DefendEdge Logo
Categories
alerts

Microsoft Releases September 2022 Security Updates

Original release date: September 13, 2022

Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.

CISA encourages users and administrators to review Microsoft’s September 2022 Security Update Guide and Deployment Information and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Vulnerability Summary for the Week of September 5, 2022

Original release date: September 12, 2022

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apache — airflow In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation. 2022-09-02 not yet calculated CVE-2022-38054
CONFIRM
MLIST
apache — airflow In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `–daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. 2022-09-02 not yet calculated CVE-2022-38170
CONFIRM
MLIST
MLIST
apache — iotdb Apache IoTDB version 0.13.0 is vulnerable by session id attack. Users should upgrade to version 0.13.1 which addresses this issue. 2022-09-05 not yet calculated CVE-2022-38369
MISC
MLIST
apache — iotdb Apache IoTDB grafana-connector version 0.13.0 contains an interface without authorization, which may expose the internal structure of database. Users should upgrade to version 0.13.1 which addresses this issue. 2022-09-05 not yet calculated CVE-2022-38370
MISC
MLIST
apache — ofbiz Apache OFBiz uses the Birt plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. In Apache OFBiz release 18.12.05, and earlier versions, by leveraging a vulnerability in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142), an unauthenticated malicious user could perform a stored XSS attack in order to inject a malicious payload and execute it using the stored XSS. 2022-09-02 not yet calculated CVE-2022-25370
CONFIRM
MLIST
MLIST
apache — ofbiz Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier. 2022-09-02 not yet calculated CVE-2022-25371
CONFIRM
MLIST
MLIST
apache — ofbiz In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the “Contact us” page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible. 2022-09-02 not yet calculated CVE-2022-25813
CONFIRM
MLIST
apache — ofbiz The Solr plugin of Apache OFBiz is configured by default to automatically make a RMI request on localhost, port 1099. In version 18.12.05 and earlier, by hosting a malicious RMI server on localhost, an attacker may exploit this behavior, at server start-up or on a server restart, in order to run arbitrary code. Upgrade to at least 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12646. 2022-09-02 not yet calculated CVE-2022-29063
CONFIRM
MLIST
apache — ofbiz
 
Apache OFBiz up to version 18.12.05 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles URLs provided by external, unauthenticated users. Upgrade to 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12599 2022-09-02 not yet calculated CVE-2022-29158
CONFIRM
MLIST
appsmith — appsmith Server-side JavaScript injection in Appsmith through 1.7.14 allows remote attackers to execute arbitrary JavaScript code from the server via the currentItem property of the list widget, e.g., to perform DoS attacks or achieve an information leak. 2022-09-05 not yet calculated CVE-2022-39824
MISC
MISC
asp.net_core — miniblog.core Miniblog.Core v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blog/edit. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Excerpt field. 2022-09-02 not yet calculated CVE-2022-37679
MISC
atlassian — jira The Netic User Export add-on before 2.0.6 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all users from Jira by making an HTTP request to the affected endpoint. 2022-09-05 not yet calculated CVE-2022-38367
MISC
MISC
avaya — ip_office_admin_lite_and_usb_creator A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions. 2022-09-02 not yet calculated CVE-2021-25657
CONFIRM
bitdefender — bitdefender_gravityzone_console Deserialization of Untrusted Data vulnerability in the message processing component of Bitdefender GravityZone Console allows an attacker to pass unsafe commands to the environment. This issue affects: Bitdefender GravityZone Console On-Premise versions prior to 6.29.2-1. Bitdefender GravityZone Cloud Console versions prior to 6.27.2-2. 2022-09-05 not yet calculated CVE-2022-2830
MISC
blackboard — learn Blackboard Learn 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL. 2022-09-05 not yet calculated CVE-2022-39196
MISC
blogengine — blogengine BlogEngine v3.3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blogengine/api/posts. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field. 2022-09-02 not yet calculated CVE-2022-36600
MISC
chatwoot — chatwoot
 
