CVE-2022-20420
In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local es…
Read morePage 5/27.
CVEs without a recognized CWE (not present in the CWE map or marked as N/A).
In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local es…
Read moreIn setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no…
Read moreIn handleFullScreenIntent of StatusBarNotificationActivityStarter.java, there is a possible bypass of the restriction of starting activity from background due to a logic error in the code. This could…
Read moreIn start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges n…
Read moreThe Xiaomi Security Center expresses heartfelt thanks to ADLab of VenusTech ! At the same time, we also welcome more outstanding and professional security experts and security teams to join the Mi Se…
Read moreA logic vulnerability exists in a Xiaomi product. The vulnerability is caused by an identity verification failure, which can be exploited by an attacker who can obtain a brief elevation of privilege.
Read moreVisual Studio Code Elevation of Privilege Vulnerability
Read moreWindows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Read moreMicrosoft Office Information Disclosure Vulnerability
Read moreVisual Studio Code Information Disclosure Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreVisual Studio Code Remote Code Execution Vulnerability
Read moreMicrosoft Word Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreWindows Graphics Component Elevation of Privilege Vulnerability
Read moreWin32k Elevation of Privilege Vulnerability
Read moreMicrosoft Office Graphics Remote Code Execution Vulnerability
Read moreMicrosoft Office Remote Code Execution Vulnerability
Read moreWeb Account Manager Information Disclosure Vulnerability
Read moreWindows Server Service Elevation of Privilege Vulnerability
Read moreWindows CD-ROM File System Driver Remote Code Execution Vulnerability
Read moreWindows Security Support Provider Interface Information Disclosure Vulnerability
Read moreActive Directory Domain Services Elevation of Privilege Vulnerability
Read moreWindows Secure Channel Denial of Service Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreInternet Key Exchange (IKE) Protocol Denial of Service Vulnerability
Read moreWindows Workstation Service Elevation of Privilege Vulnerability
Read moreWindows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
Read moreWindows Portable Device Enumerator Service Security Feature Bypass Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreWindows USB Serial Driver Information Disclosure Vulnerability
Read moreWindows Print Spooler Elevation of Privilege Vulnerability
Read moreWindows DHCP Client Information Disclosure Vulnerability
Read moreWindows Distributed File System (DFS) Information Disclosure Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreStorSimple 8000 Series Elevation of Privilege Vulnerability
Read moreWindows Local Security Authority (LSA) Elevation of Privilege Vulnerability
Read moreWindows Resilient File System Elevation of Privilege
Read moreMicrosoft Office Spoofing Vulnerability
Read moreWindows Group Policy Preference Client Elevation of Privilege Vulnerability
Read moreWindows Local Session Manager (LSM) Denial of Service Vulnerability
Read moreWindows Graphics Component Elevation of Privilege Vulnerability
Read moreWindows Kernel Memory Information Disclosure Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Group Policy Preference Client Elevation of Privilege Vulnerability
Read moreWindows Group Policy Preference Client Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Read moreWindows Win32k Elevation of Privilege Vulnerability
Read moreWindows Graphics Component Information Disclosure Vulnerability
Read moreWindows WLAN Service Elevation of Privilege Vulnerability
Read moreMicrosoft DWM Core Library Elevation of Privilege Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreWindows Event Logging Service Denial of Service Vulnerability
Read moreWindows DHCP Client Elevation of Privilege Vulnerability
Read moreWindows Hyper-V Elevation of Privilege Vulnerability
Read moreWindows Active Directory Certificate Services Security Feature Bypass
Read moreLocal Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Read moreActive Directory Certificate Services Elevation of Privilege Vulnerability
Read moreWindows Group Policy Elevation of Privilege Vulnerability
Read moreWindows Mixed Reality Developer Tools Information Disclosure Vulnerability
Read moreWindows Local Session Manager (LSM) Denial of Service Vulnerability
Read moreMicrosoft Windows Defender Elevation of Privilege Vulnerability
Read moreWindows DWM Core Library Elevation of Privilege Vulnerability
Read moreMicrosoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privil…
Read moreWindows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
Read moreService Fabric Explorer Spoofing Vulnerability
Read moreWindows TCP/IP Driver Denial of Service Vulnerability
Read moreWindows GDI+ Remote Code Execution Vulnerability
Read moreWedding Planner v1.0 is vulnerable to arbitrary code execution.
