CVE-2022-42260
https://notcve.org/view.php?id=CVE-2022-42260
NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. NVIDIA vGPU Display Driver para los invitados de Linux contiene una vulnerabilidad en un archivo de configuración de D-Bus, donde un usuario no autorizado en la máquina virtual invitada puede afectar los endpoints protegidos de D-Bus, lo que puede provocar la ejecución de código, Denegación de Servicio (DoS), escalada de privilegios e información, divulgación o manipulación de datos. • https://nvidia.custhelp.com/app/answers/detail/a_id/5415 https://security.gentoo.org/glsa/202310-02 • CWE-281: Improper Preservation of Permissions •
CVE-2022-34676
https://notcve.org/view.php?id=CVE-2022-34676
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering. NVIDIA GPU Display Driver para Linux contiene una vulnerabilidad en el controlador de capa del modo kernel, donde una lectura fuera de los límites puede provocar Denegación de Servicio (DoS), divulgación de información o manipulación de datos. • https://nvidia.custhelp.com/app/answers/detail/a_id/5415 https://security.gentoo.org/glsa/202310-02 • CWE-125: Out-of-bounds Read CWE-197: Numeric Truncation Error •
CVE-2022-31708 – VMware vRealize Operations CaSA Improper Access Control Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-31708
vRealize Operations (vROps) contains a broken access control vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.4. This vulnerability allows remote attackers to disclose sensitive information on affected installations of VMware vRealize Operations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of CaSA. The issue results from the lack of proper access control. • https://www.vmware.com/security/advisories/VMSA-2022-0034.html •
CVE-2022-31707 – VMware vRealize Operations CaSA Improper Privilege Management Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-31707
vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2. vRealize Operations (vROps) contiene una vulnerabilidad de escalada de privilegios. VMware ha evaluado la gravedad de este problema en el rango de gravedad Importante con una puntuación base CVSSv3 máxima de 7.2. This vulnerability allows remote attackers to escalate privileges on affected installations of VMware vRealize Operations. Authentication is required to exploit this vulnerability. The specific flaw exists within the configuration of CaSA. • https://www.vmware.com/security/advisories/VMSA-2022-0034.html •
CVE-2022-31700
https://notcve.org/view.php?id=CVE-2022-31700
VMware Workspace ONE Access and Identity Manager contain an authenticated remote code execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2. VMware Workspace ONE Access and Identity Manager contiene una vulnerabilidad de ejecución remota de código autenticado. VMware ha evaluado la gravedad de este problema en el rango de gravedad Importante con una puntuación base CVSSv3 máxima de 7.2. • https://www.vmware.com/security/advisories/VMSA-2022-0032.html •