Improper Authorization in GitHub repository chatwoot/chatwoot prior to 2.8. 2022-09-06 not yet calculated CVE-2022-2901
MISC
CONFIRM
cotonti — siena Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a forum post. 2022-09-05 not yet calculated CVE-2022-39839
MISC
cotonti — siena Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a direct message (DM). 2022-09-05 not yet calculated CVE-2022-39840
MISC
databasir — databasir
 
Databasir is a database metadata management platform. Databasir <= 1.06 has Server-Side Request Forgery (SSRF) vulnerability. The SSRF is triggered by a sending a **single** HTTP POST request to create a databaseType. By supplying a `jdbcDriverFileUrl` that returns a non `200` response code, the url is executed, the response is logged (both in terminal and in database) and is included in the response. This would allow an attackers to obtain the real IP address and scan Intranet information. This issue was fixed in version 1.0.7. 2022-09-02 not yet calculated CVE-2022-31196
MISC
CONFIRM
MISC
dell — multiple_products
 
Dell Command Update, Dell Update and Alienware Update versions prior to 4.6.0 contains a Local Privilege Escalation Vulnerability in the custom catalog configuration. A local malicious user may potentially exploit this vulnerability in order to elevate their privileges. 2022-09-02 not yet calculated CVE-2022-34382
MISC
dell — powerscale_onefs Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.3, contain an unprotected transport of credentials vulnerability. A malicious unprivileged network attacker could potentially exploit this vulnerability, leading to full system compromise. 2022-09-02 not yet calculated CVE-2022-34371
MISC
dell — powerscale_onefs Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.20, 9.2.1.13, 9.3.0.6, and 9.4.0.3 , contain an insertion of sensitive information in log files vulnerability. A remote unprivileged attacker could potentially exploit this vulnerability, leading to exposure of this sensitive data. 2022-09-02 not yet calculated CVE-2022-34369
MISC
dell — powerscale_onefs
 
Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.20, 9.2.1.13, 9.3.0.6, and 9.4.0.3, contain a relative path traversal vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to denial of service. 2022-09-02 not yet calculated CVE-2022-34378
MISC
discourse — discourse Discourse through 2.8.7 allows admins to send invitations to arbitrary email addresses at an unlimited rate. 2022-09-02 not yet calculated CVE-2022-37458
MISC
MISC
MISC
dokuwiki — dokuwiki Cross-site Scripting (XSS) – Reflected in GitHub repository splitbrain/dokuwiki prior to 2022-07-31a. 2022-09-05 not yet calculated CVE-2022-3123
MISC
CONFIRM
drakkan — sftpgo SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user’s password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it. 2022-09-02 not yet calculated CVE-2022-36071
MISC
CONFIRM
drawio — drawio Cross-site Scripting (XSS) – Stored in GitHub repository jgraph/drawio prior to 20.2.8. 2022-09-05 not yet calculated CVE-2022-3127
CONFIRM
MISC
drawio — drawio Improper Access Control in GitHub repository jgraph/drawio prior to 20.2.8. 2022-09-02 not yet calculated CVE-2022-3065
CONFIRM
MISC
gagliardetto — binary
 
Binary provides encoding/decoding in Borsh and other formats. The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program. When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it’s possible to allocate memory with excessive size. When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value. Users should upgrade to `v0.7.1` or higher. A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice. 2022-09-02 not yet calculated CVE-2022-36078
CONFIRM
MISC
MISC
garage_management_system — garage_management_system An access control issue in the component print.php of Garage Management System v1.0 allows unauthenticated attackers to access data for all existing orders. 2022-09-02 not yet calculated CVE-2022-36638
MISC
MISC
garage_management_system — garage_management_system Garage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /print.php. 2022-09-02 not yet calculated CVE-2022-36636
MISC
MISC
garage_management_system — garage_management_system Garage Management System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via the brand_name parameter at /brand.php. 2022-09-02 not yet calculated CVE-2022-36637
MISC
MISC
garage_management_system — garage_management_system A stored cross-site scripting (XSS) vulnerability in /client.php of Garage Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter. 2022-09-02 not yet calculated CVE-2022-36639
MISC
MISC
geonetwork — geonetwork
 
