Vulnerabilities (CVE)

Filtered by CWE-862
Total 4661 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-20041 2 Google, Mediatek 7 Android, Mt8167, Mt8175 and 4 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
In Bluetooth, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108596; Issue ID: ALPS06108596.
CVE-2022-20024 2 Google, Mediatek 28 Android, Mt6580, Mt6739 and 25 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
In system service, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219064; Issue ID: ALPS06219064.
CVE-2022-20011 1 Google 1 Android 2024-11-21 2.1 LOW 5.5 MEDIUM
In getArray of NotificationManagerService.java , there is a possible leak of one user notifications to another due to missing check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-214999128
CVE-2022-20004 1 Google 1 Android 2024-11-21 7.2 HIGH 7.8 HIGH
In checkSlicePermission of SliceManagerService.java, it is possible to access any slice URI due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-179699767
CVE-2022-20002 1 Google 1 Android 2024-11-21 4.6 MEDIUM 7.8 HIGH
In incfs, there is a possible way of mounting on arbitrary paths due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-198657657
CVE-2022-1903 1 Armemberplugin 1 Armember 2024-11-21 6.8 MEDIUM 8.1 HIGH
The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username
CVE-2022-1777 1 Filr Project 1 Filr 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Filr WordPress plugin before 1.2.2.1 does not have authorisation check in two of its AJAX actions, allowing them to be called by any authenticated users, such as subscriber. They are are protected with a nonce, however the nonce is leaked on the dashboard. This could allow them to upload arbitrary HTML files as well as delete all files or arbitrary ones.
CVE-2022-1574 1 Html2wp Project 1 Html2wp 2024-11-21 7.5 HIGH 9.8 CRITICAL
The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks when importing files, and does not validate them, as a result, unauthenticated attackers can upload arbitrary files (such as PHP) on the remote server
CVE-2022-1572 1 Html2wp Project 1 Html2wp 2024-11-21 5.5 MEDIUM 8.1 HIGH
The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in an AJAX action, available to any authenticated users such as subscriber, which could allow them to delete arbitrary file
CVE-2022-1570 1 Files Download Delay Project 1 Files Download Delay 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
The Files Download Delay WordPress plugin before 1.0.7 does not have authorisation and CSRF checks when reseting its settings, which could allow any authenticated users, such as subscriber to perform such action.
CVE-2022-1521 1 Illumina 8 Iseq 100, Local Run Manager, Miniseq and 5 more 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
CVE-2022-1511 1 Snipeitapp 1 Snipe-it 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Missing Authorization in GitHub repository snipe/snipe-it prior to 5.4.4.
CVE-2022-1442 1 Wpmet 1 Metform Elementor Contact Form Builder 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Metform WordPress plugin is vulnerable to sensitive information disclosure due to improper access control in the ~/core/forms/action.php file which can be exploited by an unauthenticated attacker to view all API keys and secrets of integrated third-party APIs like that of PayPal, Stripe, Mailchimp, Hubspot, HelpScout, reCAPTCHA and many more, in versions up to and including 2.1.3.
CVE-2022-1423 1 Gitlab 1 Gitlab 2024-11-21 6.5 MEDIUM 7.1 HIGH
Improper access control in the CI/CD cache mechanism in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows a malicious actor with Developer privileges to perform cache poisoning leading to arbitrary code execution in protected branches
CVE-2022-1384 1 Mattermost 1 Mattermost Server 2024-11-21 6.0 MEDIUM 4.7 MEDIUM
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
CVE-2022-1329 1 Elementor 1 Website Builder 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.
CVE-2022-1323 1 2code 1 Discy 2024-11-21 N/A 6.5 MEDIUM
The Discy WordPress theme before 5.0 lacks authorization checks then processing ajax requests to the discy_update_options action, allowing any logged in users (with privileges as low as Subscriber,) to change Theme options by sending a crafted POST request.
CVE-2022-1245 1 Redhat 1 Keycloak 2024-11-21 7.5 HIGH 9.8 CRITICAL
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
CVE-2022-1203 1 Content Mask Project 1 Content Mask 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
The Content Mask WordPress plugin before 1.8.4.1 does not have authorisation and CSRF checks in various AJAX actions, as well as does not validate the option to be updated to ensure it belongs to the plugin. As a result, any authenticated user, such as subscriber could modify arbitrary blog options
CVE-2022-1092 1 Mycred 1 Mycred 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog