by Scott Muniz | Jan 4, 2023 | Security, Technology
This article is contributed. See the original author and article here.
go — multiple_products |
The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow. |
2022-12-27 |
not yet calculated |
CVE-2013-10005 MISC MISC |
lz4 — lz4_bindings |
LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. |
2022-12-27 |
not yet calculated |
CVE-2014-125026 MISC MISC MISC |
tbdev — tbdev . |
A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The name of the patch is 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147. |
2022-12-31 |
not yet calculated |
CVE-2014-125027 MISC MISC MISC MISC |
valtech — idp_test_client |
A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148. |
2022-12-31 |
not yet calculated |
CVE-2014-125028 MISC MISC MISC |
jwt — jwt |
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. |
2022-12-27 |
not yet calculated |
CVE-2015-10004 MISC MISC MISC |
markdown-it — markdown-it |
A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852. |
2022-12-27 |
not yet calculated |
CVE-2015-10005 MISC MISC MISC MISC |
golf — golf |
CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests. |
2022-12-27 |
not yet calculated |
CVE-2016-15005 MISC MISC MISC MISC |
gorilla — gorilla_handlers |
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy. |
2022-12-27 |
not yet calculated |
CVE-2017-20146 MISC MISC MISC |
challenge_website –challenge_website |
A vulnerability was found in challenge website. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is f1644b1d3502e5aa5284f31ea80d2623817f4d42. It is recommended to apply a patch to fix this issue. The identifier VDB-216989 was assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2017-20150 MISC MISC MISC |
itext — rups |
A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2017-20151 MISC MISC MISC |
aerouk — imageserve |
A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056. |
2022-12-30 |
not yet calculated |
CVE-2017-20152 MISC MISC MISC MISC |
aerouk — imageserve |
A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2017-20153 MISC MISC MISC MISC |
phoenixcoin — phoenixcoin |
A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068. |
2022-12-30 |
not yet calculated |
CVE-2017-20154 MISC MISC MISC MISC |
sterc — google_analytics_dashboard_modx |
A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2017-20155 MISC MISC MISC MISC MISC MISC |
exciting — printer |
A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The name of the patch is 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139. |
2022-12-31 |
not yet calculated |
CVE-2017-20156 MISC MISC MISC MISC |
ariadne –component_library |
A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140. |
2022-12-31 |
not yet calculated |
CVE-2017-20157 MISC MISC MISC MISC |
N/A — N/A |
A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability. |
2022-12-31 |
not yet calculated |
CVE-2017-20159 MISC MISC MISC MISC |
flitto –express_param |
A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability. |
2022-12-31 |
not yet calculated |
CVE-2017-20160 MISC MISC MISC MISC MISC |
opera –opera_mini_for_android |
The Opera Mini application 47.1.2249.129326 for Android allows remote attackers to spoof the Location Permission dialog via a crafted web site. |
2022-12-26 |
not yet calculated |
CVE-2018-16135 MISC |
archiver — archiver |
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. |
2022-12-27 |
not yet calculated |
CVE-2018-25046 MISC MISC MISC |
email_existence — email_existence |
A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2018-25049 MISC MISC MISC MISC |
harvest — chosen |
A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 is able to address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956. |
2022-12-28 |
not yet calculated |
CVE-2018-25050 MISC MISC MISC MISC MISC |
pomash — pomash |
A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2018-25051 MISC MISC MISC |
cpan –catalyst_plugin_session |
A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID Handler. The manipulation of the argument sid leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.41 is able to address this issue. The name of the patch is 88d1b599e1163761c9bd53bec53ba078f13e09d4. It is recommended to upgrade the affected component. VDB-216958 is the identifier assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2018-25052 MISC MISC MISC MISC |
json2html — json2html |
A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959. |
2022-12-28 |
not yet calculated |
CVE-2018-25053 MISC MISC MISC MISC |
cilla — cilla |
A vulnerability was found in shred cilla. It has been classified as problematic. Affected is an unknown function of the file cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp of the component Search Handler. The manipulation of the argument details leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is d345e6bc7798bd717a583ec7f545ca387819d5c7. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216960. |
2022-12-28 |
not yet calculated |
CVE-2018-25054 MISC MISC MISC |
farcry_solr_pro_plugin — farcry_solr_pro_plugin |
A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2018-25055 MISC MISC MISC MISC MISC |
yolapi — yolapi |
A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2018-25056 MISC MISC MISC |
simple_php_link_shortener — simple_php_link_shortener |
A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link[“id”] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996. |
2022-12-28 |
not yet calculated |
CVE-2018-25057 MISC MISC MISC |
twitter_post_fetcher — twitter_post_fetcher |
A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability. |
2022-12-29 |
not yet calculated |
CVE-2018-25058 MISC MISC MISC MISC MISC |
pastebinit — pastebinit |
A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040. |
2022-12-30 |
not yet calculated |
CVE-2018-25059 MISC MISC MISC MISC MISC |
macaron — csrf |
A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2018-25060 MISC MISC MISC MISC |
rgb2hex — rgb2hex |
A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151. |
2022-12-31 |
not yet calculated |
CVE-2018-25061 MISC MISC MISC MISC |
sierra_wireless — aleos |
The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow. |
2022-12-26 |
not yet calculated |
CVE-2019-11851 CONFIRM MISC |
sierra_wireless — mgos |
Sierra Wireless MGOS before 3.15.2 and 4.x before 4.3 allows attackers to read log files via a Direct Request (aka Forced Browsing). |
2022-12-26 |
not yet calculated |
CVE-2019-13988 MISC MISC |
hashicorp — nomad |
HashiCorp Nomad 0.5.0 through 0.9.4 (fixed in 0.9.5) reveals unintended environment variables to the rendering task during template rendering, aka GHSA-6hv3-7c34-4hx8. This applies to nomad/client/allocrunner/taskrunner/template. |
2022-12-26 |
not yet calculated |
CVE-2019-14802 MISC CONFIRM |
citrix — adc/gateway |
In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update. |
2022-12-26 |
not yet calculated |
CVE-2019-18177 MISC |
cloud_native_computing — harbor |
Cloud Native Computing Foundation Harbor before 1.10.3 and 2.x before 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists. |
2022-12-26 |
not yet calculated |
CVE-2019-19030 CONFIRM |
realtek — audio_drivers |
Realtek Audio Drivers for Windows, as used on the Lenovo ThinkPad X1 Carbon 20A7, 20A8, 20BS, and 20BT before 6.0.8882.1 and 20KH and 20KG before 6.0.8907.1 (and on many other Lenovo and non-Lenovo products), mishandles DLL preloading. |
2022-12-26 |
not yet calculated |
CVE-2019-19705 MISC |
tendermint — core |
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector. |
2022-12-27 |
not yet calculated |
CVE-2019-25072 MISC MISC MISC |
goa — goa |
Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory. |
2022-12-27 |
not yet calculated |
CVE-2019-25073 MISC MISC MISC |
hide_files — hide_files |
A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767. |
2022-12-25 |
not yet calculated |
CVE-2019-25084 MISC MISC MISC MISC MISC |
gnome — gvdb |
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability. |
2022-12-26 |
not yet calculated |
CVE-2019-25085 MISC MISC MISC |
iet-ou — open_media_player |
A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2019-25086 MISC MISC MISC MISC MISC MISC |
httpserver — httpserver |
A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: ‘../filedir’. The attack may be initiated remotely. The name of the patch is 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216863. |
2022-12-27 |
not yet calculated |
CVE-2019-25087 MISC MISC MISC |
oxidized_web — oxidized_web |
A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2019-25088 MISC MISC MISC MISC |
morgawr — muon |
A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2019-25089 MISC MISC MISC MISC |
freepbx — arimanager |
A vulnerability was found in FreePBX arimanager up to 13.0.5.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Views Handler. The manipulation of the argument dataurl leads to cross site scripting. The attack may be launched remotely. Upgrading to version 13.0.5.4 is able to address this issue. The name of the patch is 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. It is recommended to upgrade the affected component. VDB-216878 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2019-25090 MISC MISC MISC MISC |
nsupdate.info — nsupdate.info |
A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file src/nsupdate/settings/base.py of the component CSRF Cookie Handler. The manipulation of the argument CSRF_COOKIE_HTTPONLY leads to cookie without ‘httponly’ flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2019-25091 MISC MISC MISC MISC |
nakiami — mellivora |
A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry[‘ip’] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955. |
2022-12-28 |
not yet calculated |
CVE-2019-25092 MISC MISC MISC MISC |
pilz — pmc_programming_tool |
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames. |
2022-12-26 |
not yet calculated |
CVE-2019-9011 MISC |
nexenta — nexenta_stor |
An issue was discovered in Illumos in Nexenta NexentaStor 4.0.5 and 5.1.2, and other products. The SMB server allows an attacker to have unintended access, e.g., an attacker with WRITE_XATTR can change permissions. This occurs because of a combination of three factors: ZFS extended attributes are used to implement NT named streams, the SMB protocol requires implementations to have open handle semantics similar to those of NTFS, and the SMB server passes along certain attribute requests to the underlying object (i.e., they are not considered to be requests that pertain to the named stream). |
2022-12-26 |
not yet calculated |
CVE-2019-9579 MISC MISC |
jackson-databind — jackson-databind |
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider. |
2022-12-26 |
not yet calculated |
CVE-2020-10650 MISC CONFIRM MISC MISC CONFIRM MISC |
sierra_wireless — airlink_mobility_manager |
Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges. |
2022-12-26 |
not yet calculated |
CVE-2020-11101 MISC MISC |
pilz — pmc_programming_tool |
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user’s password may be changed by an attacker without knowledge of the current password. |
2022-12-26 |
not yet calculated |
CVE-2020-12067 MISC |
pilz — pmc_programming_tool |
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), the password-hashing feature requires insufficient computational effort. |
2022-12-26 |
not yet calculated |
CVE-2020-12069 MISC |
shilpi — cape_x_web |
Shilpi CAPExWeb 1.1 allows SQL injection via a servlet/capexweb.cap_sendMail GET request. |
2022-12-26 |
not yet calculated |
CVE-2020-24600 MISC |
togglz — togglz |
The console in Togglz before 2.9.4 allows CSRF. |
2022-12-26 |
not yet calculated |
CVE-2020-28191 CONFIRM CONFIRM CONFIRM |
httpengine.handle — httpengine.handle |
Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. |
2022-12-27 |
not yet calculated |
CVE-2020-36559 MISC MISC MISC MISC |
go-unzip — go-unzip |
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. |
2022-12-27 |
not yet calculated |
CVE-2020-36560 MISC MISC MISC MISC |
unzip — unzip |
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. |
2022-12-27 |
not yet calculated |
CVE-2020-36561 MISC MISC MISC MISC |
dht — dht |
Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector. |
2022-12-28 |
not yet calculated |
CVE-2020-36562 MISC MISC |
go-saml — go-saml |
XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input. |
2022-12-28 |
not yet calculated |
CVE-2020-36563 MISC MISC |
nosurf — nosurf |
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid. |
2022-12-27 |
not yet calculated |
CVE-2020-36564 MISC MISC MISC |
tar-utils — tar-utils |
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. |
2022-12-27 |
not yet calculated |
CVE-2020-36566 MISC MISC MISC |
gin — gin |
Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines. |
2022-12-27 |
not yet calculated |
CVE-2020-36567 MISC MISC MISC |
revel — revel |
Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation. |
2022-12-27 |
not yet calculated |
CVE-2020-36568 MISC MISC MISC MISC |
golang-nanoauth — golang-nanoauth |
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token. |
2022-12-27 |
not yet calculated |
CVE-2020-36569 MISC MISC MISC |
panel-builder — panel-builder |
A vulnerability classified as critical has been found in Modern Tribe Panel Builder Plugin. Affected is the function add_post_content_filtered_to_search_sql of the file ModularContent/SearchFilter.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4528d4f855dbbf24e9fc12a162fda84ce3bedc2f. It is recommended to apply a patch to fix this issue. VDB-216738 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2020-36626 MISC MISC MISC |
macaron — i18n |
A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2020-36627 MISC MISC MISC |
calsign — apde |
A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747. |
2022-12-25 |
not yet calculated |
CVE-2020-36628 MISC MISC MISC |
simbco — httpster |
A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748. |
2022-12-25 |
not yet calculated |
CVE-2020-36629 MISC MISC MISC |
freepbx — cdr |
A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771. |
2022-12-25 |
not yet calculated |
CVE-2020-36630 MISC MISC MISC MISC |
barronwaffles — dwc_network_server_emulator |
A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772. |
2022-12-25 |
not yet calculated |
CVE-2020-36631 MISC MISC MISC MISC |
hughsk — flat |
A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2020-36632 MISC MISC MISC MISC MISC MISC |
moodle-block_sitenews — moodle-block_sitenews |
A vulnerability was found in moodle-block_sitenews 1.0. It has been classified as problematic. This affects the function get_content of the file block_sitenews.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.1 is able to address this issue. The name of the patch is cd18d8b1afe464ae6626832496f4e070bac4c58f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216879. |
2022-12-27 |
not yet calculated |
CVE-2020-36633 MISC MISC MISC MISC MISC |
indeed_engineering — util |
A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2020-36634 MISC MISC MISC MISC |
openmrs — appointment_scheduling_module |
A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.13.0 is able to address this issue. The name of the patch is 34213c3f6ea22df427573076fb62744694f601d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216915. |
2022-12-27 |
not yet calculated |
CVE-2020-36635 MISC MISC MISC MISC MISC |
openmrs — admin_ui_module |
A vulnerability classified as problematic has been found in OpenMRS Admin UI Module up to 1.4.x. Affected is the function sendErrorMessage of the file omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java of the component Account Setup Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 702fbfdac7c4418f23bb5f6452482b4a88020061. It is recommended to upgrade the affected component. VDB-216918 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2020-36636 MISC MISC MISC MISC MISC |
wordpress — wordpress |
The Menu Item Visibility Control WordPress plugin through 0.5 doesn’t sanitize and validate the “Visibility logic” option for WordPress menu items, which could allow highly privileged users to execute arbitrary PHP code even in a hardened environment. |
2022-12-26 |
not yet calculated |
CVE-2021-24942 MISC |
wordpress — wordpress |
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php. |
2022-12-26 |
not yet calculated |
CVE-2021-30134 MISC |
glob-parent — glob-parent |
The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression. |
2022-12-26 |
not yet calculated |
CVE-2021-35065 CONFIRM CONFIRM MISC |
fastrack — reflex_2.0_activity_tracker |
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows an Unauthenticated Remote attacker to send a malicious firmware update via BLE and brick the device. |
2022-12-26 |
not yet calculated |
CVE-2021-35951 MISC MISC |
fastrack — reflex_2.0_activity_tracker |
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to change the time, date, and month via Bluetooth LE Characteristics on handle 0x0017. |
2022-12-26 |
not yet calculated |
CVE-2021-35952 MISC MISC |
fastrack — reflex_2.0_activity_tracker |
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to cause a Denial of Service (device outage) via crafted choices of the last three bytes of a characteristic value. |
2022-12-26 |
not yet calculated |
CVE-2021-35953 MISC MISC |
fastrack — reflex_2.0_activity_tracker |
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows physically proximate attackers to dump the firmware, flash custom malicious firmware, and brick the device via the Serial Wire Debug (SWD) feature. |
2022-12-26 |
not yet calculated |
CVE-2021-35954 MISC MISC |
go — golang.org/x/text |
golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack. |
2022-12-26 |
not yet calculated |
CVE-2021-38561 MISC MISC CONFIRM MISC |
philips — vue_pacs |
In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root. |
2022-12-26 |
not yet calculated |
CVE-2021-39369 MISC MISC MISC |
go-yaml — yaml |
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. |
2022-12-27 |
not yet calculated |
CVE-2021-4235 MISC MISC MISC |
web — websockets |
Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable. |
2022-12-27 |
not yet calculated |
CVE-2021-4236 MISC MISC |
goutils — goutils |
Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions. |
2022-12-27 |
not yet calculated |
CVE-2021-4238 MISC MISC |
noise — noise |
The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages. |
2022-12-27 |
not yet calculated |
CVE-2021-4239 MISC MISC |
dns-stats — hedgehog |
A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don’t believe this specific attack is possible without such a compromise of the Data Manager server. |
2022-12-25 |
not yet calculated |
CVE-2021-4276 MISC MISC MISC |
fredsmith — utils |
A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2021-4277 MISC MISC |
cronvel — tree-kit |
A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2021-4278 MISC MISC MISC MISC |
json-patch — json-patch |
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2021-4279 MISC MISC MISC MISC MISC |
stylerw — styler_praat_scripts |
A vulnerability was found in styler_praat_scripts. It has been classified as problematic. Affected is an unknown function of the file file_segmenter.praat of the component Slash Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The name of the patch is 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216780. |
2022-12-25 |
not yet calculated |
CVE-2021-4280 MISC MISC MISC |
brave_ux — for-the-badge |
A vulnerability was found in Brave UX for-the-badge and classified as critical. Affected by this issue is some unknown functionality of the file .github/workflows/combine-prs.yml. The manipulation leads to os command injection. The name of the patch is 55b5a234c0fab935df5fb08365bc8fe9c37cf46b. It is recommended to apply a patch to fix this issue. VDB-216842 is the identifier assigned to this vulnerability. |
2022-12-26 |
not yet calculated |
CVE-2021-4281 MISC MISC MISC MISC |
freepbx — voicemail |
A vulnerability was found in FreePBX voicemail. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file page.voicemail.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is 12e1469ef9208eda9d8955206e78345949236ee6. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216871. |
2022-12-27 |
not yet calculated |
CVE-2021-4282 MISC MISC MISC MISC |
freepbx — voicemail |
A vulnerability was found in FreeBPX voicemail. It has been rated as problematic. Affected by this issue is some unknown functionality of the file views/ssettings.php of the component Settings Handler. The manipulation of the argument key leads to cross site scripting. The attack may be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is ffce4882016076acd16fe0f676246905aa3cb2f3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216872. |
2022-12-27 |
not yet calculated |
CVE-2021-4283 MISC MISC MISC MISC |
openmrs — html_form_entry_ui_framework_integration_module |
A vulnerability classified as problematic has been found in OpenMRS HTML Form Entry UI Framework Integration Module up to 1.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 811990972ea07649ae33c4b56c61c3b520895f07. It is recommended to upgrade the affected component. The identifier VDB-216873 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2021-4284 MISC MISC MISC MISC MISC MISC |
nagiosenterprises — ncpa |
A vulnerability classified as problematic was found in Nagios NCPA. This vulnerability affects unknown code of the file agent/listener/templates/tail.html. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.4.0 is able to address this issue. The name of the patch is 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. It is recommended to upgrade the affected component. VDB-216874 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2021-4285 MISC MISC MISC MISC MISC |
cocagne — pysrp |
A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875. |
2022-12-27 |
not yet calculated |
CVE-2021-4286 MISC MISC MISC MISC MISC |
refirm_labs — binwalk |
A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 is able to address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876. |
2022-12-27 |
not yet calculated |
CVE-2021-4287 MISC MISC MISC MISC MISC |
openmrs — module-referenceapplication |
A vulnerability was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/userApp.gsp. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 35f81901a4cb925747a9615b8706f5079d2196a1. It is recommended to upgrade the affected component. The identifier VDB-216881 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2021-4288 MISC MISC MISC MISC MISC |
openmrs — module-referenceapplication |
A vulnerability classified as problematic was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. Affected by this vulnerability is the function post of the file omod/src/main/java/org/openmrs/module/referenceapplication/page/controller/UserAppPageController.java of the component User App Page. The manipulation of the argument AppId leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 0410c091d46eed3c132fe0fcafe5964182659f74. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216883. |
2022-12-27 |
not yet calculated |
CVE-2021-4289 MISC MISC MISC MISC MISC MISC |
dhbw — fallstudie |
A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907. |
2022-12-27 |
not yet calculated |
CVE-2021-4290 MISC MISC MISC |
openmrs — admin_ui_module |
A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916. |
2022-12-27 |
not yet calculated |
CVE-2021-4291 MISC MISC MISC MISC MISC |
openmrs — admin_ui_module |
A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2021-4292 MISC MISC MISC MISC MISC |
openshift — osin |
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987. |
2022-12-28 |
not yet calculated |
CVE-2021-4294 MISC MISC MISC MISC |
onc_code-validator-api — onc_code-validator-api |
A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability. |
2022-12-29 |
not yet calculated |
CVE-2021-4295 MISC MISC MISC MISC MISC |
w3c_unicorn –w3c_unicorn |
A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019. |
2022-12-29 |
not yet calculated |
CVE-2021-4296 MISC MISC MISC MISC |
multiple_products — multiple_products |
An issue was discovered in illumos before f859e7171bb5db34321e45585839c6c3200ebb90, OmniOS Community Edition r151038, OpenIndiana Hipster 2021.04, and SmartOS 20210923. A local unprivileged user can cause a deadlock and kernel panic via crafted rename and rmdir calls on tmpfs filesystems. Oracle Solaris 10 and 11 is also affected. |
2022-12-26 |
not yet calculated |
CVE-2021-43395 CONFIRM CONFIRM CONFIRM MISC MISC MISC MISC CONFIRM CONFIRM |
heimdal — heimdal |
Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. |
2022-12-26 |
not yet calculated |
CVE-2021-44758 MISC CONFIRM |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis. |
2022-12-26 |
not yet calculated |
CVE-2021-44854 MISC |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature. |
2022-12-26 |
not yet calculated |
CVE-2021-44855 MISC |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value. |
2022-12-26 |
not yet calculated |
CVE-2021-44856 MISC |
control_web_panel/control_web_panel — control_web_panel/control_web_panel |
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, attackers can make a crafted request to api/?api=add_server&DHCP= to add an authorized_keys text file in the /resources/ folder. |
2022-12-26 |
not yet calculated |
CVE-2021-45466 MISC MISC |
control_web_panel/control_web_panel — control_web_panel/control_web_panel |
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter. |
2022-12-26 |
not yet calculated |
CVE-2021-45467 MISC MISC |
metersphere — metersphere |
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere’s origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds. |
2022-12-28 |
not yet calculated |
CVE-2022-23544 MISC MISC |
alpine — alpine |
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows URL access filter bypass. This issue has been fixed in version 1.10.4. There are no known workarounds. |
2022-12-28 |
not yet calculated |
CVE-2022-23553 MISC MISC MISC |
alpine — alpine |
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows Authentication Filter bypass. The AuthenticationFilter relies on the request URI to evaluate if the user is accessing the swagger endpoint. By accessing a URL with a path such as /api/foo;%2fapi%2fswagger the contains condition will hold and will return from the authentication filter without aborting the request. Note that the principal object will not be assigned and therefore the issue wont allow user impersonation. This issue has been fixed in version 1.10.4. There are no known workarounds. |
2022-12-28 |
not yet calculated |
CVE-2022-23554 MISC MISC MISC |
authentik — authentik |
authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provided. The vulnerability allows an attacker that knows different invitation flows names (e.g. `enrollment-invitation-test` and `enrollment-invitation-admin`) via either different invite links or via brute forcing to signup via a single invitation url for any valid invite link received (it can even be a url for a third flow as long as it’s a valid invite) as the token used in the `Invitations` section of the Admin interface does NOT change when a different `enrollment flow` is selected via the interface and it is NOT bound to the selected flow, so it will be valid for any flow when used. This issue is patched in authentik 2022.11.4,2022.10.4 and 2022.12.0. Only configurations that use invitations and have multiple enrollment flows with invitation stages that grant different permissions are affected. The default configuration is not vulnerable, and neither are configurations with a single enrollment flow. As a workaround, fixed data can be added to invitations which can be checked in the flow to deny requests. Alternatively, an identifier with high entropy (like a UUID) can be used as flow slug, mitigating the attack vector by exponentially decreasing the possibility of discovering other flows. |
2022-12-28 |
not yet calculated |
CVE-2022-23555 MISC |
general_electric — inet/inet_ii |
Certain General Electric Renewable Energy products have inadequate encryption strength. This affects iNET and iNET II before 8.3.0. |
2022-12-26 |
not yet calculated |
CVE-2022-24116 MISC |
general_electric — inet/inet_ii |
Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6. |
2022-12-26 |
not yet calculated |
CVE-2022-24117 MISC |
general_electric — inet/inet_ii |
Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6. |
2022-12-26 |
not yet calculated |
CVE-2022-24118 MISC |
general_electric — inet/inet_ii |
Certain General Electric Renewable Energy products have a hidden feature for unauthenticated remote access to the device configuration shell. This affects iNET and iNET II before 8.3.0. |
2022-12-26 |
not yet calculated |
CVE-2022-24119 MISC |
general_electric — inet/inet_ii |
Certain General Electric Renewable Energy products store cleartext credentials in flash memory. This affects iNET and iNET II before 8.3.0. |
2022-12-26 |
not yet calculated |
CVE-2022-24120 MISC |
aws — sdk |
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. |
2022-12-27 |
not yet calculated |
CVE-2022-2582 MISC MISC |
golang — golang |
A race condition can cause incorrect HTTP request routing. |
2022-12-27 |
not yet calculated |
CVE-2022-2583 MISC MISC |
golang — dagpb |
The dag-pb codec can panic when decoding invalid blocks. |
2022-12-27 |
not yet calculated |
CVE-2022-2584 MISC MISC |
devolutions –remote_desktop_manager |
Weak password derivation for export in Devolutions Remote Desktop Manager before 2022.1 allows information disclosure via a password brute-force attack. An error caused base64 to be decoded. |
2022-12-26 |
not yet calculated |
CVE-2022-26964 CONFIRM |
directus — directus |
In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true. |
2022-12-26 |
not yet calculated |
CVE-2022-26969 MISC CONFIRM MISC MISC MISC |
open-xchange — app_suite |
OX App Suite through 8.2 allows XSS because BMFreehand10 and image/x-freehand are not blocked. |
2022-12-26 |
not yet calculated |
CVE-2022-29852 MISC CONFIRM |
open-xchange — app_suite |
OX App Suite through 8.2 allows XSS via a certain complex hierarchy that forces use of Show Entire Message for a huge HTML e-mail message. |
2022-12-26 |
not yet calculated |
CVE-2022-29853 MISC CONFIRM |
emerson — deltav_distributed_control_system |
Emerson DeltaV Distributed Control System (DCS) has insufficient verification of firmware integrity (an inadequate checksum approach, and no signature). This affects versions before 14.3 of DeltaV M-series, DeltaV S-series, DeltaV P-series, DeltaV SIS, and DeltaV CIOC/EIOC/WIOC IO cards. |
2022-12-26 |
not yet calculated |
CVE-2022-30260 MISC MISC |
reprise_software — rlm_license_administration |
XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field. |
2022-12-29 |
not yet calculated |
CVE-2022-30519 MISC |
go-yaml — go-yaml |
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. |
2022-12-27 |
not yet calculated |
CVE-2022-3064 MISC MISC MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class=”deep-link-app” for a /#!!&app=%2e./ URI. |
2022-12-26 |
not yet calculated |
CVE-2022-31469 CONFIRM MISC |
rockwell_automation — studio_5000_logix_emulate_software |
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. |
2022-12-27 |
not yet calculated |
CVE-2022-3156 MISC |
golang — golang |
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. |
2022-12-28 |
not yet calculated |
CVE-2022-3346 MISC MISC |
golang — golang |
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. |
2022-12-28 |
not yet calculated |
CVE-2022-3347 MISC MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can access or modify system files or other files that are critical to the application, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-34669 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-34670 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-34671 MISC |
nvidia — control_panel |
NVIDIA Control Panel for Windows contains a vulnerability where an unauthorized user or an unprivileged regular user can compromise the security of the software by gaining privileges, reading sensitive information, or executing commands. |
2022-12-30 |
not yet calculated |
CVE-2022-34672 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-34673 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak. |
2022-12-30 |
not yet calculated |
CVE-2022-34674 MISC |
nvidia — gpu_display_driver |
NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34675 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-34676 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-34677 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause a null-pointer dereference, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34678 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34679 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34680 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler, where improper input validation of a display-related data structure may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34681 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34682 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-34683 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an off-by-one error may lead to data tampering or information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-34684 MISC |
hazelcast — hazelcast/hazelcast_jet |
The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3. |
2022-12-29 |
not yet calculated |
CVE-2022-36437 MISC |
password_manager — password_manager |
Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter. |
2022-12-26 |
not yet calculated |
CVE-2022-36664 MISC MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature. |
2022-12-26 |
not yet calculated |
CVE-2022-37307 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages. |
2022-12-26 |
not yet calculated |
CVE-2022-37308 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name. |
2022-12-26 |
not yet calculated |
CVE-2022-37309 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI. |
2022-12-26 |
not yet calculated |
CVE-2022-37310 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large location request parameter to the redirect servlet. |
2022-12-26 |
not yet calculated |
CVE-2022-37311 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet. |
2022-12-26 |
not yet calculated |
CVE-2022-37312 CONFIRM MISC |
open-xchange — app_suite |
OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record. |
2022-12-26 |
not yet calculated |
CVE-2022-37313 CONFIRM MISC |
enlightenment –enlightenment_sys |
enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring. |
2022-12-25 |
not yet calculated |
CVE-2022-37706 MISC MISC MISC |
esri — arcgis |
There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets). |
2022-12-28 |
not yet calculated |
CVE-2022-38202 CONFIRM |
esri — arcgis |
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212. |
2022-12-29 |
not yet calculated |
CVE-2022-38203 MISC |
esri — arcgis |
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. |
2022-12-29 |
not yet calculated |
CVE-2022-38204 MISC |
esri — arcgis |
In some non-default installations of Esri Portal for ArcGIS versions 10.9.1 and below, a directory traversal issue may allow a remote, unauthenticated attacker to traverse the file system and lead to the disclosure of sensitive data (not customer-published content). |
2022-12-29 |
not yet calculated |
CVE-2022-38205 MISC |
esri — arcgis |
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser. |
2022-12-29 |
not yet calculated |
CVE-2022-38206 MISC |
esri — arcgis |
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked which could execute arbitrary JavaScript code in the victim’s browser. |
2022-12-29 |
not yet calculated |
CVE-2022-38207 MISC |
esri — arcgis |
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks. |
2022-12-29 |
not yet calculated |
CVE-2022-38208 MISC |
esri — arcgis |
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser. |
2022-12-29 |
not yet calculated |
CVE-2022-38209 MISC |
esri — arcgis |
There is a reflected HTML injection vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser. |
2022-12-29 |
not yet calculated |
CVE-2022-38210 CONFIRM |
esri — arcgis |
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.9.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212. |
2022-12-29 |
not yet calculated |
CVE-2022-38211 CONFIRM |
esri — arcgis |
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38203. |
2022-12-29 |
not yet calculated |
CVE-2022-38212 MISC |
wordpress — wordpress |
The Kwayy HTML Sitemap WordPress plugin before 4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-3835 MISC |
wordpress — wordpress |
The Login for Google Apps WordPress plugin before 3.4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-3840 MISC |
huawei — aslan_childrens_watch |
Huawei Aslan Children’s Watch has an improper input validation vulnerability. Successful exploitation may cause the watch’s application service abnormal. |
2022-12-28 |
not yet calculated |
CVE-2022-39012 MISC |
wordpress — wordpress |
The Broken Link Checker WordPress plugin before 1.11.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) |
2022-12-28 |
not yet calculated |
CVE-2022-3922 MISC |
intelbras — wifiber_120ac_inmesh |
Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute. |
2022-12-25 |
not yet calculated |
CVE-2022-40005 MISC MISC |
wordpress — wordpress |
The Paytium: Mollie payment forms & donations WordPress plugin through 4.3.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4042 MISC |
wordpress — wordpress |
The Return Refund and Exchange For WooCommerce WordPress plugin before 4.0.9 does not validate attachment files to be uploaded via an AJAX action available to unauthenticated users, which could allow them to upload arbitrary files such as PHP and lead to RCE |
2022-12-26 |
not yet calculated |
CVE-2022-4047 MISC |
wordpress — wordpress |
The Eventify™ WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4110 MISC |
wordpress — wordpress |
The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection. |
2022-12-26 |
not yet calculated |
CVE-2022-4117 MISC |
wordpress — wordpress |
The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain |
2022-12-26 |
not yet calculated |
CVE-2022-4120 MISC |
squid — squid |
An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7. |
2022-12-25 |
not yet calculated |
CVE-2022-41317 MISC MISC CONFIRM MISC |
squid — squid |
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7. |
2022-12-25 |
not yet calculated |
CVE-2022-41318 MISC MISC MISC CONFIRM |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4150 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id GET parameter before concatenating it to an SQL query in export-images-data.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4151 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5, Contest Gallery Pro WordPress plugin before 19.1.5 do not escape the option_id POST parameter before concatenating it to an SQL query in edit-options.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4152 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the upload[] POST parameter before concatenating it to an SQL query in get-data-create-upload-v10.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4153 MISC MISC |
wordpress — wordpress |
The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4154 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4155 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4156 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4157 MISC MISC |
huawei — multiple_products |
There is an insufficient authentication vulnerability in some Huawei band products. Successful exploit could allow the attacker to spoof then connect to the band. |
2022-12-28 |
not yet calculated |
CVE-2022-41579 MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4158 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4159 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4160 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_start POST parameter before concatenating it to an SQL query in copy-gallery-images.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4161 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4162 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_deactivate and cg_activate POST parameters before concatenating it to an SQL query in 2_deactivate.php and 4_activate.php, respectively. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4163 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_multiple_files_for_post POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4164 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4165 MISC MISC |
wordpress — wordpress |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the addCountS POST parameter before concatenating it to an SQL query in 4_activate.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. |
2022-12-26 |
not yet calculated |
CVE-2022-4166 MISC MISC |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users. |
2022-12-26 |
not yet calculated |
CVE-2022-41765 MISC |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup. |
2022-12-26 |
not yet calculated |
CVE-2022-41767 MISC |
xstream — xstream |
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable. |
2022-12-28 |
not yet calculated |
CVE-2022-41966 MISC MISC |
hyperadev — dragonfly |
Dragonfly is a Java runtime dependency management library. Dragonfly v0.3.0-SNAPSHOT does not configure DocumentBuilderFactory to prevent XML external entity (XXE) attacks. This issue is patched in 0.3.1-SNAPSHOT. As a workaround, since Dragonfly only parses XML `SNAPSHOT` versions are being resolved, this vulnerability may be avoided by not trying to resolve `SNAPSHOT` versions. |
2022-12-28 |
not yet calculated |
CVE-2022-41967 MISC MISC |
wordpress — wordpress |
The Sliderby10Web WordPress plugin before 1.2.53 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4197 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-42254 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-42255 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-42256 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42257 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-42258 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42259 MISC |
wordpress — wordpress |
The Simple Basic Contact Form WordPress plugin before 20221201 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4226 MISC |
nvidia — gpu_display_driver |
NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-42260 MISC |
nvidia — vgpu_manager |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42261 MISC |
nvidia — vgpu_manager |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42262 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-42263 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42264 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-42265 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can cause exposure of sensitive information to an actor that is not explicitly authorized to have access to that information, which may lead to limited information disclosure. |
2022-12-30 |
not yet calculated |
CVE-2022-42266 MISC |
nvidia — gpu_display_driver |
NVIDIA GPU Display Driver for Windows contains a vulnerability where a regular user can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. |
2022-12-30 |
not yet calculated |
CVE-2022-42267 MISC |
nvidia — trusted_os |
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components. |
2022-12-30 |
not yet calculated |
CVE-2022-42269 MISC |
wordpress — wordpress |
The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting |
2022-12-26 |
not yet calculated |
CVE-2022-4227 MISC |
nvidia — multiple_products |
NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service. |
2022-12-30 |
not yet calculated |
CVE-2022-42270 MISC |
wordpress — wordpress |
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id. |
2022-12-26 |
not yet calculated |
CVE-2022-4239 MISC |
wordpress — wordpress |
The WP Google Review Slider WordPress plugin before 11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4242 MISC |
wordpress — wordpress |
The ImageInject WordPress plugin through TODO does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2022-12-26 |
not yet calculated |
CVE-2022-4243 MISC |
wordpress — wordpress |
The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack |
2022-12-26 |
not yet calculated |
CVE-2022-4266 MISC |
wordpress — wordpress |
The Bulk Delete Users by Email WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting |
2022-12-26 |
not yet calculated |
CVE-2022-4267 MISC |
wordpress — wordpress |
The Plugin Logic WordPress plugin through 1.0.7 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin |
2022-12-26 |
not yet calculated |
CVE-2022-4268 MISC MISC |
samba — kerberos/ad_dc
heimdal — heimdal
|
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has “a similar bug.” |
2022-12-25 |
not yet calculated |
CVE-2022-42898 CONFIRM MISC MISC CONFIRM CONFIRM CONFIRM CONFIRM |
zkteco — multiple_products |
Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210). |
2022-12-25 |
not yet calculated |
CVE-2022-42953 MISC MISC |
apache — kylin |
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. |
2022-12-30 |
not yet calculated |
CVE-2022-43396 MISC |
curl — curl |
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded. |
2022-12-23 |
not yet calculated |
CVE-2022-43551 MISC MISC |
simmeth — lieferantenmanager |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure. |
2022-12-25 |
not yet calculated |
CVE-2022-44015 MISC |
simmeth — lieferantenmanager |
An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim’s account after the victim logged out – /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout. |
2022-12-25 |
not yet calculated |
CVE-2022-44017 MISC |
sourcecodester — sanitization_management_system |
SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection. |
2022-12-30 |
not yet calculated |
CVE-2022-44137 MISC |
huawei — aslan_children_watch |
Huawei Aslan Children’s Watch has a path traversal vulnerability. Successful exploitation may allow attackers to access or modify protected system resources. |
2022-12-28 |
not yet calculated |
CVE-2022-44564 MISC |
apache — kylin |
Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request. |
2022-12-30 |
not yet calculated |
CVE-2022-44621 MISC |
heimdal — heimdal |
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). |
2022-12-25 |
not yet calculated |
CVE-2022-44640 CONFIRM |
slixmpp — slixmpp |
Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp. |
2022-12-25 |
not yet calculated |
CVE-2022-45197 MISC MISC MISC CONFIRM |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated request of MQTT credentials. An attacker can obtain encrypted MQTT credentials by sending a specific crafted packet to the vulnerable interface (the credentials cannot be directly exploited). |
2022-12-27 |
not yet calculated |
CVE-2022-45423 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated request of AES crypto key. An attacker can obtain the AES crypto key by sending a specific crafted packet to the vulnerable interface. |
2022-12-27 |
not yet calculated |
CVE-2022-45424 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-45425 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unrestricted download of file. After obtaining the permissions of ordinary users, by sending a specific crafted packet to the vulnerable interface, an attacker can download arbitrary files. |
2022-12-27 |
not yet calculated |
CVE-2022-45426 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files. |
2022-12-27 |
not yet calculated |
CVE-2022-45427 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of sensitive information leakage. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can obtain the debugging information. |
2022-12-27 |
not yet calculated |
CVE-2022-45428 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules. |
2022-12-27 |
not yet calculated |
CVE-2022-45429 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service. |
2022-12-27 |
not yet calculated |
CVE-2022-45430 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server. |
2022-12-27 |
not yet calculated |
CVE-2022-45431 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server. |
2022-12-27 |
not yet calculated |
CVE-2022-45432 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results. |
2022-12-27 |
not yet calculated |
CVE-2022-45433 MISC |
dahua — multiple_products |
Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host. |
2022-12-27 |
not yet calculated |
CVE-2022-45434 MISC |
hillstone — firewall |
https://www.hillstonenet.com.cn/ Hillstone Firewall SG-6000 <= 5.0.4.0 is vulnerable to Incorrect Access Control. There is a permission bypass vulnerability in the Hillstone WEB application firewall. An attacker can enter the background of the firewall with super administrator privileges through a configuration error in report.m. |
2022-12-27 |
not yet calculated |
CVE-2022-45778 MISC |
huawei — aslan_children_watch |
Huawei Aslan Children’s Watch has an improper authorization vulnerability. Successful exploit could allow the attacker to access certain file. |
2022-12-28 |
not yet calculated |
CVE-2022-45874 MISC |
planet_estream — planet_estream |
Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter). |
2022-12-25 |
not yet calculated |
CVE-2022-45889 MISC |
planet_estream — planet_estream |
In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter). |
2022-12-25 |
not yet calculated |
CVE-2022-45890 MISC |
planet_estream — planet_estream |
Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList). |
2022-12-25 |
not yet calculated |
CVE-2022-45891 MISC |
planet_estream — planet_estream |
In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username. |
2022-12-25 |
not yet calculated |
CVE-2022-45892 MISC |
planet_estream — planet_estream |
Planet eStream before 6.72.10.07 allows a low-privileged user to gain access to administrative and high-privileged user accounts by changing the value of the ON cookie. A brute-force attack can calculate a value that provides permanent access. |
2022-12-25 |
not yet calculated |
CVE-2022-45893 MISC |
planet_estream — planet_estream |
GetFile.aspx in Planet eStream before 6.72.10.07 allows .. directory traversal to read arbitrary local files. |
2022-12-25 |
not yet calculated |
CVE-2022-45894 MISC |
planet_estream — planet_estream |
Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure). |
2022-12-25 |
not yet calculated |
CVE-2022-45895 MISC |
planet_estream — planet_estream |
Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution. |
2022-12-25 |
not yet calculated |
CVE-2022-45896 MISC |
h3c_firewall — h3c_firewall |
h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-45963 MISC |
authentik — authentik |
authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4. |
2022-12-28 |
not yet calculated |
CVE-2022-46172 MISC |
elrondnetwork — elrond-go |
Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn’t found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50. |
2022-12-28 |
not yet calculated |
CVE-2022-46173 MISC MISC MISC |
amazon — elastic_file_system |
efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later. |
2022-12-28 |
not yet calculated |
CVE-2022-46174 MISC MISC MISC |
metersphere — metersphere |
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds. |
2022-12-29 |
not yet calculated |
CVE-2022-46178 MISC |
liuos — liuos |
LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to “” (no quotes) to null the variable and force credential checks. |
2022-12-28 |
not yet calculated |
CVE-2022-46179 MISC MISC |
gotify — gotify |
Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won’t natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory. |
2022-12-29 |
not yet calculated |
CVE-2022-46181 MISC MISC MISC |
dedecms — dedecms |
dedecms <=V5.7.102 is vulnerable to SQL Injection. In sys_ sql_ n query.php there are no restrictions on the sql query. |
2022-12-27 |
not yet calculated |
CVE-2022-46442 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the user_edit_page parameter in the wifi_captive_portal function. |
2022-12-30 |
not yet calculated |
CVE-2022-46580 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.nslookup_target parameter in the tools_nslookup function. |
2022-12-30 |
not yet calculated |
CVE-2022-46581 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the login_name parameter in the do_graph_auth (sub_4061E0) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46582 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reboot_type parameter in the wizard_ipv6 (sub_41C380) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46583 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_deny (sub_415D7C) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46584 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the REMOTE_USER parameter in the get_access (sub_45AC2C) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46585 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow (sub_415B00) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46586 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46588 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_option parameter in the tools_netstat (sub_41E730) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46589 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_rsname parameter in the tools_netstat (sub_41E730) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46590 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reject_url parameter in the reject (sub_41BD60) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46591 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the set_sta_enrollee_pin_5g function. |
2022-12-30 |
not yet calculated |
CVE-2022-46592 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the do_sta_enrollee_wifi function. |
2022-12-30 |
not yet calculated |
CVE-2022-46593 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the update_file_name parameter in the auto_up_fw (sub_420A04) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46594 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the del_num parameter in the icp_delete_img (sub_41DEDC) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46596 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46597 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_5g function. |
2022-12-30 |
not yet calculated |
CVE-2022-46598 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setlogo_num parameter in the icp_setlogo_img (sub_41DBF4) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46599 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_24g function. |
2022-12-30 |
not yet calculated |
CVE-2022-46600 MISC |
trendnet — tew755AP_1.13B01 |
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setbg_num parameter in the icp_setbg_img (sub_41DD68) function. |
2022-12-30 |
not yet calculated |
CVE-2022-46601 MISC |
huawei — ws7100-20 |
There is a denial of service vulnerability in the Wi-Fi module of the HUAWEI WS7100-20 Smart WiFi Router.Successful exploit could cause a denial of service (DoS) condition. |
2022-12-28 |
not yet calculated |
CVE-2022-46740 MISC |
trueconf_server — trueconf_server |
A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 allows a low-privileged database user to execute arbitrary SQL commands as the database administrator, resulting in execution of arbitrary code. |
2022-12-27 |
not yet calculated |
CVE-2022-46763 MISC MISC |
trueconf_server — trueconf_server |
A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution. |
2022-12-27 |
not yet calculated |
CVE-2022-46764 MISC MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-27 |
not yet calculated |
CVE-2022-4691 MISC CONFIRM |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-27 |
not yet calculated |
CVE-2022-4694 CONFIRM MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-27 |
not yet calculated |
CVE-2022-4695 CONFIRM MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47115 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the SYSPS parameter at /goform/SysToolChangePwd. |
2022-12-30 |
not yet calculated |
CVE-2022-47116 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47117 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47118 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the ssid parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47119 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47120 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47121 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd_5g parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47122 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47123 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47124 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47125 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47126 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47127 MISC |
tenda — a15 |
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet. |
2022-12-30 |
not yet calculated |
CVE-2022-47128 MISC |
ikus060 — rdiffweb |
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4719 MISC CONFIRM |
ikus060 — rdiffweb |
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4720 CONFIRM MISC |
ikus060 — rdiffweb |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4721 CONFIRM MISC |
ikus060 — rdiffweb |
Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4722 MISC CONFIRM |
ikus060 — rdiffweb |
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4723 MISC CONFIRM |
ikus060 — rdiffweb |
Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5. |
2022-12-27 |
not yet calculated |
CVE-2022-4724 MISC CONFIRM |
aws — sdk |
A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4725 MISC MISC MISC MISC |
sourcecodester — sanitization_management_system |
A vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739. |
2022-12-27 |
not yet calculated |
CVE-2022-4726 MISC |
openmrs — appointment_scheduling_module |
A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4727 MISC MISC MISC MISC |
graphite — web |
A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4728 MISC MISC MISC MISC |
graphite — web |
A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743. |
2022-12-27 |
not yet calculated |
CVE-2022-4729 MISC MISC MISC MISC |
graphite — web |
A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744. |
2022-12-27 |
not yet calculated |
CVE-2022-4730 MISC MISC MISC MISC |
myapnea — myapnea |
A vulnerability, which was classified as problematic, was found in myapnea up to 29.0.x. Affected is an unknown function of the component Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 29.1.0 is able to address this issue. The name of the patch is 99934258530d761bd5d09809bfa6c14b598f8d18. It is recommended to upgrade the affected component. VDB-216750 is the identifier assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2022-4731 MISC MISC MISC MISC |
microweber — microweber |
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2. |
2022-12-27 |
not yet calculated |
CVE-2022-4732 CONFIRM MISC |
openemr — openemr |
Cross-site Scripting (XSS) – Stored in GitHub repository openemr/openemr prior to 7.0.0.2. |
2022-12-27 |
not yet calculated |
CVE-2022-4733 MISC CONFIRM |
usememos — memos |
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-27 |
not yet calculated |
CVE-2022-4734 CONFIRM MISC |
asrashley — dash-live |
A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. It is recommended to apply a patch to fix this issue. VDB-216766 is the identifier assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2022-4735 MISC MISC MISC MISC |
venganzas_del_pasado — venganzas_del_pasado |
A vulnerability was found in Venganzas del Pasado and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument the_title leads to cross site scripting. The attack may be launched remotely. The name of the patch is 62339b2ec445692c710b804bdf07aef4bd247ff7. It is recommended to apply a patch to fix this issue. VDB-216770 is the identifier assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2022-4736 MISC MISC MISC MISC |
sourcecodester — blood_management_system |
A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2022-4737 MISC MISC |
sourcecodester — blood_management_system |
A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability. |
2022-12-25 |
not yet calculated |
CVE-2022-4738 MISC MISC |
sourcecodester — blood_management_system |
A vulnerability classified as critical was found in SourceCodester School Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216775. |
2022-12-25 |
not yet calculated |
CVE-2022-4739 MISC MISC |
kkfileview — kkfileview |
A vulnerability, which was classified as problematic, has been found in kkFileView. Affected by this issue is the function setWatermarkAttribute of the file /picturesPreview. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216776. |
2022-12-25 |
not yet calculated |
CVE-2022-4740 MISC MISC MISC |
docconv — docconv |
A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779. |
2022-12-25 |
not yet calculated |
CVE-2022-4741 MISC MISC MISC MISC MISC |
json-pointer — json-pointer |
A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability. |
2022-12-26 |
not yet calculated |
CVE-2022-4742 MISC MISC MISC MISC |
flatpress — flatpress |
A vulnerability was found in FlatPress. It has been classified as critical. This affects the function doItemActions of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component File Delete Handler. The manipulation of the argument deletefile leads to path traversal. The name of the patch is 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. It is recommended to apply a patch to fix this issue. The identifier VDB-216861 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4748 MISC MISC MISC MISC |
flatpress — flatpress |
A vulnerability was found in FlatPress and classified as problematic. This issue affects the function main of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component Media Manager Plugin. The manipulation of the argument mm-newgallery-name leads to cross site scripting. The attack may be initiated remotely. The name of the patch is d3f329496536dc99f9707f2f295d571d65a496f5. It is recommended to apply a patch to fix this issue. The identifier VDB-216869 was assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4755 MISC MISC MISC MISC |
dolibarr_project_timesheet — dolibarr_project_timesheet |
A vulnerability was found in dolibarr_project_timesheet up to 4.5.5. It has been declared as problematic. This vulnerability affects unknown code of the component Form Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. Upgrading to version 4.5.6.a is able to address this issue. The name of the patch is 082282e9dab43963e6c8f03cfaddd7921de377f4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216880. |
2022-12-27 |
not yet calculated |
CVE-2022-4766 MISC MISC MISC MISC MISC |
usememos — memos |
Denial of Service in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-27 |
not yet calculated |
CVE-2022-4767 CONFIRM MISC |
dropbox — merou |
A vulnerability was found in Dropbox merou. It has been classified as critical. Affected is the function add_public_key of the file grouper/public_key.py of the component SSH Public Key Handler. The manipulation of the argument public_key_str leads to injection. It is possible to launch the attack remotely. The name of the patch is d93087973afa26bc0a2d0a5eb5c0fde748bdd107. It is recommended to apply a patch to fix this issue. VDB-216906 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4768 MISC MISC MISC MISC |