A privileged attacker in GeoNetwork before 3.12.0 and 4.x before 4.0.4 can use the directory harvester before-script to execute arbitrary OS commands remotely on the hosting infrastructure. A User Administrator or Administrator account is required to perform this. This occurs in the runBeforeScript method in harvesters/src/main/java/org/fao/geonet/kernel/harvest/harvester/localfilesystem/LocalFilesystemHarvester.java. The earliest affected version is 3.4.0. 2022-09-05 not yet calculated CVE-2021-28398
MISC
CONFIRM
MISC
MISC
grafana — grafana_image_renderer Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer). 2022-09-02 not yet calculated CVE-2022-31176
CONFIRM
MISC
hitachi — raid_manager_storage_replicationadapter OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker. 2022-09-06 not yet calculated CVE-2022-34883
MISC
hitachi — raid_manager_storage_replicationadapter Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker. 2022-09-06 not yet calculated CVE-2022-34882
MISC
ibm — 123elf_lotus_1-2-3
 
123elf Lotus 1-2-3 before 1.0.0rc3 for Linux, and Lotus 1-2-3 R3 for UNIX and other platforms through 9.8.2, allow attackers to execute arbitrary code via a crafted worksheet. This occurs because of a stack-based buffer overflow in the cell format processing routines, as demonstrated by a certain function call from process_fmt() that can be reached via a w3r_format element in a wk3 document. 2022-09-05 not yet calculated CVE-2022-39843
MISC
MISC
kkfileview — kkfileview kkFileView v4.0.0 was discovered to contain an arbitrary file deletion vulnerability via the fileName parameter at /controller/FileController.java. 2022-09-02 not yet calculated CVE-2022-36593
MISC
libdwarf — libdwarf libdwarf 0.4.1 has a double free in _dwarf_exec_frame_instr in dwarf_frame.c. 2022-09-02 not yet calculated CVE-2022-39170
MISC
MISC
libvnclient — libvnclient libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup(). 2022-09-02 not yet calculated CVE-2020-29260
MISC
linux — bluez BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c. 2022-09-02 not yet calculated CVE-2022-39177
MISC
MISC
linux — bluez BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. 2022-09-02 not yet calculated CVE-2022-39176
MISC
MISC
linux — linux_kernel An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations. 2022-09-02 not yet calculated CVE-2022-39189
MISC
MISC
MISC
MISC
linux — linux_kernel An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. 2022-09-02 not yet calculated CVE-2022-39190
MISC
MISC
MISC
MISC
linux — linux_kernel An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. 2022-09-05 not yet calculated CVE-2022-39842
MISC
MISC
linux — linux_kernel An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs. 2022-09-02 not yet calculated CVE-2022-39188
MISC
MISC
MISC
MISC
MISC
mediawiki — mediawiki An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed. 2022-09-02 not yet calculated CVE-2022-39194
MISC
modsecurity — owasp-modsecurity-crs Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. 2022-09-02 not yet calculated CVE-2020-22669
CONFIRM
MISC
mybatis — mapper Mapper v4.0.0 to v4.2.0 was discovered to contain a SQL injection vulnerability via the ids parameter at the selectByIds function. 2022-09-02 not yet calculated CVE-2022-36594
MISC
nodebb — nodebb
 
NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. Due to an unnecessarily strict conditional in the code handling the first step of the SSO process, the pre-existing logic that added (and later checked) a nonce was inadvertently rendered opt-in instead of opt-out. This re-exposed a vulnerability in that a specially crafted Man-in-the-Middle (MITM) attack could theoretically take over another user account during the single sign-on process. The issue has been fully patched in version 1.17.2. 2022-09-02 not yet calculated CVE-2022-36076
MISC
CONFIRM
MISC
online_food_ordering_system — online_food_ordering_system Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=. 2022-09-02 not yet calculated CVE-2022-36759
MISC
otrs_ag — otrs Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package 2022-09-05 not yet calculated CVE-2022-39051
CONFIRM
otrs_ag — otrs
 
An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap 2022-09-05 not yet calculated CVE-2022-39050
CONFIRM
otrs_ag — otrs
 
