascript code to its settings leading to stored Cross-Site Scripting that will only affect administrator users.
Attacker Value
Unknown

CVE-2022-1187

Disclosure Date: April 19, 2022 (last updated February 23, 2025)
The WordPress WP YouTube Live Plugin is vulnerable to Reflected Cross-Site Scripting via POST data found in the ~/inc/admin.php file which allows unauthenticated attackers to inject arbitrary web scripts in versions up to, and including, 1.7.21.