widoco — widoco |
A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability. |
2022-12-27 |
not yet calculated |
CVE-2022-4772 MISC MISC MISC MISC |
elvexys — streamx |
StreamX applications from versions 6.02.01 to 6.04.34 are affected by a path traversal vulnerability that allows authenticated users to get unauthorized access to files on the server’s filesystem. StreamX applications using StreamView HTML component with the public web server feature activated are affected. |
2022-12-29 |
not yet calculated |
CVE-2022-4778 MISC |
elvexys — streamx |
StreamX applications from versions 6.02.01 to 6.04.34 are affected by a logic bug that allows to bypass the implemented authentication scheme. StreamX applications using StreamView HTML component with the public web server feature activated are affected. |
2022-12-29 |
not yet calculated |
CVE-2022-4779 MISC |
elvexys — streamx |
ISOS firmwares from versions 1.81 to 2.00 contain hardcoded credentials from embedded StreamX installer that integrators are not forced to change. |
2022-12-29 |
not yet calculated |
CVE-2022-4780 MISC |
linux — kernel |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case. |
2022-12-23 |
not yet calculated |
CVE-2022-47943 MISC MISC MISC MLIST |
linux — kernel |
An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq. |
2022-12-23 |
not yet calculated |
CVE-2022-47946 MISC MISC MLIST |
usememos — memos |
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4796 MISC CONFIRM |
heimdall — application_dashboard |
Heimdall Application Dashboard through 2.5.4 allows reflected and stored XSS via “Application name” to the “Add application” page. The stored XSS will be triggered in the “Application list” page. |
2022-12-27 |
not yet calculated |
CVE-2022-47968 MISC MISC |
usememos — memos |
Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4797 MISC CONFIRM |
usememos — memos |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4798 MISC CONFIRM |
usememos — memos |
Improper Authentication in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4799 MISC CONFIRM |
usememos — memos |
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4800 MISC CONFIRM |
usememos — memos |
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4801 MISC CONFIRM |
usememos — memos |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4802 MISC CONFIRM |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4803 MISC CONFIRM |
usememos — memos |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4804 MISC CONFIRM |
usememos — memos |
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4805 CONFIRM MISC |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4806 MISC CONFIRM |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4807 MISC CONFIRM |
usememos — memos |
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4808 MISC CONFIRM |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4809 MISC CONFIRM |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4810 MISC CONFIRM |
usememos — memos |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4811 MISC CONFIRM |
usememos — memos |
Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4812 MISC CONFIRM |
usememos — memos |
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4813 MISC CONFIRM |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-28 |
not yet calculated |
CVE-2022-4814 MISC CONFIRM |
centic9 — jgit-cookbook |
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988. |
2022-12-28 |
not yet calculated |
CVE-2022-4817 MISC MISC MISC MISC |
talend — open studio for mdm |
A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2022-4818 MISC MISC MISC MISC MISC |
hotcrp — hotcrp |
A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2022-4819 MISC MISC MISC |
tp-link — tl-wr902ac |
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate. |
2022-12-30 |
not yet calculated |
CVE-2022-48194 MISC |
mellium — mellium.im/sasl |
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication. |
2022-12-31 |
not yet calculated |
CVE-2022-48195 MISC |
N/A — N/A |
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. |
2022-12-30 |
not yet calculated |
CVE-2022-48196 MISC MISC |
netgear — multiple_products |
A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999. |
2022-12-28 |
not yet calculated |
CVE-2022-4820 MISC MISC MISC MISC |
flatpress — flatpress |
A vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000. |
2022-12-28 |
not yet calculated |
CVE-2022-4821 MISC MISC MISC MISC |
flatpress — flatpress |
A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2022-4822 MISC MISC MISC MISC |
flatpress — flatpress |
A vulnerability, which was classified as problematic, was found in InSTEDD Nuntium. Affected is an unknown function of the file app/controllers/geopoll_controller.rb. The manipulation of the argument signature leads to observable timing discrepancy. It is possible to launch the attack remotely. The name of the patch is 77236f7fd71a0e2eefeea07f9866b069d612cf0d. It is recommended to apply a patch to fix this issue. VDB-217002 is the identifier assigned to this vulnerability. |
2022-12-28 |
not yet calculated |
CVE-2022-4823 MISC MISC MISC |
instedd — nuntium |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4839 CONFIRM MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4840 MISC CONFIRM |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4841 MISC CONFIRM |
radareorg — radare2 |
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. |
2022-12-29 |
not yet calculated |
CVE-2022-4843 CONFIRM MISC |
usememos — memos |
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4844 CONFIRM MISC |
usememos — memos |
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4845 MISC CONFIRM |
usememos — memos |
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4846 MISC CONFIRM |
usememos — memos |
Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4847 MISC CONFIRM |
usememos — memos |
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4848 MISC CONFIRM |
usememos — memos |
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4849 CONFIRM MISC |
usememos — memos |
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4850 MISC CONFIRM |
usememos — memos |
Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-29 |
not yet calculated |
CVE-2022-4851 MISC CONFIRM |
sourcecodester — lead_management_system |
A vulnerability, which was classified as critical, was found in SourceCodester Lead Management System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-217020. |
2022-12-30 |
not yet calculated |
CVE-2022-4855 MISC MISC MISC |
modbus_tools — modbus_slave |
A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2022-4856 MISC MISC MISC MISC |
modbus_tools — modbus_slave |
A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability. |
2022-12-30 |
not yet calculated |
CVE-2022-4857 MISC MISC MISC MISC |
m-files — server |
Insertion of Sensitive Information into Log Files in M-Files Server before 22.10.11846.0 could allow to obtain sensitive tokens from logs, if specific configurations were set. |
2022-12-30 |
not yet calculated |
CVE-2022-4858 MISC |
joget — joget |
A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The name of the patch is 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055. |
2022-12-30 |
not yet calculated |
CVE-2022-4859 MISC MISC MISC MISC |
kbase — metrics |
A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The name of the patch is 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059. |
2022-12-30 |
not yet calculated |
CVE-2022-4860 MISC MISC MISC MISC |
m-files — client |
Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource. |
2022-12-30 |
not yet calculated |
CVE-2022-4861 MISC |
usememos — memos |
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-30 |
not yet calculated |
CVE-2022-4863 MISC CONFIRM |
froxlor — froxlor |
Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. |
2022-12-30 |
not yet calculated |
CVE-2022-4864 MISC CONFIRM |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-31 |
not yet calculated |
CVE-2022-4865 CONFIRM MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. |
2022-12-31 |
not yet calculated |
CVE-2022-4866 CONFIRM MISC |
froxlor — froxlor |
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. |
2022-12-31 |
not yet calculated |
CVE-2022-4867 MISC CONFIRM |
froxlor — froxlor |
Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. |
2022-12-31 |
not yet calculated |
CVE-2022-4868 CONFIRM MISC |
by Scott Muniz | Dec 28, 2022 | Security, Technology
This article is contributed. See the original author and article here.
mozilla — multiple_products |
An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360). |
2022-12-22 |
not yet calculated |
CVE-2020-15679 MISC MISC MISC MISC |
mozilla — thunderbird |
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. |
2022-12-22 |
not yet calculated |
CVE-2020-15685 MISC MISC |
is.js — is.js |
is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever.” This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue. |
2022-12-22 |
not yet calculated |
CVE-2020-26302 CONFIRM MISC |
furqan — furqan |
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252. |
2022-12-19 |
not yet calculated |
CVE-2020-36618 N/A N/A N/A |
multimon-ng — multimon-ng |
A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability. |
2022-12-19 |
not yet calculated |
CVE-2020-36619 N/A N/A N/A N/A |
brondahl — enumstringvalues |
A vulnerability was found in Brondahl EnumStringValues up to 4.0.0. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.1 is able to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2020-36620 N/A N/A MISC |
chedabob — whatismyudid |
A vulnerability, which was classified as problematic, has been found in chedabob whatismyudid. Affected by this issue is the function exports.enrollment of the file routes/mobileconfig.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is bb33d4325fba80e7ea68b79121dba025caf6f45f. It is recommended to apply a patch to fix this issue. VDB-216470 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2020-36621 N/A N/A |
sah-comp — bienlein |
A vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2020-36622 N/A N/A |
pengu — pengu |
A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475. |
2022-12-21 |
not yet calculated |
CVE-2020-36623 N/A N/A |
ahorner — text-helpers |
A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520. |
2022-12-22 |
not yet calculated |
CVE-2020-36624 MISC MISC MISC MISC |
activity_watch — activity_watch |
Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file. |
2022-12-23 |
not yet calculated |
CVE-2021-32692 CONFIRM |
openatom_foundation — openeuler |
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). |
2022-12-19 |
not yet calculated |
CVE-2021-33640 MISC |
beijing — baidunetdisk |
Untrusted search path vulnerability in Baidunetdisk Version 7.4.3 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. |
2022-12-22 |
not yet calculated |
CVE-2021-36631 MISC |
mozilla — thunderbird |
When receiving an OpenPGP/MIME signed email message that contains an additional outer MIME message layer, for example a message footer added by a mailing list gateway, Thunderbird only considered the inner signed message for the signature validity. This gave the false impression that the additional contents were also covered by the digital signature. Starting with Thunderbird version 91.4.1, only the signature that belongs to the top level MIME part will be considered for the displayed status. This vulnerability affects Thunderbird < 91.4.1. |
2022-12-22 |
not yet calculated |
CVE-2021-4126 MISC MISC |
mozilla — multiple_products |
An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited. This vulnerability affects Thunderbird < 78.9 and Firefox ESR < 78.9. |
2022-12-22 |
not yet calculated |
CVE-2021-4127 MISC MISC MISC |
mozilla — firefox_for_macos |
When transitioning in and out of fullscreen mode, a graphics object was not correctly protected; resulting in memory corruption and a potentially exploitable crash. *This bug only affects Firefox on MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95. |
2022-12-22 |
not yet calculated |
CVE-2021-4128 MISC MISC |
mozilla — multiple_products |
Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0. |
2022-12-22 |
not yet calculated |
CVE-2021-4129 MISC MISC MISC MISC |
mozilla — multiple_products |
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2021-4140 MISC MISC MISC MISC |
criego — active_attr |
A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.2. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to the public and may be used. Upgrading to version 0.15.3 is able to address this issue. The name of the patch is dab95e5843b01525444b82bd7b336ef1d79377df. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216207. |
2022-12-18 |
not yet calculated |
CVE-2021-4250 N/A N/A N/A N/A MISC |
phpredisadmin– phpredisadmin |
A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. Upgrading to version 1.16.2 is able to address this issue. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216267. |
2022-12-19 |
not yet calculated |
CVE-2021-4259 N/A N/A MISC |
oils-js — oils-js |
A vulnerability was found in oils-js. It has been declared as critical. This vulnerability affects unknown code of the file core/Web.js. The manipulation leads to open redirect. The attack can be initiated remotely. The name of the patch is fad8fbae824a7d367dacb90d56cb02c5cb999d42. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216268. |
2022-12-19 |
not yet calculated |
CVE-2021-4260 N/A N/A |
platzhersh — pacman-canvas |
A vulnerability classified as critical has been found in pacman-canvas up to 1.0.5. Affected is the function addHighscore of the file data/db-handler.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 29522c90ca1cebfce6453a5af5a45281d99b0646. It is recommended to upgrade the affected component. VDB-216270 is the identifier assigned to this vulnerability. |
2022-12-19 |
not yet calculated |
CVE-2021-4261 N/A N/A N/A |
laravel-jqgrid — laravel-jqgrid |
A vulnerability classified as critical was found in laravel-jqgrid. Affected by this vulnerability is the function getRows of the file src/Mgallegos/LaravelJqgrid/Repositories/EloquentRepositoryAbstract.php. The manipulation leads to sql injection. The name of the patch is fbc2d94f43d0dc772767a5bdb2681133036f935e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216271. |
2022-12-19 |
not yet calculated |
CVE-2021-4262 N/A N/A N/A |
leanote — leanote |
A vulnerability, which was classified as problematic, has been found in leanote. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The name of the patch is https:/github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4263 N/A N/A |
linkedin — dustjs |
A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. |
2022-12-21 |
not yet calculated |
CVE-2021-4264 N/A N/A N/A N/A MISC MISC |
siwapp — siwapp-ror |
A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216467. |
2022-12-21 |
not yet calculated |
CVE-2021-4265 N/A N/A N/A |
webdetails — cpf |
A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468. |
2022-12-21 |
not yet calculated |
CVE-2021-4266 N/A N/A N/A N/A |
tad_discuss — tad_discuss |
A vulnerability classified as problematic was found in tad_discuss. Affected by this vulnerability is an unknown functionality. The manipulation of the argument DiscussTitle leads to cross site scripting. The attack can be launched remotely. The name of the patch is af94d034ff8db642d05fd8788179eab05f433958. It is recommended to apply a patch to fix this issue. The identifier VDB-216469 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4267 N/A N/A N/A |
phpredisadmin– phpredisadmin |
A vulnerability, which was classified as problematic, was found in phpRedisAdmin up to 1.17.3. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.18.0 is able to address this issue. The name of the patch is b9039adbb264c81333328faa9575ecf8e0d2be94. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216471. |
2022-12-21 |
not yet calculated |
CVE-2021-4268 N/A N/A N/A |
simplerisk — simplerisk |
A vulnerability has been found in SimpleRisk and classified as problematic. This vulnerability affects the function checkAndSetValidation of the file simplerisk/js/common.js. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 20220306-001 is able to address this issue. The name of the patch is 591405b4ed160fbefc1dca1e55c5745079a7bb48. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216472. |
2022-12-21 |
not yet calculated |
CVE-2021-4269 N/A N/A N/A |
imprint_cms — imprint_cms |
A vulnerability was found in Imprint CMS. It has been classified as problematic. Affected is the function SearchForm of the file ImprintCMS/Models/ViewHelpers.cs. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6140b140ccd02b5e4e7d6ba013ac1225724487f4. It is recommended to apply a patch to fix this issue. VDB-216474 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4270 N/A N/A |
w2wiki — w2wiki |
A vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476. |
2022-12-21 |
not yet calculated |
CVE-2021-4271 N/A N/A |
studygolang — studygolang |
A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4272 N/A N/A |
studygolang — studygolang |
A vulnerability classified as problematic was found in studygolang. This vulnerability affects the function Search of the file http/controller/search.go. The manipulation of the argument q leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 97ba556d42fa89dfaa7737e9cd3a8ddaf670bb23. It is recommended to apply a patch to fix this issue. VDB-216478 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4273 N/A N/A N/A |
sileht — bird-lg |
A vulnerability, which was classified as problematic, has been found in sileht bird-lg. This issue affects some unknown processing of the file templates/layout.html. The manipulation of the argument request_args leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ef6b32c527478fefe7a4436e10b96ee28ed5b308. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216479. |
2022-12-21 |
not yet calculated |
CVE-2021-4274 N/A N/A N/A |
pyambic-pentameter — pyambic-pentameter |
A vulnerability, which was classified as problematic, was found in katlings pyambic-pentameter. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The name of the patch is 974f21aa1b2527ef39c8afe1a5060548217deca8. It is recommended to apply a patch to fix this issue. VDB-216498 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2021-4275 N/A N/A |
sourcecodester — simple_client_management_system |
A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodetester Simple Client Management System (SCMS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the vulnerable input fields. |
2022-12-22 |
not yet calculated |
CVE-2021-43657 MISC |
harmonyos — harmonyos |
The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. |
2022-12-20 |
not yet calculated |
CVE-2021-46856 MISC |
mozilla — firefox |
Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97. |
2022-12-22 |
not yet calculated |
CVE-2022-0511 MISC MISC |
mozilla — vpn |
Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker with limited privileges could leverage this to launch arbitrary code with SYSTEM privilege. This vulnerability affects Mozilla VPN < 2.7.1. |
2022-12-22 |
not yet calculated |
CVE-2022-0517 MISC MISC |
mozilla — thunderbird |
It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird < 91.6.1. |
2022-12-22 |
not yet calculated |
CVE-2022-0566 MISC MISC |
mozilla — firefox |
Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 98. |
2022-12-22 |
not yet calculated |
CVE-2022-0843 MISC MISC |
mozilla — multiple_products |
NSSToken objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-1097 MISC MISC MISC MISC |
mozilla — multiple_products |
After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-1196 MISC MISC MISC |
mozilla — thunderbird |
When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn’t specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-1197 MISC MISC |
mozilla — thunderbird |
When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird < 91.9. |
2022-12-22 |
not yet calculated |
CVE-2022-1520 MISC MISC |
mozilla — multiple_products |
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. |
2022-12-22 |
not yet calculated |
CVE-2022-1529 MISC MISC |
mozilla — multiple_products |
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. |
2022-12-22 |
not yet calculated |
CVE-2022-1802 MISC MISC |
mozilla — thunderbird |
When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker’s digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker’s email address was not visible. Because Thunderbird compared the invisible sender address with the signature’s email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-1834 MISC MISC |
mozilla — multiple_products |
If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-2200 MISC MISC MISC MISC |
mozilla — thunderbird |
An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email’s date will be shown. If the dates were different, then Thunderbird didn’t report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature’s date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-2226 MISC MISC |
ibm — identity_manager |
IBM Security Verify Governance, Identity Manager 10.01 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 224915. |
2022-12-24 |
not yet calculated |
CVE-2022-22449 MISC MISC |
ibm — identity_manager |
IBM Security Verify Governance, Identity Manager 10.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225004. |
2022-12-22 |
not yet calculated |
CVE-2022-22456 MISC MISC |
ibm — identity_manager |
IBM Security Verify Governance, Identity Manager 10.0.1 stores sensitive information including user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 225007. |
2022-12-22 |
not yet calculated |
CVE-2022-22457 MISC MISC |
ibm — identity_manager |
IBM Security Verify Governance, Identity Manager 10.0.1 stores user credentials in plain clear text which can be read by a remote authenticated user. IBM X-Force ID: 225009. |
2022-12-22 |
not yet calculated |
CVE-2022-22458 MISC MISC |
ibm — identity_manager |
IBM Security Verify Governance, Identity Manager 10.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225007. |
2022-12-22 |
not yet calculated |
CVE-2022-22461 MISC MISC |
mozilla — firefox |
If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default. *This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. |
2022-12-22 |
not yet calculated |
CVE-2022-22736 MISC MISC |
mozilla — multiple_products |
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22737 MISC MISC MISC MISC |
mozilla — multiple_products |
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22738 MISC MISC MISC MISC |
mozilla — multiple_products |
Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22739 MISC MISC MISC MISC |
mozilla — multiple_products |
Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22740 MISC MISC MISC MISC |
mozilla — multiple_products |
When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22741 MISC MISC MISC MISC |
mozilla — multiple_products |
When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22742 MISC MISC MISC MISC |
mozilla — multiple_products |
When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22743 MISC MISC MISC MISC |
mozilla — multiple_products |
The constructed curl command from the “Copy as curl” feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt. *This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22744 MISC MISC MISC MISC |
mozilla — multiple_products |
Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22745 MISC MISC MISC MISC |
mozilla — multiple_products |
A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22746 MISC MISC MISC MISC |
mozilla — multiple_products |
After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22747 MISC MISC MISC MISC |
mozilla — multiple_products |
Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22748 MISC MISC MISC MISC |
mozilla — firefox_for_android |
When scanning QR codes, Firefox for Android would have allowed navigation to some URLs that do not point to web content. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. |
2022-12-22 |
not yet calculated |
CVE-2022-22749 MISC MISC |
mozilla — multiple_products |
By generally accepting and passing resource handles across processes, a compromised content process might have confused higher privileged processes to interact with handles that the unprivileged process should not have access to. *This bug only affects Firefox for Windows and MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. |
2022-12-22 |
not yet calculated |
CVE-2022-22750 MISC MISC |
mozilla — multiple_products |
Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. |
2022-12-22 |
not yet calculated |
CVE-2022-22751 MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 96. |
2022-12-22 |
not yet calculated |
CVE-2022-22752 MISC MISC |
mozilla — multiple_products |
A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22753 MISC MISC MISC MISC |
mozilla — multiple_products |
If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22754 MISC MISC MISC MISC |
mozilla — firefox |
By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97. |
2022-12-22 |
not yet calculated |
CVE-2022-22755 MISC MISC |
mozilla — multiple_products |
If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22756 MISC MISC MISC MISC |
mozilla — firefox |
Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user’s browser to control it. *This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97. |
2022-12-22 |
not yet calculated |
CVE-2022-22757 MISC MISC |
mozilla — firefox |
When clicking on a tel: link, USSD codes, specified after a * character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user’s account, similar to a cross-site request forgery attack. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97. |
2022-12-22 |
not yet calculated |
CVE-2022-22758 MISC MISC |
mozilla — multiple_products |
If a document created a sandboxed iframe without allow-scripts , and subsequently appended an element to the iframe’s document that e.g. had a JavaScript event handler – the event handler would have run despite the iframe’s sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22759 MISC MISC MISC MISC |
mozilla — multiple_products |
When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22760 MISC MISC MISC MISC MISC |
mozilla — multiple_products |
Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension’s Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22761 MISC MISC MISC MISC |
mozilla — firefox_for_android |
Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97. |
2022-12-22 |
not yet calculated |
CVE-2022-22762 MISC MISC |
mozilla — multiple_products |
When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22763 MISC MISC MISC MISC |
mozilla — multiple_products |
Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. |
2022-12-22 |
not yet calculated |
CVE-2022-22764 MISC MISC MISC MISC |
pi-hole — adminlte |
Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims’ personal blacklists. |
2022-12-23 |
not yet calculated |
CVE-2022-23513 MISC MISC |
auth0 — jsonwebtoken |
node-jsonwebtoken is a JsonWebToken implementation for node.js. For versions `<= 8.5.1` of `jsonwebtoken` library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the `secretOrPublicKey` argument from the readme link of the `jwt.verify()` function, they can write arbitrary files on the host machine. Users are affected only if untrusted entities are allowed to modify the key retrieval parameter of the `jwt.verify()` on a host that you control. This issue has been fixed, please update to version 9.0.0. |
2022-12-21 |
not yet calculated |
CVE-2022-23529 MISC MISC |
cortex_project — cortex |
Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API. |
2022-12-19 |
not yet calculated |
CVE-2022-23536 MISC MISC MISC MISC |
pjsip — pjsip |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1). |
2022-12-20 |
not yet calculated |
CVE-2022-23537 MISC MISC |
auth0 — jsonwebtoken |
Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions. |
2022-12-23 |
not yet calculated |
CVE-2022-23539 MISC MISC |
auth0 — jsonwebtoken |
In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. Users are affected if you do not specify algorithms in the `jwt.verify()` function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options. |
2022-12-22 |
not yet calculated |
CVE-2022-23540 MISC MISC |
auth0 — jsonwebtoken |
jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. |
2022-12-22 |
not yet calculated |
CVE-2022-23541 MISC MISC MISC |
openfga — openfga |
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible. |
2022-12-20 |
not yet calculated |
CVE-2022-23542 MISC MISC MISC |
silverware_games — silverware_games |
Silverware Games is a social network where people can play games online. Users can attach URLs to YouTube videos, the site will generate related “ when the post will be published. The handler has some sort of protection so non-YouTube links can’t be posted, as well as HTML tags are being stripped. However, it was still possible to add custom HTML attributes (e.g. `onclick=alert(“xss”)`) to the `’. This issue was fixed in the version `1.1.34` and does not require any extra actions from our members. There has been no evidence that this vulnerability was used by anyone at this time. |
2022-12-19 |
not yet calculated |
CVE-2022-23543 MISC |
pjsip — pjsip |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch. |
2022-12-23 |
not yet calculated |
CVE-2022-23547 MISC MISC MISC |
azure — aad-pod-identity |
aad-pod-identity assigns Azure Active Directory identities to Kubernetes applications and has now been deprecated as of 24 October 2022. The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identityoauth2token/`) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn’t have access to. This issue has been fixed and has been included in AAD Pod Identity release version 1.8.13. If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the version 1.8.13 release. |
2022-12-21 |
not yet calculated |
CVE-2022-23551 MISC MISC MISC |
codeigniter4 — codeigniter4 |
CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `ConfigApp::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`. |
2022-12-22 |
not yet calculated |
CVE-2022-23556 MISC MISC |
aveva — intouch_access_anywhere |
AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. |
2022-12-23 |
not yet calculated |
CVE-2022-23854 MISC |
snyk — abacus-ext-cmdline |
All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization. |
2022-12-21 |
not yet calculated |
CVE-2022-24431 CONFIRM |
mozilla — multiple_products |
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1. |
2022-12-22 |
not yet calculated |
CVE-2022-2505 MISC MISC MISC MISC |
snyk — p4 |
The package p4 before 0.0.7 are vulnerable to Command Injection via the run() function due to improper input sanitization |
2022-12-20 |
not yet calculated |
CVE-2022-25171 CONFIRM CONFIRM CONFIRM |
vm2 — vm2 |
The package vm2 before 3.9.10 are vulnerable to Arbitrary Code Execution due to the usage of prototype lookup for the WeakMap.prototype.set method. Exploiting this vulnerability leads to access to a host object and a sandbox compromise. |
2022-12-21 |
not yet calculated |
CVE-2022-25893 CONFIRM CONFIRM CONFIRM CONFIRM |
snyk — lite-dev-server |
All versions of package lite-dev-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code. |
2022-12-21 |
not yet calculated |
CVE-2022-25895 CONFIRM CONFIRM CONFIRM |
snyk — safe-eval
|
All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an attacker to modify properties of the Object.prototype. |
2022-12-20 |
not yet calculated |
CVE-2022-25904 CONFIRM CONFIRM |
snyk– smoothie
|
The package smoothie from 1.31.0 and before 1.36.1 are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization in strokeStyle and tooltipLabel properties. Exploiting this vulnerability is possible when the user can control these properties. |
2022-12-21 |
not yet calculated |
CVE-2022-25929 CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM |
snyk — easy-static-server |
All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code. |
2022-12-20 |
not yet calculated |
CVE-2022-25931 CONFIRM CONFIRM CONFIRM |
snyk — package_lite_server
|
All versions of package lite-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse. |
2022-12-20 |
not yet calculated |
CVE-2022-25940 CONFIRM CONFIRM CONFIRM |
liquidjs — liquidjs |
The package liquidjs before 10.0.0 are vulnerable to Information Exposure when ownPropertyOnly parameter is set to False, which results in leaking properties of a prototype. Workaround For versions 9.34.0 and higher, an option to disable this functionality is provided. |
2022-12-22 |
not yet calculated |
CVE-2022-25948 CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM |
mozilla — multiple_products |
An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. |
2022-12-22 |
not yet calculated |
CVE-2022-26381 MISC MISC MISC MISC |
mozilla — firefox |
While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox < 98. |
2022-12-22 |
not yet calculated |
CVE-2022-26382 MISC MISC |
mozilla — multiple_products |
When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. |
2022-12-22 |
not yet calculated |
CVE-2022-26383 MISC MISC MISC MISC |
mozilla — multiple_products |
If an attacker could control the contents of an iframe sandboxed with allow-popups but not allow-scripts , they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. |
2022-12-22 |
not yet calculated |
CVE-2022-26384 MISC MISC MISC MISC |
mozilla — firefox |
In unusual circumstances, an individual thread may outlive the thread’s manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 98. |
2022-12-22 |
not yet calculated |
CVE-2022-26385 MISC MISC |
mozilla — multiple_products |
Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in /tmp , but this behavior was changed to download them to /tmp where they could be affected by other local users. This behavior was reverted to the original, user-specific directory. *This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.7 and Thunderbird < 91.7. |
2022-12-22 |
not yet calculated |
CVE-2022-26386 MISC MISC MISC |
mozilla — multiple_products |
When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. |
2022-12-22 |
not yet calculated |
CVE-2022-26387 MISC MISC MISC MISC |
mozilla — multiple_products |
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. |
2022-12-22 |
not yet calculated |
CVE-2022-26485 MISC MISC |
mozilla — multiple_products |
An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. |
2022-12-22 |
not yet calculated |
CVE-2022-26486 MISC MISC |
hikivision — multiple_products |
The web server of some Hikvision wireless bridge products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices. |
2022-12-19 |
not yet calculated |
CVE-2022-28173 MISC |
ydb — server |
Out-of-bounds read was discovered in YDB server. An attacker could construct a query with insert statement that would allow him to read sensitive information from other memory locations or cause a crash. |
2022-12-23 |
not yet calculated |
CVE-2022-28228 MISC |
userver — userver |
The hash functionality in userver before 42059b6319661583b3080cab9b595d4f8ac48128 allows attackers to cause a denial of service via crafted HTTP request, involving collisions. |
2022-12-23 |
not yet calculated |
CVE-2022-28229 MISC |
mozilla — multiple_products |
If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-28281 MISC MISC MISC MISC |
mozilla — multiple_products |
By using a link with rel="localization" a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-28282 MISC MISC MISC MISC |
mozilla — firefox |
The sourceMapURL feature in devtools was missing security checks that would have allowed a webpage to attempt to include local files or other files that should have been inaccessible. This vulnerability affects Firefox < 99. |
2022-12-22 |
not yet calculated |
CVE-2022-28283 MISC MISC |
mozilla — firefox |
SVG’s <use> element could have been used to load unexpected content that could have executed script in certain circumstances. While the specification seems to allow this, other browsers do not, and web developers relied on this property for script security so gecko’s implementation was aligned with theirs. This vulnerability affects Firefox < 99. |
2022-12-22 |
not yet calculated |
CVE-2022-28284 MISC MISC |
mozilla — multiple_products |
When generating the assembly code for MLoadTypedArrayElementHole , an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-28285 MISC MISC MISC MISC |
mozilla — multiple_products |
Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-28286 MISC MISC MISC MISC |
mozilla — firefox |
In unusual circumstances, selecting text could cause text selection caching to behave incorrectly, leading to a crash. This vulnerability affects Firefox < 99. |
2022-12-22 |
not yet calculated |
CVE-2022-28287 MISC MISC |
mozilla — firefox |
Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 99. |
2022-12-22 |
not yet calculated |
CVE-2022-28288 MISC MISC |
mozilla — multiple_products |
Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. |
2022-12-22 |
not yet calculated |
CVE-2022-28289 MISC MISC MISC MISC |
mozilla — multiple_products |
Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29909 MISC MISC MISC MISC |
mozilla — firefox |
When closed or sent to the background, Firefox for Android would not properly record and persist HSTS settings. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29910 MISC MISC |
mozilla — multiple_products |
An improper implementation of the new iframe sandbox keyword allow-top-navigation-by-user-activation could lead to script execution without allow-scripts being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29911 MISC MISC MISC MISC |
mozilla — multiple_products |
Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29912 MISC MISC MISC MISC |
mozilla — thunderbird |
The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird < 91.9. |
2022-12-22 |
not yet calculated |
CVE-2022-29913 MISC MISC |
mozilla — multiple_products |
When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29914 MISC MISC MISC MISC |
mozilla — firefox
|
The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects. This vulnerability affects Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29915 MISC MISC |
mozilla — multiple_products |
Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29916 MISC MISC MISC MISC |
mozilla — multiple_products |
Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29917 MISC MISC MISC MISC |
mozilla — firefox
|
Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 100. |
2022-12-22 |
not yet calculated |
CVE-2022-29918 MISC MISC |
mozilla — thunderbird |
When receiving an HTML email that contained an iframe element, which used a srcdoc attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. |
2022-12-22 |
not yet calculated |
CVE-2022-3032 MISC MISC MISC |
mozilla — thunderbird |
If a Thunderbird user replied to a crafted HTML email containing a meta tag, with the meta tag having the http-equiv="refresh" attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn’t affect users who have changed the default Message Body display setting to ‘simple html’ or ‘plain text’. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. |
2022-12-22 |
not yet calculated |
CVE-2022-3033 MISC MISC MISC |
mozilla — thunderbird |
When receiving an HTML email that specified to load an iframe element from a remote location, a request to the remote document was sent. However, Thunderbird didn’t display the document. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. |
2022-12-22 |
not yet calculated |
CVE-2022-3034 MISC MISC MISC |
mozilla — thunderbird |
When saving or opening an email attachment on macOS, Thunderbird did not set attribute com.apple.quarantine on the received file. If the received file was an application and the user attempted to open it, then the application was started immediately without asking the user to confirm. This vulnerability affects Thunderbird < 102.3. |
2022-12-22 |
not yet calculated |
CVE-2022-3155 MISC MISC |
concourse — concourse |
Concourse (7.x.y prior to 7.8.3 and 6.x.y prior to 6.7.9) contains an authorization bypass issue. A Concourse user can send a request with body including :team_name=team2 to bypass team scope check to gain access to certain resources belong to any other team. |
2022-12-19 |
not yet calculated |
CVE-2022-31683 MISC |
mozilla — multiple_products |
A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31736 MISC MISC MISC MISC |
mozilla — multiple_products |
A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31737 MISC MISC MISC MISC |
mozilla — multiple_products |
When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31738 MISC MISC MISC MISC |
mozilla — multiple_products |
When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31739 MISC MISC MISC MISC |
mozilla — multiple_products |
On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31740 MISC MISC MISC MISC |
mozilla — multiple_products |
A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31741 MISC MISC MISC MISC |
mozilla — multiple_products |
An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31742 MISC MISC MISC MISC |
mozilla — firefox |
Firefox’s HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox < 101. |
2022-12-22 |
not yet calculated |
CVE-2022-31743 MISC MISC |
mozilla — multiple_products |
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page’s Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101. |
2022-12-22 |
not yet calculated |
CVE-2022-31744 MISC MISC MISC MISC |
mozilla — firefox |
If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox < 101. |
2022-12-22 |
not yet calculated |
CVE-2022-31745 MISC MISC |
mozilla — firefox_for_ios |
Internal URLs are protected by a secret UUID key, which could have been leaked to web page through the Referrer header. This vulnerability affects Firefox for iOS < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-31746 MISC MISC |
mozilla — multiple_products |
Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. |
2022-12-22 |
not yet calculated |
CVE-2022-31747 MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell Jesup, Jon Coppeard, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 101. |
2022-12-22 |
not yet calculated |
CVE-2022-31748 MISC MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specific function does not sanitize the input provided by the user, which may expose the affected to an OS command injection vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-3183 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the device’s existing firmware allows unauthenticated users to access an old PHP page vulnerable to directory traversal, which may allow a user to write a file to the webroot directory. |
2022-12-21 |
not yet calculated |
CVE-2022-3184 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product exposes sensitive data concerning the device. |
2022-12-21 |
not yet calculated |
CVE-2022-3185 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device’s information. |
2022-12-21 |
not yet calculated |
CVE-2022-3186 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where certain PHP pages only validate when a valid connection is established with the database. However, these PHP pages do not verify the validity of a user. Attackers could leverage this lack of verification to read the state of outlets. |
2022-12-21 |
not yet calculated |
CVE-2022-3187 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where unauthenticated users could open PHP index pages without authentication and download the history file from the device; the history file includes the latest actions completed by specific users. |
2022-12-21 |
not yet calculated |
CVE-2022-3188 MISC |
dataprobe — iboot-pdu_fw |
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specially crafted PHP script could use parameters from a HTTP request to create a URL capable of changing the host parameter. The changed host parameter in the HTTP could point to another host that will send a request to the host or IP specified in the changed host parameter. |
2022-12-21 |
not yet calculated |
CVE-2022-3189 MISC |
mozilla — multiple_products |
An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-3266 MISC MISC MISC MISC |
mitsubishi_electric — multiple_products |
Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions “32” and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions “65” and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery. |
2022-12-23 |
not yet calculated |
CVE-2022-33324 MISC MISC MISC |
mozilla — multiple_products |
An iframe that was not permitted to run scripts could do so if the user clicked on a javascript: link. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34468 MISC MISC MISC MISC |
mozilla — firefox_for_android
|
When a TLS Certificate error occurs on a domain protected by the HSTS header, the browser should not allow the user to bypass the certificate error. On Firefox for Android, the user was presented with the option to bypass the error; this could only have been done by the user explicitly. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34469 MISC MISC |
mozilla — multiple_products
|
Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34470 MISC MISC MISC MISC |
mozilla — firefox |
When downloading an update for an addon, the downloaded addon update’s version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34471 MISC MISC |
mozilla — multiple_products |
If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34472 MISC MISC MISC MISC |
mozilla — firefox |
The HTML Sanitizer should have sanitized the href attribute of SVG <use> tags; however it incorrectly did not sanitize xlink:href attributes. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34473 MISC MISC |
mozilla — firefox |
Even when an iframe was sandboxed with allow-top-navigation-by-user-activation , if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34474 MISC MISC |
mozilla — firefox |
SVG <use> tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34475 MISC MISC |
mozilla — firefox |
ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34476 MISC MISC |
mozilla — firefox |
The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34477 MISC MISC |
mozilla — multiple_products |
The ms-msdt , search , and search-ms protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Thunderbird), so in this release Thunderbird has blocked these protocols from prompting the user to open them. *This bug only affects Thunderbird on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34478 MISC MISC MISC MISC |
mozilla — multiple_products |
A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. *This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34479 MISC MISC MISC MISC |
mozilla — firefox |
Within the lg_init() function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34480 MISC MISC |
mozilla — multiple_products |
In the nsTArray_Impl::ReplaceElementsAt() function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34481 MISC MISC MISC MISC |
mozilla — firefox |
An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34482 MISC MISC |
mozilla — firefox |
An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34482. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34483 MISC MISC |
mozilla — multiple_products |
The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. |
2022-12-22 |
not yet calculated |
CVE-2022-34484 MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers Bryce Seager van Dyk and the Mozilla Fuzzing Team reported potential vulnerabilities present in Firefox 101. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 102. |
2022-12-22 |
not yet calculated |
CVE-2022-34485 MISC MISC |
ibm — security_verify_governance_identity_manager |
IBM Security Verify Governance, Identity Manager 10.0.1 software component could allow an authenticated user to modify or cancel any other user’s access request using man-in-the-middle techniques. IBM X-Force ID: 231096. |
2022-12-22 |
not yet calculated |
CVE-2022-35646 MISC MISC |
nokia — fastmile |
Nokia Fastmile 3tg00118abad52 is affected by an authenticated path traversal vulnerability which allows attackers to read any named pipe file on the system. |
2022-12-21 |
not yet calculated |
CVE-2022-36221 MISC |
nokia — fastmile |
Nokia Fastmile 3tg00118abad52 devices shipped by Optus are shipped with a default hardcoded admin account of admin:Nq+L5st7o This account can be used locally to access the web admin interface. |
2022-12-21 |
not yet calculated |
CVE-2022-36222 MISC |
mozilla — multiple_products |
When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1. |
2022-12-22 |
not yet calculated |
CVE-2022-36314 MISC MISC MISC MISC |
mozilla — firefox |
When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox < 103. |
2022-12-22 |
not yet calculated |
CVE-2022-36315 MISC MISC |
mozilla — firefox |
When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103. |
2022-12-22 |
not yet calculated |
CVE-2022-36316 MISC MISC |
mozilla — firefox |
When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 103. |
2022-12-22 |
not yet calculated |
CVE-2022-36317 MISC MISC |
mozilla — multiple_products |
When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12. |
2022-12-22 |
not yet calculated |
CVE-2022-36318 MISC MISC MISC MISC MISC MISC |
mozilla — multiple_products |
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12. |
2022-12-22 |
not yet calculated |
CVE-2022-36319 MISC MISC MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103. |
2022-12-22 |
not yet calculated |
CVE-2022-36320 MISC MISC |
talos — openimageio_master-branch |
A heap out-of-bounds read vulnerability exists in the RLA format parser of OpenImageIO master-branch-9aeece7a and v2.3.19.0. More specifically, in the way run-length encoded byte spans are handled. A malformed RLA file can lead to an out-of-bounds read of heap metadata which can result in sensitive information leak. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-36354 MISC |
rockwell_automation — logix_controllers |
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation. |
2022-12-19 |
not yet calculated |
CVE-2022-3752 MISC |
grub2 — grub2 |
When rendering certain unicode sequences, grub2’s font code doesn’t proper validate if the informed glyph’s width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2’s heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded. |
2022-12-19 |
not yet calculated |
CVE-2022-3775 MISC |
wordpress — wordpress |
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various AJAX actions in versions up to, and including, 2.5.6. Authenticated users can use an easily available nonce value to create header templates and make additional changes to the site, as the plugin does not use capability checks for this purpose. |
2022-12-22 |
not yet calculated |
CVE-2022-3794 MISC MISC MISC |
wordpress — wordpress |
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements. |
2022-12-22 |
not yet calculated |
CVE-2022-3805 MISC MISC MISC |
talos — openstack_kolla_git_master |
A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges. |
2022-12-21 |
not yet calculated |
CVE-2022-38060 MISC |
talos — openstack_kolla_git_master |
A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges. |
2022-12-21 |
not yet calculated |
CVE-2022-38065 MISC |
talos — openimageio |
A heap out-of-bounds write vulnerability exists in the way OpenImageIO v2.3.19.0 processes RLE encoded BMP images. A specially-crafted bmp file can write to arbitrary out of bounds memory, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-38143 MISC |
mozilla — multiple_products |
An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38472 MISC MISC MISC MISC MISC MISC |
mozilla — multiple_products |
A cross-origin iframe referencing an XSLT document would inherit the parent domain’s permissions (such as microphone or camera access). This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38473 MISC MISC MISC MISC MISC MISC |
mozilla — firefox_for_android |
A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt – it only affects the notification shown once permission has been granted. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38474 MISC MISC |
mozilla — firefox |
An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38475 MISC MISC |
mozilla — multiple_products |
A data race could occur in the PK11_ChangePW function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2. |
2022-12-22 |
not yet calculated |
CVE-2022-38476 MISC MISC MISC |
mozilla — multiple_products |
Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.2, Thunderbird < 102.2, and Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38477 MISC MISC MISC MISC |
mozilla — multiple_products |
Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. |
2022-12-22 |
not yet calculated |
CVE-2022-38478 MISC MISC MISC MISC MISC MISC |
zyxel — zyxel_nbg7510 |
A DNS misconfiguration was found in Zyxel NBG7510 firmware versions prior to V1.00(ABZY.3)C0, which could allow an unauthenticated attacker to access the DNS server when the device is switched to the AP mode. |
2022-12-21 |
not yet calculated |
CVE-2022-38546 CONFIRM |
hcl_technologies — bigfix_webui |
BigFix WebUI non-master operators are missing controls that prevent them from being able to modify the relevance of fixlets or to deploy fixlets from the BES Support external site. |
2022-12-21 |
not yet calculated |
CVE-2022-38655 MISC |
hcl_technologies — bigfix_webui |
BigFix deployments that have installed the Notification Service on Windows are susceptible to disclosing SMTP BigFix operator’s sensitive data in clear text. Operators who use Notification Service related content from BES Support are at risk of leaving their SMTP sensitive data exposed. |
2022-12-24 |
not yet calculated |
CVE-2022-38658 MISC |
netapp — oncommand_insight |
OnCommand Insight versions 7.3.1 through 7.3.14 are susceptible to an authentication bypass vulnerability in the Data Warehouse component. |
2022-12-20 |
not yet calculated |
CVE-2022-38733 MISC |
modzero — click_studios |
A vulnerability classified as critical was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This vulnerability affects unknown code of the component API. The manipulation leads to authentication bypass by assumed-immutable data. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216244. |
2022-12-19 |
not yet calculated |
CVE-2022-3875 MISC MISC MISC |
micro_focus — zenworks_2020 |
A vulnerability has been identified in Micro Focus ZENworks 2020 Update 3a and prior versions. This vulnerability allows administrators with rights to perform actions (e.g., install a bundle) on a set of managed devices, to be able to exercise these rights on managed devices in the ZENworks zone but which are outside the scope of the administrator. This vulnerability does not result in the administrators gaining additional rights on the managed devices, either in the scope or outside the scope of the administrator. |
2022-12-23 |
not yet calculated |
CVE-2022-38757 MISC MISC MISC |
modzero — click_studios |
A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This issue affects some unknown processing of the file /api/browserextension/UpdatePassword/ of the component API. The manipulation of the argument PasswordID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216245 was assigned to this vulnerability. |
2022-12-19 |
not yet calculated |
CVE-2022-3876 MISC MISC MISC |
modzero — click_studios |
A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected is an unknown function of the component URL Field Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216246 is the identifier assigned to this vulnerability. |
2022-12-19 |
not yet calculated |
CVE-2022-3877 MISC MISC MISC |
d-link — dap |
D-Link devices DAP-2310 v2.10rc036 and earlier, DAP-2330 v1.06rc020 and earlier, DAP-2360 v2.10rc050 and earlier, DAP-2553 v3.10rc031 and earlier, DAP-2660 v1.15rc093 and earlier, DAP-2690 v3.20rc106 and earlier, DAP-2695 v1.20rc119_beta31 and earlier, DAP-3320 v1.05rc027 beta and earlier, DAP-3662 v1.05rc047 and earlier allows attackers to cause a Denial of Service (DoS) via uploading a crafted firmware after modifying the firmware header. |
2022-12-20 |
not yet calculated |
CVE-2022-38873 MISC MISC |
ibm — aix_vios |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 235181. |
2022-12-23 |
not yet calculated |
CVE-2022-39164 MISC MISC |
ibm — aix_vios |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in CAA to cause a denial of service. IBM X-Force ID: 235183. |
2022-12-23 |
not yet calculated |
CVE-2022-39165 MISC MISC |
ghinstallation — ghinstallation |
ghinstallation provides transport, which implements http.RoundTripper to provide authentication as an installation for GitHub Apps. In ghinstallation version 1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging. The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum). This issue has been patched and is available in version 2.0.0. |
2022-12-20 |
not yet calculated |
CVE-2022-39304 MISC MISC MISC MISC |
typora — typora |
Cross Site Scripting (XSS) vulnerability in typora through 1.38 allows remote attackers to run arbitrary code via export from editor. |
2022-12-23 |
not yet calculated |
CVE-2022-40011 MISC MISC MISC |
apache — karaf |
This vulnerable is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL. The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource use InitialContext.lookup(jndiName) without filtering. An user can modify `options.put(JDBCUtils.DATASOURCE, “osgi:” + DataSource.class.getName());` to `options.put(JDBCUtils.DATASOURCE,”jndi:rmi://x.x.x.x:xxxx/Command”);` in JdbcLoginModuleTest#setup. This is vulnerable to a remote code execution (RCE) attack when a configuration uses a JNDI LDAP data source URI when an attacker has control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 and 4.3.7. We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8 |
2022-12-21 |
not yet calculated |
CVE-2022-40145 MISC |
ibm — aix_vios |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX TCP/IP kernel extension to cause a denial of service. IBM X-Force ID: 235599. |
2022-12-23 |
not yet calculated |
CVE-2022-40233 MISC MISC |
softr — softr |
Softr v2.0 was discovered to be vulnerable to HTML injection via the Name field of the Account page. |
2022-12-19 |
not yet calculated |
CVE-2022-40434 MISC MISC MISC |
sourcecodester — employee_performance_evaluation_system |
Employee Performance Evaluation System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via adding new entries under the Departments and Designations module. |
2022-12-19 |
not yet calculated |
CVE-2022-40435 MISC MISC MISC |
pfSense — pfBlockerNG |
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814. |
2022-12-20 |
not yet calculated |
CVE-2022-40624 MISC MISC MISC |
ndk_design — ndkadvancedcustomizationfields |
A cross-site scripting (XSS) vulnerability in NdkAdvancedCustomizationFields v3.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payloads injected into the “htmlNodes” parameter. |
2022-12-21 |
not yet calculated |
CVE-2022-40841 MISC MISC |
pypa — setuptools |
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py. |
2022-12-23 |
not yet calculated |
CVE-2022-40897 MISC MISC CONFIRM MISC MISC |
pypa — wheel |
An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli. |
2022-12-23 |
not yet calculated |
CVE-2022-40898 MISC MISC MISC |
pythoncharmers — python_future |
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. |
2022-12-23 |
not yet calculated |
CVE-2022-40899 MISC MISC MISC MISC |
mozilla — firefox_esr_thunderbird |
When injecting an HTML base element, some requests would ignore the CSP’s base-uri settings and accept the injected element’s base instead. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40956 MISC MISC MISC MISC |
mozilla — firefox_esr_thunderbird |
Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash. *This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40957 MISC MISC MISC MISC |
mozilla — firefox_esr_thunderbird |
By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40958 MISC MISC MISC MISC |
mozilla — firefox_esr_thunderbird |
During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40959 MISC MISC MISC MISC |
mozilla — firefox_esr_thunderbird |
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40960 MISC MISC MISC MISC |
mozilla — firefox_for_android |
During startup, a graphics driver with an unexpected name could lead to a stack-buffer overflow causing a potentially exploitable crash. *This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40961 MISC MISC |
mozilla — multiple_products |
Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. |
2022-12-22 |
not yet calculated |
CVE-2022-40962 MISC MISC MISC MISC |
ibm — aix_and_vios |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the rm_rlcache_file command to obtain root privileges. IBM X-Force ID: 236690. |
2022-12-23 |
not yet calculated |
CVE-2022-41290 MISC MISC |
blogengine — blogengine.net |
An issue in the component BlogEngine/BlogEngine.NET/AppCode/Api/UploadController.cs of BlogEngine.NET v3.3.8.0 allows attackers to execute arbitrary code via uploading a crafted PNG file. |
2022-12-19 |
not yet calculated |
CVE-2022-41418 MISC MISC MISC |
harmonyos — harmonyos |
Some smartphones have authentication-related (including session management) vulnerabilities as the setup wizard is bypassed. Successful exploitation of this vulnerability affects the smartphone availability. |
2022-12-20 |
not yet calculated |
CVE-2022-41590 MISC |
harmonyos — harmonyos |
The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. |
2022-12-20 |
not yet calculated |
CVE-2022-41591 MISC MISC |
openimageio — openimageio |
A heap based buffer overflow vulnerability exists in tile decoding code of TIFF image parser in OpenImageIO master-branch-9aeece7a and v2.3.19.0. A specially-crafted TIFF file can lead to an out of bounds memory corruption, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41639 MISC |
openimageio — openimageio |
A heap out of bounds read vulnerability exists in the handling of IPTC data while parsing TIFF images in OpenImageIO v2.3.19.0. A specially-crafted TIFF file can cause a read of adjacent heap memory, which can leak sensitive process information. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41649 MISC |
ghost — ghost_foundation_ghost |
An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41654 MISC CONFIRM |
openimageio — openimageio |
A heap out of bounds read vulnerability exists in the OpenImageIO master-branch-9aeece7a when parsing the image file directory part of a PSD image file. A specially-crafted .psd file can cause a read of arbitrary memory address which can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41684 MISC |
ghost — ghost_foundation_ghost |
A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41697 MISC |
openimageio — openimageio |
A heap based buffer overflow vulnerability exists in the PSD thumbnail resource parsing code of OpenImageIO 2.3.19.0. A specially-crafted PSD file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41794 MISC |
openimageio — openimageio_project_openimageio |
An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41837 MISC |
openimageio — openimageio_project_openimageio |
A code execution vulnerability exists in the DDS scanline parsing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially-crafted .dds can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41838 MISC |
openimageio — openimageio |
An out of bounds read vulnerability exists in the way OpenImageIO version v2.3.19.0 processes string fields in TIFF image files. A specially-crafted TIFF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41977 MISC |
openimageio — openimageio |
A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41981 MISC |
openimageio — openimageio_project_openimageio |
An information disclosure vulnerability exists in the OpenImageIO::decode_iptc_iim() functionality of OpenImageIO Project OpenImageIO v2.3.19.0. A specially-crafted TIFF file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41988 MISC |
openimageio — openimageio_project_openimageio |
A denial of service vulnerability exists in the DDS native tile reading functionality of OpenImageIO Project OpenImageIO v2.3.19.0 and v2.4.4.2. A specially-crafted .dds can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-41999 MISC |
wfs_inc — heavenburnsred |
WFS, Inc HeavenBurnsRed 2020.3.15.7141260 is vulnerable to Local Privilege Escalation. |
2022-12-20 |
not yet calculated |
CVE-2022-42046 MISC |
hcl_technology — big_fix |
There are insufficient warnings when a Fixlet is imported by a user. The warning message currently assumes the owner of the script is the logged in user, with insufficient warnings when attempting to run the script. |
2022-12-19 |
not yet calculated |
CVE-2022-42453 MISC |
hcl_technology — big_fix |
Insights for Vulnerability Remediation (IVR) is vulnerable to man-in-the-middle attacks that may lead to information disclosure. This requires privileged network access. |
2022-12-21 |
not yet calculated |
CVE-2022-42454 MISC |
devolutions — remote_desktop_manager |
Authentication bypass in local application lock feature in Devolutions Remote Desktop Manager 2022.3.26 and earlier on Windows allows malicious user to access the application. |
2022-12-21 |
not yet calculated |
CVE-2022-4287 MISC |
mozilla — multiple_products |
A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via performance.getEntries() . This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42927 MISC MISC MISC MISC |
mozilla — multiple_products |
Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42928 MISC MISC MISC MISC |
mozilla — multiple_products |
If a website called window.print() in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user’s session restore settings. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42929 MISC MISC MISC MISC |
mozilla — firefox_for_android |
If two Workers were simultaneously initializing their CacheStorage, a data race could have occurred in the ThirdPartyUtil component. This vulnerability affects Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42930 MISC MISC |
mozilla — firefox_for_android |
Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42931 MISC MISC |
mozilla — multiple_products |
Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-42932 MISC MISC MISC MISC |
autodesk — dwg_trueviewtm_2023 |
DWG TrueViewTM 2023 version has a DLL Search Order Hijacking vulnerability. Successful exploitation by a malicious attacker could result in remote code execution on the target system. |
2022-12-19 |
not yet calculated |
CVE-2022-42945 MISC |
autodesk — multiple_products |
Parsing a maliciously crafted X_B and PRT file can force Autodesk Maya 2023 to read beyond allocated buffer. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. |
2022-12-19 |
not yet calculated |
CVE-2022-42946 MISC |
autodesk — multiple_products |
A maliciously crafted X_B file when parsed through Autodesk Maya 2023 can be used to write beyond the allocated buffer. This vulnerability can lead to arbitrary code execution. |
2022-12-19 |
not yet calculated |
CVE-2022-42947 MISC |
silverstripe — subsites |
Silverstripe silverstripe/subsites through 2.6.0 has Insecure Permissions. |
2022-12-21 |
not yet calculated |
CVE-2022-42949 MISC MISC |
inhabit — pty_ltd_move_crm |
Inhabit Systems Pty Ltd Move CRM version 4, build 260 was discovered to contain a cross-site scripting (XSS) vulnerability via the User profile component. |
2022-12-22 |
not yet calculated |
CVE-2022-43271 CONFIRM MISC |
ibm — multiple_products |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX NFS kernel extension to cause a denial of service. IBM X-Force ID: 238640. |
2022-12-23 |
not yet calculated |
CVE-2022-43380 MISC MISC |
ibm — multiple_products |
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 238639. |
2022-12-23 |
not yet calculated |
CVE-2022-43381 MISC MISC |
plusmessage_app — multiple_products |
KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character’s specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4 |
2022-12-21 |
not yet calculated |
CVE-2022-43543 MISC MISC MISC MISC |
fedora_36 — curl |
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded. |
2022-12-23 |
not yet calculated |
CVE-2022-43551 MISC MISC |
openimageio — openimageio |
An information disclosure vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-43592 MISC |
openimageio — openimageio |
A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-43593 MISC |
openimageio — openimageio |
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files. |
2022-12-22 |
not yet calculated |
CVE-2022-43594 MISC |
openimageio — openimageio |
Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .fits files. |
2022-12-22 |
not yet calculated |
CVE-2022-43595 MISC |
openimageio — openimageio |
An information disclosure vulnerability exists in the IFFOutput channel interleaving functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-43596 MISC |
openimageio — openimageio |
Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`. |
2022-12-22 |
not yet calculated |
CVE-2022-43597 MISC |
openimageio — openimageio |
Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT16`. |
2022-12-22 |
not yet calculated |
CVE-2022-43598 MISC |
openimageio — openimageio |
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8` |
2022-12-22 |
not yet calculated |
CVE-2022-43599 MISC |
openimageio — openimageio |
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16` |
2022-12-22 |
not yet calculated |
CVE-2022-43600 MISC |
openimageio — openimageio |
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16` |
2022-12-22 |
not yet calculated |
CVE-2022-43601 MISC |
openimageio — openimageio |
Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8` |
2022-12-22 |
not yet calculated |
CVE-2022-43602 MISC |
openimageio — openimageio |
A denial of service vulnerability exists in the ZfileOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. |
2022-12-22 |
not yet calculated |
CVE-2022-43603 MISC |
ibm — multiple_products
|
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169. |
2022-12-23 |
not yet calculated |
CVE-2022-43848 MISC MISC |
ibm — multiple_products
|
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX pfcdd kernel extension to cause a denial of service. IBM X-Force ID: 239170. |
2022-12-23 |
not yet calculated |
CVE-2022-43849 MISC MISC |
ibm — navigator_for_i
|
IBM Navigator for i 7.3, 7.4 and 7.5 could allow an authenticated user to access IBM Navigator for i log files they are authorized to but not while using this interface. The remote authenticated user can bypass the interface checks and download log files by modifying servlet filter. IBM X-Force ID: 239301. |
2022-12-22 |
not yet calculated |
CVE-2022-43857 MISC MISC |
ibm — navigator_for_i
|
IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to access the file system and download files they are authorized to but not while using this interface. The remote authenticated user can bypass the interface checks by modifying a parameter thereby gaining access to their files through this interface. IBM X-Force ID: 239303. |
2022-12-22 |
not yet calculated |
CVE-2022-43858 MISC MISC |
ibm — navigator_for_i
|
IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information for an object they are authorized to but not while using this interface. By performing a UNION based SQL injection an attacker could see file permissions through this interface. IBM X-Force ID: 239304. |
2022-12-22 |
not yet calculated |
CVE-2022-43859 MISC MISC |
ibm — navigator_for_i |
IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305. |
2022-12-24 |
not yet calculated |
CVE-2022-43860 MISC MISC |
ibm — financial_transaction-manager |
IBM Financial Transaction Manager 3.2.4 authorization checks are done incorrectly for some HTTP requests which allows getting unauthorized technical information (e.g. event log entries) about the FTM SWIFT system. IBM X-Force ID: 239708. |
2022-12-20 |
not yet calculated |
CVE-2022-43872 MISC MISC |
ibm — financial_transaction-manager |
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow an authenticated user to lock additional RM authorizations, resulting in a denial of service on displaying or managing these authorizations. IBM X-Force ID: 240034. |
2022-12-20 |
not yet calculated |
CVE-2022-43875 MISC MISC |
pdftojson commit 94204bb — pdftojson commit 94204bb |
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Object::copy(Object*):Object.cc. |
2022-12-19 |
not yet calculated |
CVE-2022-44108 MISC MISC |
pdftojson commit 94204bb — pdftojson commit 94204bb |
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int). |
2022-12-19 |
not yet calculated |
CVE-2022-44109 MISC MISC |
otrs — otrs |
Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice This issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34. |
2022-12-19 |
not yet calculated |
CVE-2022-4427 MISC |
zenphoto — zenphoto |
Stored cross-site scripting vulnerability in Zenphoto versions prior to 1.6 allows remote a remote authenticated attacker with an administrative privilege to inject an arbitrary script. |
2022-12-21 |
not yet calculated |
CVE-2022-44449 MISC MISC MISC |
uisp_wireless– multiple_products |
An improper access validation vulnerability exists in airMAX AC <8.7.11, airFiber 60/LR <2.6.2, airFiber 60 XG/HD <v1.0.0 and airFiber GBE <1.4.1 that allows a malicious actor to retrieve status and usage data from the UISP device. |
2022-12-23 |
not yet calculated |
CVE-2022-44565 MISC |
rocket.chat-desktop — rocket.chat-desktop |
A command injection vulnerability exists in Rocket.Chat-Desktop <3.8.14 that could allow an attacker to pass a malicious url of openInternalVideoChatWindow to shell.openExternal(), which may lead to remote code execution (internalVideoChatWindow.ts#L17). To exploit the vulnerability, the internal video chat window must be disabled or a Mac App Store build must be used (internalVideoChatWindow.ts#L14). The vulnerability may be exploited by an XSS attack because the function openInternalVideoChatWindow is exposed in the Rocket.Chat-Desktop-API. |
2022-12-23 |
not yet calculated |
CVE-2022-44567 MISC |
grafana_labs — enterprise_metrics |
A vulnerability in the label-based access control of Grafana Labs Grafana Enterprise Metrics allows an attacker more access than intended. If an access policy which has label selector restrictions also has been granted access to all tenants in the system, the label selector restrictions will not be applied when using this policy with the affected versions of the software. This issue affects: Grafana Labs Grafana Enterprise Metrics GEM 1.X versions prior to 1.7.1 on AMD64; GEM 2.X versions prior to 2.3.1 on AMD64. |
2022-12-20 |
not yet calculated |
CVE-2022-44643 MISC MISC |
hcl_software– bigfix_insights_for_vulnerability_remediation |
Insights for Vulnerability Remediation (IVR) is vulnerable to improper input validation. This may lead to information disclosure. This requires privileged access. |
2022-12-21 |
not yet calculated |
CVE-2022-44756 MISC |
patchelf — patchelf |
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc. |
2022-12-19 |
not yet calculated |
CVE-2022-44940 MISC |
exuberant_ctags — exuberant_ctags |
A flaw was found in Exuberant Ctags in the way it handles the “-o” option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way. |
2022-12-20 |
not yet calculated |
CVE-2022-4515 MISC |
apache — shardingsphere-proxy |
Apache ShardingSphere-Proxy prior to 5.3.0 when using MySQL as database backend didn’t cleanup the database session completely after client authentication failed, which allowed an attacker to execute normal commands by constructing a special MySQL client. This vulnerability has been fixed in Apache ShardingSphere 5.3.0. |
2022-12-22 |
not yet calculated |
CVE-2022-45347 MISC |
mozilla — multiple_products |
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45403 MISC MISC MISC MISC |
mozilla — multiple_products
|
Through a series of popup and window.print() calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45404 MISC MISC MISC MISC |
mozilla — multiple_products |
Freeing arbitrary nsIInputStream ‘s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45405 MISC MISC MISC MISC |
mozilla — multiple_products |
If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45406 MISC MISC MISC MISC |
mozilla — firefox |
If an attacker loaded a font using FontFace() on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45407 MISC MISC |
mozilla — multiple_products |
Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45408 MISC MISC MISC MISC |
mozilla — multiple_products |
The garbage collector could have been aborted in several states and zones and GCRuntime::finishCollection may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45409 MISC MISC MISC MISC |
mozilla — multiple_products |
When a ServiceWorker intercepted a request with FetchEvent , the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45410 MISC MISC MISC MISC |
mozilla — multiple_products |
Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on fetch() and XMLHttpRequest; however some webservers have implemented non-standard headers such as X-Http-Method-Override that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45411 MISC MISC MISC MISC |
mozilla — multiple_products |
When resolving a symlink such as file:///proc/self/fd/1 , an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. *This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45412 MISC MISC MISC MISC |
mozilla — firefox |
Using the S.browser_fallback_url parameter parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent. *This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45413 MISC MISC |
mozilla — thunderbird |
If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1. |
2022-12-22 |
not yet calculated |
CVE-2022-45414 MISC MISC |
mozilla — firefox |
When downloading an HTML file, if the title of the page was formatted as a filename with a malicious extension, Firefox may have saved the file with that extension, leading to possible system compromise if the downloaded file was later ran. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45415 MISC MISC |
mozilla — multiple_products |
Keyboard events reference strings like “KeyA” that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45416 MISC MISC MISC MISC |
mozilla — firefox |
Service Workers did not detect Private Browsing Mode correctly in all cases, which could have led to Service Workers being written to disk for websites visited in Private Browsing Mode. This would not have persisted them in a state where they would run again, but it would have leaked Private Browsing Mode details to disk. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45417 MISC MISC |
mozilla — multiple_products |
If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45418 MISC MISC MISC MISC |
mozilla — firefox |
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45419 MISC MISC |
mozilla — multiple_products |
Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45420 MISC MISC MISC MISC |
mozilla — multiple_products |
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-45421 MISC MISC MISC MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the hostname parameter in the formSetNetCheckTools function. |
2022-12-23 |
not yet calculated |
CVE-2022-45706 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsHijack function. |
2022-12-23 |
not yet calculated |
CVE-2022-45707 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the sPortMapIndex parameter in the formDelPortMapping function. |
2022-12-23 |
not yet calculated |
CVE-2022-45708 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple command injection vulnerabilities via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function. |
2022-12-23 |
not yet calculated |
CVE-2022-45709 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function. |
2022-12-23 |
not yet calculated |
CVE-2022-45710 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the hostname parameter in the formSetNetCheckTools function. |
2022-12-23 |
not yet calculated |
CVE-2022-45711 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsForward function. |
2022-12-23 |
not yet calculated |
CVE-2022-45712 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formQOSRuleDel function. |
2022-12-23 |
not yet calculated |
CVE-2022-45714 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pLanPortRange and pWanPortRange parameters in the formSetPortMapping function. |
2022-12-23 |
not yet calculated |
CVE-2022-45715 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formIPMacBindDel function. |
2022-12-23 |
not yet calculated |
CVE-2022-45716 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the usbPartitionName parameter in the formSetUSBPartitionUmount function. This vulnerability is exploited via a crafted GET request. |
2022-12-23 |
not yet calculated |
CVE-2022-45717 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formIPMacBindAdd function. |
2022-12-23 |
not yet calculated |
CVE-2022-45718 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the gotoUrl parameter in the formPortalAuth function. |
2022-12-23 |
not yet calculated |
CVE-2022-45719 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the ip, mac, and remark parameters in the formIPMacBindModify function. |
2022-12-23 |
not yet calculated |
CVE-2022-45720 MISC |
ip-com_m50– ip-com_m50 |
IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the picName parameter in the formDelWewifiPic function. |
2022-12-23 |
not yet calculated |
CVE-2022-45721 MISC |
trend_micro — apex_one |
A link following vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges by creating a symbolic link and abusing the service to delete a file. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |
2022-12-24 |
not yet calculated |
CVE-2022-45798 MISC MISC |
baijiacms — baijiacms |
A Remote Code Execution (RCE) vulnerability was found in includes/baijiacms/common.inc.php in baijiacms v4. |
2022-12-20 |
not yet calculated |
CVE-2022-45942 MISC MISC |
classcms — classcms |
here is an arbitrary file upload vulnerability in the file management function module of Classcms3.5. |
2022-12-22 |
not yet calculated |
CVE-2022-45966 MISC |
wbce_cms — wbce_cms |
WBCE CMS v1.5.4 can implement getshell by modifying the upload file type. |
2022-12-20 |
not yet calculated |
CVE-2022-46020 MISC |
d-link — dir-869_dir869ax_fw102b15 |
D-Link DIR-869 DIR869Ax_FW102B15 is vulnerable to Authentication Bypass via phpcgi. |
2022-12-20 |
not yet calculated |
CVE-2022-46076 MISC MISC |
sourcecodester — covid-19_directory_on_vaccination_system |
Sourcecodester Covid-19 Directory on Vaccination System 1.0 was discovered to contain a Cross-Site Scripting (XSS) vulnerability via verification.php because the program does not verify the txtvaccinationID parameter. |
2022-12-21 |
not yet calculated |
CVE-2022-46095 MISC MISC |
sourcecodester — covid-19_directory_on_vaccination_system |
A Cross site scripting (XSS) vulnerability in Sourcecodester Online Covid-19 Directory on Vaccination System v1.0 allows attackers to execute arbitrary code via the txtfullname parameter or txtphone parameter to register.php without logging in. |
2022-12-21 |
not yet calculated |
CVE-2022-46096 MISC |
ayacms — ayacms |
AyaCMS v3.1.2 was found to have a code flaw in the ust_sql.inc.php file, which allows attackers to cause command execution by inserting malicious code. |
2022-12-22 |
not yet calculated |
CVE-2022-46101 MISC |
ayacms — ayacms |
AyaCMS 3.1.2 is vulnerable to Arbitrary file upload via /aya/module/admin/fst_down.inc.php |
2022-12-22 |
not yet calculated |
CVE-2022-46102 MISC |
tp-link — tl-wr940n |
TP-Link TL-WR940N V4 3.16.9 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. |
2022-12-20 |
not yet calculated |
CVE-2022-46139 MISC |
codeigniter– codeigniter |
CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie. |
2022-12-22 |
not yet calculated |
CVE-2022-46170 MISC MISC |
tauri-apps– tauri |
Tauri is a framework for building binaries for all major desktop platforms. The filesystem glob pattern wildcards `*`, `?`, and `[…]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. The issue has been patched in the latest release and was backported into the currently supported 1.x branches. There are no known workarounds at the time of publication. |
2022-12-23 |
not yet calculated |
CVE-2022-46171 MISC MISC MISC |
json — json |
JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. |
2022-12-24 |
not yet calculated |
CVE-2022-46175 MISC MISC MISC |
wordpress — wordpress |
The Sidebar Widgets by CodeLights plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Extra CSS class’ parameter in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2022-12-20 |
not yet calculated |
CVE-2022-4619 MISC MISC |
omron corporation — cx-drive |
Use after free vulnerability in CX-Drive V3.00 and earlier allows a local attacker to execute arbitrary code by having a user to open a specially crafted file, |
2022-12-21 |
not yet calculated |
CVE-2022-46282 MISC |
lirantal– daloradius |
Sensitive Cookie Without ‘HttpOnly’ Flag in GitHub repository lirantal/daloradius prior to master. |
2022-12-21 |
not yet calculated |
CVE-2022-4630 CONFIRM MISC |
wp-ban — wp-ban |
A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480. |
2022-12-21 |
not yet calculated |
CVE-2022-4631 N/A N/A |
auto_upload_images — auto_upload_images |
A vulnerability has been found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. The identifier VDB-216481 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-4632 N/A N/A MISC |
auto_upload_images — auto_upload_images |
A vulnerability was found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file src/setting-page.php of the component Settings Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. VDB-216482 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-4633 N/A N/A MISC |
squirrel — squirrel.windows |
Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications. Installers generated by Squirrel.Windows 2.0.1 and earlier contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privilege of the user invoking the installer. |
2022-12-21 |
not yet calculated |
CVE-2022-46330 MISC MISC MISC |
proofpoint — enterprise_protection |
Proofpoint Enterprise Protection (PPS/PoD) contains a vulnerability which allows the pps user to escalate to root privileges due to unnecessary permissions. This affects all versions 8.19.0 and below. |
2022-12-21 |
not yet calculated |
CVE-2022-46334 MISC |
ep3-bs — ep3-bs |
A vulnerability classified as problematic has been found in ep3-bs up to 1.7.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495. |
2022-12-21 |
not yet calculated |
CVE-2022-4637 N/A N/A N/A MISC |
collective.contact.widget — collective.contact.widget |
A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 5da36305ca7ed433782be8901c47387406fcda12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216496. |
2022-12-21 |
not yet calculated |
CVE-2022-4638 N/A N/A |
sslh — sslh |
A vulnerability, which was classified as critical, has been found in sslh. This issue affects the function hexdump of the file probe.c of the component Packet Dumping Handler. The manipulation of the argument msg_info leads to format string. The attack may be initiated remotely. The name of the patch is b19f8a6046b080e4c2e28354a58556bb26040c6f. It is recommended to apply a patch to fix this issue. The identifier VDB-216497 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-4639 N/A N/A N/A |
microchip — multiple_products |
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) is unresponsive with ConReqTimeoutZero. |
2022-12-19 |
not yet calculated |
CVE-2022-46399 CONFIRM MISC MISC MISC |
mingsoft — mcms |
A vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216499. |
2022-12-21 |
not yet calculated |
CVE-2022-4640 N/A N/A |
microchip — multiple_products |
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing. |
2022-12-19 |
not yet calculated |
CVE-2022-46400 CONFIRM MISC MISC MISC |
microchip — multiple_products |
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete. |
2022-12-19 |
not yet calculated |
CVE-2022-46401 CONFIRM MISC MISC MISC |
microchip — multiple_products |
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PairCon_rmSend with incorrect values. |
2022-12-19 |
not yet calculated |
CVE-2022-46402 CONFIRM MISC MISC MISC |
microchip — multiple_products |
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages. |
2022-12-19 |
not yet calculated |
CVE-2022-46403 CONFIRM MISC MISC MISC |
pig-vector– pig-vector |
A vulnerability was found in pig-vector and classified as problematic. Affected by this issue is the function LogisticRegression of the file src/main/java/org/apache/mahout/pig/LogisticRegression.java. The manipulation leads to insecure temporary file. The attack needs to be approached locally. The name of the patch is 1e7bd9fab5401a2df18d2eabd802adcf0dcf1f15. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216500. |
2022-12-21 |
not yet calculated |
CVE-2022-4641 N/A N/A N/A |
tatoeba2 — tatoeba2 |
A vulnerability was found in tatoeba2. It has been classified as problematic. This affects an unknown part of the component Profile Name Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version prod_2022-10-30 is able to address this issue. The name of the patch is 91110777fc8ddf1b4a2cf4e66e67db69b9700361. It is recommended to upgrade the affected component. The identifier VDB-216501 was assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-4642 N/A N/A N/A N/A |
apache — airflow_hive_provider |
Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 5.0.0. |
2022-12-20 |
not yet calculated |
CVE-2022-46421 MISC MISC |
netgear — wnr2000 |
An issue in Netgear WNR2000 v1 1.2.3.7 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. |
2022-12-20 |
not yet calculated |
CVE-2022-46422 MISC MISC |
netgear — wnr2000 |
An exploitable firmware modification vulnerability was discovered on the Netgear WNR2000v1 router. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v1.2.3.7 and earlier. |
2022-12-20 |
not yet calculated |
CVE-2022-46423 MISC MISC |
netgear — xwn5001_powerline_500_wifi_access_point |
An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier. |
2022-12-20 |
not yet calculated |
CVE-2022-46424 MISC MISC |
tp-link — wr1043nd |
TP-Link TL-WR1043ND V1 3.13.15 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. |
2022-12-20 |
not yet calculated |
CVE-2022-46428 MISC MISC |
docconv — docconv |
A vulnerability was found in docconv up to 1.2.0. It has been declared as critical. This vulnerability affects the function ConvertPDFImages of the file pdf_ocr.go. The manipulation of the argument path leads to os command injection. The attack can be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is b19021ade3d0b71c89d35cb00eb9e589a121faa5. It is recommended to upgrade the affected component. VDB-216502 is the identifier assigned to this vulnerability. |
2022-12-21 |
not yet calculated |
CVE-2022-4643 N/A N/A N/A MISC |
tp-link — tl-wr740n |
TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. |
2022-12-20 |
not yet calculated |
CVE-2022-46430 MISC MISC |
tp-link — tl-wr743nd |
An exploitable firmware modification vulnerability was discovered on TP-Link TL-WR743ND V1. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v3.12.20 and earlier. |
2022-12-20 |
not yet calculated |
CVE-2022-46432 MISC MISC |
tp-link — tl-wa7510n |
An issue in the firmware update process of TP-Link TL-WA7510N v1 v3.12.6 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. |
2022-12-20 |
not yet calculated |
CVE-2022-46434 MISC MISC |
tp-link — multiple_products |
An issue in the firmware update process of TP-Link TL-WR941ND V2/V3 up to 3.13.9 and TL-WR941ND V4 up to 3.12.8 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. |
2022-12-20 |
not yet calculated |
CVE-2022-46435 MISC MISC |
ikus060 — rdiffweb |
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.4. |
2022-12-22 |
not yet calculated |
CVE-2022-4644 MISC CONFIRM |
ikus060 — rdiffweb |
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.5.4. |
2022-12-22 |
not yet calculated |
CVE-2022-4646 CONFIRM MISC |
nbnbk — nbnbk |
A Cross-Site Request Forgery (CSRF) vulnerability in the Add Administrator function of the default version of nbnbk allows attackers to arbitrarily add Administrator accounts. |
2022-12-22 |
not yet calculated |
CVE-2022-46491 MISC |
nbnbk — nbnbk |
nbnbk commit 879858451d53261d10f77d4709aee2d01c72c301 was discovered to contain an arbitrary file read vulnerability via the component /api/Index/getFileBinary. |
2022-12-23 |
not yet calculated |
CVE-2022-46492 MISC |
nbnbk — nbnbk |
Default version of nbnbk was discovered to contain an arbitrary file upload vulnerability via the component /api/User/download_img. |
2022-12-22 |
not yet calculated |
CVE-2022-46493 MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan2Settings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46560 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWanSettings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46561 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the PSK parameter in the SetQuickVPNSettings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46562 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetDynamicDNSSettings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46563 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetQuickVPNSettings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46566 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the AccountPassword parameter in the SetSysEmailSettings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46568 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Key parameter in the SetWLanRadioSecurity module. |
2022-12-23 |
not yet calculated |
CVE-2022-46569 MISC MISC |
d-link — dir-882_dir882a1_fw130b06 |
D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan3Settings module. |
2022-12-23 |
not yet calculated |
CVE-2022-46570 MISC MISC |
linux — linux_kernel |
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system. |
2022-12-22 |
not yet calculated |
CVE-2022-4662 MISC MISC |
d-link — dir-846 a1_fw100a43 |
D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the lan(0)_dhcps_staticlist parameter in the SetIpMacBindSettings function. |
2022-12-23 |
not yet calculated |
CVE-2022-46641 MISC MISC |
d-link — dir-846 a1_fw100a43 |
D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the auto_upgrade_hour parameter in the SetAutoUpgradeInfo function. |
2022-12-23 |
not yet calculated |
CVE-2022-46642 MISC MISC |
ampache — ampache |
Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6. |
2022-12-23 |
not yet calculated |
CVE-2022-4665 CONFIRM MISC |
roxio — creator ljb |
Roxio Creator LJB starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. The affected product and versions are as follows: Roxio Creator LJB version number 12.2 build number 106B62B, version number 12.2 build number 106B63A, version number 12.2 build number 106B69A, version number 12.2 build number 106B71A, and version number 12.2 build number 106B74A) |
2022-12-21 |
not yet calculated |
CVE-2022-46662 MISC MISC |
ibm — urbancode_deploy |
IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.18, 7.0.5.0 through 7.0.5.13, 7.1.0.0 through 7.1.2.9, 7.2.0.0 through 7.2.3.2 and 7.3.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 242273. |
2022-12-20 |
not yet calculated |
CVE-2022-46771 MISC MISC |
usememos — memos |
Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4683 CONFIRM MISC |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4684 CONFIRM MISC |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4685 CONFIRM MISC |
usememos — memos |
Improper Authentication in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4686 MISC CONFIRM |
usememos — memos |
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4687 CONFIRM MISC |
mozilla — firefox |
An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108. |
2022-12-22 |
not yet calculated |
CVE-2022-46871 MISC MISC |
mozilla — multiple_products |
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages. *This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46872 MISC MISC MISC MISC |
mozilla — firefox |
Because Firefox did not implement the unsafe-hashes CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108. |
2022-12-22 |
not yet calculated |
CVE-2022-46873 MISC MISC |
mozilla — multiple_products |
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code. *Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46874 MISC MISC MISC MISC MISC |
mozilla — multiple_products |
The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user’s computer. *Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46875 MISC MISC MISC MISC |
mozilla — firefox |
By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108. |
2022-12-22 |
not yet calculated |
CVE-2022-46877 MISC MISC |
mozilla — multiple_products |
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46878 MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108. |
2022-12-22 |
not yet calculated |
CVE-2022-46879 MISC MISC |
usememos — memos |
Improper Authorization in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4688 CONFIRM MISC |
mozilla — multiple_products |
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash. *Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46880 MISC MISC MISC MISC |
mozilla — multiple_products |
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46881 MISC MISC MISC MISC |
mozilla — multiple_products |
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6. |
2022-12-22 |
not yet calculated |
CVE-2022-46882 MISC MISC MISC MISC |
mozilla — firefox |
Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. *Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. |
2022-12-22 |
not yet calculated |
CVE-2022-46883 MISC MISC |
mozilla — firefox |
Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 106. |
2022-12-22 |
not yet calculated |
CVE-2022-46885 MISC MISC |
usememos — memos |
Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4689 CONFIRM MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4690 CONFIRM MISC |
tp-link — multiple_products |
An issue in the firmware update process of TP-Link TL-WA901ND V1 up to v3.11.2 and TL-WA901N V2 up to v3.12.16 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. |
2022-12-20 |
not yet calculated |
CVE-2022-46910 MISC MISC |
tp-link — multiple_products |
An issue in the firmware update process of TP-Link TL-WR841N / TL-WA841ND V7 3.13.9 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. |
2022-12-20 |
not yet calculated |
CVE-2022-46912 MISC MISC |
tp-link — multiple_products |
An issue in the firmware update process of TP-LINK TL-WA801N / TL-WA801ND V1 v3.12.16 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. |
2022-12-20 |
not yet calculated |
CVE-2022-46914 MISC MISC |
usememos — memos |
Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. |
2022-12-23 |
not yet calculated |
CVE-2022-4692 CONFIRM MISC |
wordpress — wordpress |
The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp_user_cover_default_image_url’ parameter in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2022-12-23 |
not yet calculated |
CVE-2022-4697 MISC MISC |
wordpress — wordpress |
The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several form fields in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2022-12-23 |
not yet calculated |
CVE-2022-4698 MISC MISC |
solarwinds– hybrid_cloud_observability |
Sensitive information was stored in plain text in a file that is accessible by a user with a local account in Hybrid Cloud Observability (HCO)/ SolarWinds Platform 2022.4. No other versions are affected |
2022-12-19 |
not yet calculated |
CVE-2022-47512 MISC MISC |
f-secure_safe_browser — f-secure_safe_browser |
F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack. |
2022-12-23 |
not yet calculated |
CVE-2022-47524 CONFIRM |
gossipsub — gossipsub |
GossipSub 1.1, as used for Ethereum 2.0, allows a peer to maintain a positive score (and thus not be pruned from the network) even though it continuously misbehaves by never forwarding topic messages. |
2022-12-19 |
not yet calculated |
CVE-2022-47547 MISC |
optee_os — optee_os |
An unprotected memory-access operation in optee_os in TrustedFirmware Open Portable Trusted Execution Environment (OP-TEE) before 3.20 allows a physically proximate adversary to bypass signature verification and install malicious trusted applications via electromagnetic fault injections. |
2022-12-19 |
not yet calculated |
CVE-2022-47549 MISC MISC |
apiman — apiman |
Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. The root cause of the issue is the Apiman project’s accidental acceptance of a large contribution that was not fully compatible with the security model of Apiman versions before 3.0.0.Final. Because of this, 3.0.0.Final is not affected by the vulnerability. |
2022-12-20 |
not yet calculated |
CVE-2022-47551 MISC MISC |
zoho — manageengine_device_control_plus |
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by making use of a virtual machine (VM). This allows a file to be exchanged outside the laptop/system. VMs can be created by any user (even without admin rights). The data exfiltration can occur without any record in the audit trail of Windows events on the host machine. |
2022-12-20 |
not yet calculated |
CVE-2022-47577 MISC MISC |
zoho — manageengine_device_control_plus |
An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by booting into Safe Mode. This allows a file to be exchanged outside the laptop/system. Safe Mode can be launched by any user (even without admin rights). Data exfiltration can occur, and also malware might be introduced onto the system. |
2022-12-20 |
not yet calculated |
CVE-2022-47578 MISC MISC |
isode_m-vault — isode_m-vault |
Isode M-Vault 16.0v0 through 17.x before 17.0v24 can crash upon an LDAP v1 bind request. |
2022-12-21 |
not yet calculated |
CVE-2022-47581 MISC |
libksba — libksba |
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser. |
2022-12-20 |
not yet calculated |
CVE-2022-47629 MISC MISC DEBIAN MLIST |
kyverno — kyverno |
An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases. |
2022-12-23 |
not yet calculated |
CVE-2022-47633 MISC MISC MISC CONFIRM MISC |
wildix_wms — wildix_wms |
Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php. |
2022-12-21 |
not yet calculated |
CVE-2022-47635 CONFIRM |
jetbrains — intellij-idea |
In JetBrains IntelliJ IDEA before 2022.3.1 the “Validate JSP File” action used the HTTP protocol to download required JAR files. |
2022-12-22 |
not yet calculated |
CVE-2022-47895 MISC |
jetbrains — intellij-idea |
In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks. |
2022-12-22 |
not yet calculated |
CVE-2022-47896 MISC |
ayacms — ayacms |
AyaCMS 3.1.2 is vulnerable to file deletion via /aya/module/admin/fst_del.inc.php |
2022-12-22 |
not yet calculated |
CVE-2022-47926 MISC |
misp — misp |
In MISP before 2.4.167, there is XSS in the template file uploads in app/View/Templates/upload_file.ctp. |
2022-12-22 |
not yet calculated |
CVE-2022-47928 MISC |
io_finnet_tss-lib — io_finnet_tss-lib |
IO FinNet tss-lib before 2.0.0 allows a collision of hash values. |
2022-12-23 |
not yet calculated |
CVE-2022-47931 MISC MISC |
brave_browser — brave_browser |
Brave Browser before 1.43.34 allowed a remote attacker to cause a denial of service via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This vulnerability is caused by an incomplete fix for CVE-2022-47933. |
2022-12-24 |
not yet calculated |
CVE-2022-47932 MISC MISC MISC MISC |
brave_browser — brave_browser |
Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. |
2022-12-24 |
not yet calculated |
CVE-2022-47933 MISC MISC MISC MISC MISC |
brave_browser — brave_browser |
Brave Browser before 1.43.88 allowed a remote attacker to cause a denial of service in private and guest windows via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This is caused by an incomplete fix for CVE-2022-47932 and CVE-2022-47934. |
2022-12-24 |
not yet calculated |
CVE-2022-47934 MISC MISC MISC MISC MISC |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT. |
2022-12-23 |
not yet calculated |
CVE-2022-47938 MISC MISC MISC MLIST |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT. |
2022-12-23 |
not yet calculated |
CVE-2022-47939 MISC MISC MISC MLIST |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write. |
2022-12-23 |
not yet calculated |
CVE-2022-47940 MISC MISC MISC MLIST |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak. |
2022-12-23 |
not yet calculated |
CVE-2022-47941 MISC MISC MISC MLIST |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command. |
2022-12-23 |
not yet calculated |
CVE-2022-47942 MISC MISC MISC MLIST |
linux — ksmbd |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case. |
2022-12-23 |
not yet calculated |
CVE-2022-47943 MISC MISC MISC MLIST |
thinkphp_framework — thinkphp_framework |
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php. |
2022-12-23 |
not yet calculated |
CVE-2022-47945 MISC MISC MISC |
linux — kernel |
An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq. |
2022-12-23 |
not yet calculated |
CVE-2022-47946 MISC MISC |
nintendo — networkbuffer |
The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022. |
2022-12-24 |
not yet calculated |
CVE-2022-47949 MISC |
Recent Comments