An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS. 2022-09-05 not yet calculated CVE-2022-39049
CONFIRM
pfsense — pfblockerng pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. 2022-09-05 not yet calculated CVE-2022-31814
MISC
MISC
pkuvcl — pkuvcl_davs2 PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269. 2022-09-02 not yet calculated CVE-2022-36647
MISC
prestashop — prestashop This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator’s cookie. The issue is fixed in version 5.0.2. 2022-09-02 not yet calculated CVE-2022-35933
CONFIRM
MISC
pspp — pspp An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. 2022-09-05 not yet calculated CVE-2022-39832
MISC
pspp — pspp
 
An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This issue is different from CVE-2018-20230. 2022-09-05 not yet calculated CVE-2022-39831
MISC
publiccms — publiccms Server-side Request Forgery (SSRF) vulnerability in PublicCMS before 4.0.202011.b via /publiccms/admin/ueditor when the action is catchimage. 2022-09-02 not yet calculated CVE-2021-27693
MISC
MISC
qualcomm — snapdragon Memory corruption in multimedia due to buffer overflow while processing count variable from client in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-25680
CONFIRM
qualcomm — snapdragon Devices with keyprotect off may store unencrypted keybox in RPMB and cause cryptographic issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-22069
CONFIRM
qualcomm — snapdragon Memory corruption in Bluetooth HOST due to stack-based buffer overflow when when extracting data using command length parameter in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22096
CONFIRM
qualcomm — snapdragon Non-secure region can try modifying RG permissions of IO space xPUs due to improper input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35122
CONFIRM
qualcomm — snapdragon Improper validation of backend id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music 2022-09-02 not yet calculated CVE-2022-22080
CONFIRM
qualcomm — snapdragon Memory corruption in audio due to lack of check of invalid routing address into APR Routing table in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-22070
CONFIRM
qualcomm — snapdragon Potential memory leak in modem during the processing of NSA RRC Reconfiguration with invalid Radio Bearer Config in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22067
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to improper validation of array index in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22099
CONFIRM
qualcomm — snapdragon An out-of-bounds read can occur while parsing a server certificate due to improper length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking 2022-09-02 not yet calculated CVE-2022-22062
CONFIRM
qualcomm — snapdragon Out of bounds writing is possible while verifying device IDs due to improper length check before copying the data in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22061
CONFIRM
qualcomm — snapdragon Memory corruption due to out of bound read while parsing a video file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22059
CONFIRM
qualcomm — snapdragon Improper checking of AP-S lock bit while verifying the secure resource group permissions can lead to non secure read and write access in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35108
CONFIRM
qualcomm — snapdragon Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35097
CONFIRM
qualcomm — snapdragon Out of bound write in DSP service due to improper bound check for response buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35132
CONFIRM
qualcomm — snapdragon Use after free in the synx driver issue while performing other functions during multiple invocation of synx release calls in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35133
CONFIRM
qualcomm — snapdragon Memory corruption in graphic driver due to use after free while calling multiple threads application to driver. in Snapdragon Consumer IOT 2022-09-02 not yet calculated CVE-2022-22097
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia driver due to untrusted pointer dereference while reading data from socket in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22098
CONFIRM
qualcomm — snapdragon A null pointer dereference may potentially occur during RSA key import in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35135
CONFIRM
qualcomm — snapdragon Memory corruption due to buffer overflow occurs while processing invalid MKV clip which has invalid seek header in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25657
CONFIRM
qualcomm — snapdragon Memory corruption in video driver due to double free while parsing ASF clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25668
CONFIRM
qualcomm — snapdragon Due to insufficient validation of ELF headers, an Incorrect Calculation of Buffer Size can occur in Boot leading to memory corruption in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35134
CONFIRM
qualcomm — snapdragon Denial of service in multimedia due to uncontrolled resource consumption while parsing an incoming HAB message in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22101
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to incorrect type conversion while adding data in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22102
CONFIRM
qualcomm — snapdragon Memory corruption due to buffer overflow while parsing MKV clips with invalid bitmap size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25659
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to improper check on the messages received. in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22104
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to improper length check while copying the data in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22106
CONFIRM
qualcomm — snapdragon Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35113
CONFIRM
qualcomm — snapdragon Memory corruption due to incorrect pointer arithmetic when attempting to change the endianness in video parser function in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25658
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to improper check on received export descriptors in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22100
CONFIRM
qualcomm — snapdragon
 
Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35109
CONFIRM
rosariosis — rosariosis Improper Handling of Length Parameter Inconsistency in GitHub repository francoisjacquet/rosariosis prior to 10.0. 2022-09-06 not yet calculated CVE-2022-2714
CONFIRM
MISC
samsung — mtower sign_pFwInfo in Samsung mTower through 0.3.0 has a missing check on the return value of EC_KEY_set_public_key_affine_coordinates, leading to a denial of service. 2022-09-05 not yet calculated CVE-2022-39830
MISC
MISC
MISC
samsung — mtower
 
There is a NULL pointer dereference in aes256_encrypt in Samsung mTower through 0.3.0 due to a missing check on the return value of EVP_CIPHER_CTX_new. 2022-09-05 not yet calculated CVE-2022-39829
MISC
MISC
MISC
samsung — mtower
 
sign_pFwInfo in Samsung mTower through 0.3.0 has a missing check on the return value of EC_KEY_set_private_key, leading to a denial of service. 2022-09-05 not yet calculated CVE-2022-39828
MISC
MISC
MISC
snakeyaml — snakeyaml Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. 2022-09-05 not yet calculated CVE-2022-38749
MISC
MISC
snakeyaml — snakeyaml Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. 2022-09-05 not yet calculated CVE-2022-38750
MISC
MISC
snakeyaml — snakeyaml Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. 2022-09-05 not yet calculated CVE-2022-38751
MISC
MISC
snakeyaml — snakeyaml
 
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. 2022-09-05 not yet calculated CVE-2022-38752
MISC
MISC
sourcecodehero — sourcecodehero_erp_system_project A vulnerability was found in Sourcecodehero ERP System Project. It has been rated as critical. This issue affects some unknown processing of the file /pages/processlogin.php. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207845 was assigned to this vulnerability. 2022-09-04 not yet calculated CVE-2022-3118
MISC
MISC
sourcecodester — clinics_patient_management_system A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file medicine_details.php. The manipulation of the argument medicine leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207854 is the identifier assigned to this vulnerability. 2022-09-05 not yet calculated CVE-2022-3122
MISC
MISC
sourcecodester — clinics_patient_management_system A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument user_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-207847. 2022-09-05 not yet calculated CVE-2022-3120
MISC
MISC
sourcecodester — clinic’s_patient_management_system Clinic’s Patient Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /pms/update_patient.php. 2022-09-02 not yet calculated CVE-2022-36609
MISC
sourcecodester — expense_management_system Expense Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /Home/debit_credit_p. 2022-09-02 not yet calculated CVE-2022-36754
MISC
sourcecodester — online_employee_leave_management_system A vulnerability was found in SourceCodester Online Employee Leave Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/addemployee.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The identifier VDB-207853 was assigned to this vulnerability. 2022-09-05 not yet calculated CVE-2022-3121
MISC
synapse — synapse
 
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix specification specifies a list of [event authorization rules](https://spec.matrix.org/v1.2/rooms/v9/#authorization-rules) which must be checked when determining if an event should be accepted into a room. In versions of Synapse up to and including version 1.61.0, some of these rules are not correctly applied. An attacker could craft events which would be accepted by Synapse but not a spec-conformant server, potentially causing divergence in the room state between servers. Administrators of homeservers with federation enabled are advised to upgrade to version 1.62.0 or higher. Federation can be disabled by setting [`federation_domain_whitelist`](https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#federation_domain_whitelist) to an empty list (`[]`) as a workaround. 2022-09-02 not yet calculated CVE-2022-31152
MISC
MISC
MISC
CONFIRM
systematic_fix_adapter — systematic_fix_adapter Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames. 2022-09-05 not yet calculated CVE-2022-39838
MISC
MISC
MISC
telos_alliance — omnia_mpx_node
 
A local file disclosure vulnerability in /appConfig/userDB.json of Telos Alliance Omnia MPX Node through 1.5.0+r1 allows attackers to escalate privileges to root and execute arbitrary commands. 2022-09-02 not yet calculated CVE-2022-36642
MISC
MISC
MISC
MISC
tinygltf — tinygltf
 
The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751 2022-09-05 not yet calculated CVE-2022-3008
CONFIRM
CONFIRM
CONFIRM
CONFIRM
vim — vim Use After Free in GitHub repository vim/vim prior to 9.0.0360. 2022-09-03 not yet calculated CVE-2022-3099
CONFIRM
MISC
wolfssl — wolfssl wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers. 2022-09-02 not yet calculated CVE-2021-44718
MISC
MISC
wordpress — wordpress The Simple Single Sign On WordPress plugin through 4.1.0 leaks its OAuth client_secret, which could be used by attackers to gain unauthorized access to the site. 2022-09-05 not yet calculated CVE-2022-2083
MISC
MISC
wordpress — wordpress The WP Database Backup WordPress plugin before 5.9 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-09-05 not yet calculated CVE-2022-2271
MISC
wordpress — wordpress The Directorist WordPress plugin before 7.3.1 discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users 2022-09-05 not yet calculated CVE-2022-2376
MISC
wordpress — wordpress The Visual Portfolio, Photo Gallery & Post Grid WordPress plugin before 2.18.0 does not have proper authorisation checks in some of its REST endpoints, allowing unauthenticated users to call them and inject arbitrary CSS in arbitrary saved layouts 2022-09-05 not yet calculated CVE-2022-2543
MISC
wordpress — wordpress The Simple Payment Donations & Subscriptions WordPress plugin before 4.2.1 does not sanitise and escape user input given in its forms, which could allow unauthenticated attackers to perform Cross-Site Scripting attacks against admins 2022-09-05 not yet calculated CVE-2022-2565
MISC
wordpress — wordpress The Visual Portfolio, Photo Gallery & Post Grid WordPress plugin before 2.19.0 does not have proper authorisation checks in some of its REST endpoints, allowing users with a role as low as contributor to call them and inject arbitrary CSS in arbitrary saved layouts 2022-09-05 not yet calculated CVE-2022-2597
MISC
wordpress — wordpress The Multivendor Marketplace Solution for WooCommerce WordPress plugin before 3.8.12 is lacking authorisation and CSRF in multiple AJAX actions, which could allow any authenticated users, such as subscriber to call them and suspend vendors (reporter by the submitter) or update arbitrary order status (identified by WPScan when verifying the issue) for example. Other unauthenticated attacks are also possible, either directly or via CSRF 2022-09-05 not yet calculated CVE-2022-2657
MISC
wordpress — wordpress The Fast Flow WordPress plugin before 1.2.13 does not sanitise and escape some of its Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-09-05 not yet calculated CVE-2022-2775
MISC
zyxel — nas326
 
A format string vulnerability in Zyxel NAS326 firmware versions prior to V5.21(AAZF.12)C0 could allow an attacker to achieve unauthorized remote code execution via a crafted UDP packet. 2022-09-06 not yet calculated CVE-2022-34747
CONFIRM

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Vulnerability Summary for the Week of August 29, 2022

Original release date: September 6, 2022 | Last revised: September 8, 2022

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated CVE-2022-35019
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a segmentation fault. 2022-08-29 not yet calculated CVE-2022-35018
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a heap buffer overflow. 2022-08-29 not yet calculated CVE-2022-35016
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a heap buffer overflow via le_uint32_read at /lib/endianrw.h. 2022-08-29 not yet calculated CVE-2022-35015
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a heap buffer overflow. 2022-08-29 not yet calculated CVE-2022-35017
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 was discovered to contain a heap buffer overflow via the component __interceptor_memcpy at /sanitizer_common/sanitizer_common_interceptors.inc. 2022-08-29 not yet calculated CVE-2022-35020
MISC
MISC
advancecomp — advancecomp Advancecomp v2.3 contains a segmentation fault. 2022-08-29 not yet calculated CVE-2022-35014
MISC
MISC
aero — aerocms AeroCMS 0.1.1 is vulnerable to SQL Injection via the author parameter. 2022-08-31 not yet calculated CVE-2022-38812
MISC
apache — airflow In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation. 2022-09-02 not yet calculated CVE-2022-38054
CONFIRM
MLIST
apache — airflow In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `–daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. 2022-09-02 not yet calculated CVE-2022-38170
CONFIRM
MLIST
MLIST
apache — geode
 
Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and specify “–J=-Dgeode.enableGlobalSerialFilter=true” when starting any Locators or Servers. Follow the documentation for details on specifying any user classes that may be serialized/deserialized with the “serializable-object-filter” configuration option. Using a global serial filter will impact performance. 2022-08-31 not yet calculated CVE-2022-37021
CONFIRM
apache — geode
 
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling “validate-serializable-objects=true” and specifying any user classes that may be serialized/deserialized with “serializable-object-filter”. Enabling “validate-serializable-objects” may impact performance. 2022-08-31 not yet calculated CVE-2022-37023
CONFIRM
apache — geode
 
Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RMI against deserialization attacks. This should have no impact on performance since it only affects JMX/RMI which Gfsh uses to communicate with the JMX Manager which is hosted on a Locator. 2022-08-31 not yet calculated CVE-2022-37022
CONFIRM
apache — ofbiz
 
Apache OFBiz uses the Birt plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. In Apache OFBiz release 18.12.05, and earlier versions, by leveraging a vulnerability in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142), an unauthenticated malicious user could perform a stored XSS attack in order to inject a malicious payload and execute it using the stored XSS. 2022-09-02 not yet calculated CVE-2022-25370
CONFIRM
MLIST
MLIST
apache — ofbiz
 
Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier. 2022-09-02 not yet calculated CVE-2022-25371
CONFIRM
MLIST
MLIST
apache — ofbiz
 
In Apache OFBiz, versions 18.12.05 and earlier, an attacker acting as an anonymous user of the ecommerce plugin, can insert a malicious content in a message “Subject” field from the “Contact us” page. Then a party manager needs to list the communications in the party component to activate the SSTI. A RCE is then possible. 2022-09-02 not yet calculated CVE-2022-25813
CONFIRM
MLIST
apache — ofbiz
 
Apache OFBiz up to version 18.12.05 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles URLs provided by external, unauthenticated users. Upgrade to 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12599 2022-09-02 not yet calculated CVE-2022-29158
CONFIRM
MLIST
apache — shenyu Apache ShenYu Admin has insecure permissions, which may allow low-privilege administrators to modify high-privilege administrator’s passwords. This issue affects Apache ShenYu 2.4.2 and 2.4.3. 2022-09-01 not yet calculated CVE-2022-37435
CONFIRM
apache — ofbiz
 
The Solr plugin of Apache OFBiz is configured by default to automatically make a RMI request on localhost, port 1099. In version 18.12.05 and earlier, by hosting a malicious RMI server on localhost, an attacker may exploit this behavior, at server start-up or on a server restart, in order to run arbitrary code. Upgrade to at least 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12646. 2022-09-02 not yet calculated CVE-2022-29063
CONFIRM
MLIST
apostrophecms — sanitize-html The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal. 2022-08-30 not yet calculated CVE-2022-25887
CONFIRM
CONFIRM
CONFIRM
CONFIRM
arcsight — micro_focus_arcsight_logger Potential vulnerabilities have been identified in Micro Focus ArcSight Logger. The vulnerabilities could be remotely exploited resulting in Information Disclosure, or Self Cross-Site Scripting (XSS). This issue affects: Micro Focus ArcSight Logger versions prior to v7.2.2 version and prior versions. 2022-08-31 not yet calculated CVE-2022-26331
MISC
MISC
arcsight — micro_focus_arcsight_logger
 
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger. The vulnerabilities could be remotely exploited resulting in Information Disclosure, or Self Cross-Site Scripting (XSS). This issue affects: Micro Focus ArcSight Logger versions prior to v7.2.2 version and prior versions. 2022-08-31 not yet calculated CVE-2022-26330
MISC
MISC
armdeveloper — midgard/bifrost/valhall_kernel_driver
 
