Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
Total 29527 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-26843 1 Intel 2 Oneapi Dpc\+\+\/c\+\+ Compiler, Oneapi Toolkits 2023-08-08 N/A 9.8 CRITICAL
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVE-2022-26572 1 Xerox 2 Colorqube 8580, Colorqube 8580 Firmware 2023-08-08 5.0 MEDIUM 7.5 HIGH
Xerox ColorQube 8580 was discovered to contain an access control issue which allows attackers to print, view the status, and obtain sensitive information.
CVE-2022-30290 1 Citeum 1 Opencti 2023-08-08 5.0 MEDIUM 7.5 HIGH
In OpenCTI through 5.2.4, a broken access control vulnerability has been identified in the profile endpoint. An attacker can abuse the identified vulnerability in order to arbitrarily change their registered e-mail address as well as their API key, even though such action is not possible through the interface, legitimately.
CVE-2022-1867 1 Google 1 Chrome 2023-08-08 N/A 6.5 MEDIUM
Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content.
CVE-2021-38703 1 Kpn 2 Experia Wifi, Experia Wifi Firmware 2023-08-08 9.0 HIGH 8.8 HIGH
Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.
CVE-2022-34298 1 Openidentityplatform 1 Openam 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack."
CVE-2022-37172 1 Msys2 1 Msys2 2023-08-08 N/A 7.8 HIGH
Incorrect access control in the install directory (C:\msys64) of Msys2 v20220603 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
CVE-2022-1874 2 Apple, Google 2 Macos, Chrome 2023-08-08 N/A 8.8 HIGH
Insufficient policy enforcement in Safe Browsing in Google Chrome on Mac prior to 102.0.5005.61 allowed a remote attacker to bypass downloads protection policy via a crafted HTML page.
CVE-2022-26054 1 Cybozu 1 Garoon 2023-08-08 4.0 MEDIUM 4.3 MEDIUM
Operation restriction bypass vulnerability in Link of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Link.
CVE-2021-44838 1 Deltarm 1 Delta Rm 2023-08-08 5.0 MEDIUM 4.3 MEDIUM
An issue was discovered in Delta RM 1.2. Using the /risque/risque/ajax-details endpoint, with a POST request indicating the risk to access with the id parameter, it is possible for users to access risks of other companies.
CVE-2022-2456 1 Gitlab 1 Gitlab 2023-08-08 N/A 2.7 LOW
An issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for malicious group or project maintainers to change their corresponding group or project visibility by crafting a malicious POST request.
CVE-2022-3330 1 Gitlab 1 Gitlab 2023-08-08 N/A 4.3 MEDIUM
It was possible for a guest user to read a todo targeting an inaccessible note in Gitlab CE/EE affecting all versions from 15.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1.
CVE-2022-22654 1 Apple 2 Safari, Watchos 2023-08-08 4.3 MEDIUM 4.3 MEDIUM
A user interface issue was addressed. This issue is fixed in watchOS 8.5, Safari 15.4. Visiting a malicious website may lead to address bar spoofing.
CVE-2022-29855 1 Mitel 18 6865i Sip, 6865i Sip Firmware, 6867i Sip and 15 more 2023-08-08 7.2 HIGH 6.8 MEDIUM
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
CVE-2022-30688 2 Debian, Needrestart Project 2 Debian Linux, Needrestart 2023-08-08 4.6 MEDIUM 7.8 HIGH
needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.
CVE-2022-32430 1 Talelin 1 Lin-cms-spring-boot 2023-08-08 N/A 7.5 HIGH
An access control issue in Lin CMS Spring Boot v0.2.1 allows attackers to access the backend information and functions within the application.
CVE-2022-25986 1 Cybozu 1 Office 2023-08-08 N/A 4.3 MEDIUM
Browse restriction bypass vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to obtain the data of Scheduler.
CVE-2021-44886 1 Zammad 1 Zammad 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
In Zammad 5.0.2, agents can configure "out of office" periods and substitute persons. If the substitute persons didn't have the same permissions as the original agent, they could receive ticket notifications for tickets that they have no access to.
CVE-2022-20289 1 Google 1 Android 2023-08-08 N/A 5.5 MEDIUM
In PackageInstaller, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-203683960
CVE-2022-27128 1 Zbzcms 1 Zbzcms 2023-08-08 7.5 HIGH 9.8 CRITICAL
An incorrect access control issue at /admin/run_ajax.php in zbzcms v1.0 allows attackers to arbitrarily add administrator accounts.