Read moreAn unauthenticated Denial of Service (DoS) vulnerability exists in the handling of certain SSID strings by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the…
Read moreAn unauthenticated Denial of Service (DoS) vulnerability exists in the handling of certain SSID strings by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the…
Read moreIBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information that should only be available to a privileged user.
Read moreIBM QRadar SIEM 7.4 and 7.5 could disclose sensitive information via a local service to a privileged user. IBM X-Force ID: 227366.
Read moreIBM QRadar SIEM 7.4 and 7.5 data node rebalancing does not function correctly when using encrypted hosts which could result in information disclosure. IBM X-Force ID: 225889.
Read moreGenerex CS141 through 2.10 allows remote command execution by administrators via a web interface that reaches run_update in /usr/bin/gxserve-update.sh (e.g., command execution can occur via a reverse…
Read moreIBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 is vulnerable to man in the middle attacks through manipulation of the client proxy configuration. IBM X-Force ID: 233575.
Read moreUnder certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage t…
Read moreAn issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server nbars process can be crashed resulting in a denial of service. (Note: the watc…
Read moreAn issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to a denial of service attack through the DiscoveryService servi…
Read moreBento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.
Read moreBento4 v1.6.0-639 was discovered to contain a segmentation violation in the mp4fragment component.
Read moreA vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file.
Read moreA vulnerability in the UDP processing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Points could allow an unauthenticated, remote attacker to…
Read moreA vulnerability in the DHCP processing functionality of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of ser…
Read moreIn affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
Read moreAn arbitrary file read vulnerability was found in Metersphere v1.15.4, where authenticated users can read any file on the server via the file download function.
Read moreAn issue was discovered in FusionPBX before 4.5.30. The log_viewer.php Log View page allows an authenticated user to choose an arbitrary filename for download (i.e., not necessarily freeswitch.log in…
Read moreAn issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows o…
Read moreIt was possible for a student to view their quiz grade before it had been released, using a quiz web service.
Read moreA session hijack risk was identified in the Shibboleth authentication plugin.
Read moreZyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows escape-sequence injection into the /var/log/axxmpp.log file.
Read moreIBM InfoSphere Information Server 8.1, 8.5, and 8,7 could allow a remote authenticated attacker to obtain sensitive information, caused by improper restrictions on directories. An attacker could expl…
Read moreIBM WebSphere MQ 7.1 is vulnerable to a denial of service, caused by an error when handling user ids. A remote attacker could exploit this vulnerability to bypass the security configuration setup on…
Read moreIBM Rational Asset Manager 7.5 could allow a remote attacker to bypass security restrictions. An attacker could exploit this vulnerability using the UID parameter to modify another user's preferences.
Read moreAn issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur.
Read moreInsufficient policy enforcement in DevTools in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Read moreInappropriate implementation in Pointer Lock in Google Chrome on Mac prior to 105.0.5195.52 allowed a remote attacker to restrict user navigation via a crafted HTML page.
Read moreInsufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to bypass cookie prefix restrictions via a crafted HTML page.
Read moreA tenant administrator Hitachi Content Platform (HCP) may modify the configuration in another tenant without authorization, potentially allowing unauthorized access to data in the other tenant. Also,…
Read moreCertain HP Print Products are potentially vulnerable to Remote Code Execution.
Read moreAn issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As pa…
Read moreThe issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Cat…
Read moreThe issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory.
Read moreThis issue was addressed with improved file handling. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to overwrite arbitrary fi…
Read moreAn issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker…
Read moreAuthenticated (subscriber+) Broken Access Control vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.
Read moreUnauthenticated Plugin Settings Change vulnerability in Awesome Filterable Portfolio plugin <= 1.9.7 at WordPress.
Read moreThere is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects…
Read moreThe Wordfence Security – Firewall & Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insuf…
Read moreApplications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.5.5, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure o…
Read moreIn Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
Read more