An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory, write a limited amount outside of buffer bounds, or to disclose details of memory mappings. This affects Midgard r4p0 through r32p0, Bifrost r0p0 through r38p0 and r39p0 before r38p1, and Valhall r19p0 through r38p0 and r39p0 before r38p1. 2022-09-01 not yet calculated CVE-2022-36449
MISC
artifex — mupdf A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream. 2022-08-26 not yet calculated CVE-2021-4216
MISC
MISC
asp.net_core — miniblog.core Miniblog.Core v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blog/edit. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Excerpt field. 2022-09-02 not yet calculated CVE-2022-37679
MISC
automationdirect — c-more_ea9_http_webserver
 
AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73; 2022-08-31 not yet calculated CVE-2022-2005
CONFIRM
automationdirect — directlogic
 
AutomationDirect DirectLOGIC is vulnerable to a specifically crafted serial message to the CPU serial port that will cause the PLC to respond with the PLC password in cleartext. This could allow an attacker to access and make unauthorized changes. This issue affects: AutomationDirect DirectLOGIC D0-06 series CPUs D0-06DD1 versions prior to 2.72; D0-06DD2 versions prior to 2.72; D0-06DR versions prior to 2.72; D0-06DA versions prior to 2.72; D0-06AR versions prior to 2.72; D0-06AA versions prior to 2.72; D0-06DD1-D versions prior to 2.72; D0-06DD2-D versions prior to 2.72; D0-06DR-D versions prior to 2.72; 2022-08-31 not yet calculated CVE-2022-2003
CONFIRM
CONFIRM
automationdirect — directlogic
 
AutomationDirect DirectLOGIC is vulnerable to a a specially crafted packet can be sent continuously to the PLC to prevent access from DirectSoft and other devices, causing a denial-of-service condition. This issue affects: AutomationDirect DirectLOGIC D0-06 series CPUs D0-06DD1 versions prior to 2.72; D0-06DD2 versions prior to 2.72; D0-06DR versions prior to 2.72; D0-06DA versions prior to 2.72; D0-06AR versions prior to 2.72; D0-06AA versions prior to 2.72; D0-06DD1-D versions prior to 2.72; D0-06DD2-D versions prior to 2.72; D0-06DR-D versions prior to 2.72; 2022-08-31 not yet calculated CVE-2022-2004
CONFIRM
automationdirect — directlogic
 
AutomationDirect DirectLOGIC has a DLL vulnerability in the install directory that may allow an attacker to execute code during the installation process. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73; 2022-08-31 not yet calculated CVE-2022-2006
CONFIRM
automationdirect — stride_field_i/o
 
Any attempt (good or bad) to log into AutomationDirect Stride Field I/O with a web browser may result in the device responding with its password in the communication packets. 2022-08-31 not yet calculated CVE-2022-2485
CONFIRM
CONFIRM
avaya — ip_office_admin_lite_and_usb_creator
 
A privilege escalation vulnerability was discovered in Avaya IP Office Admin Lite and USB Creator that may potentially allow a local user to escalate privileges. This issue affects Admin Lite and USB Creator 11.1 Feature Pack 2 Service Pack 1 and earlier versions. 2022-09-02 not yet calculated CVE-2021-25657
CONFIRM
binary — binary
 
Binary provides encoding/decoding in Borsh and other formats. The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program. When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it’s possible to allocate memory with excessive size. When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value. Users should upgrade to `v0.7.1` or higher. A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice. 2022-09-02 not yet calculated CVE-2022-36078
CONFIRM
MISC
MISC
blogengine — blogengine BlogEngine v3.3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blogengine/api/posts. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field. 2022-09-02 not yet calculated CVE-2022-36600
MISC
blue_prism — blue_prism_enterprise An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the UpdateOfflineHelpData administrative function. Abusing this function will allow any Blue Prism user to change the offline help URL to one of their choice, opening the possibility of spoofing the help page or executing a local file. 2022-08-26 not yet calculated CVE-2022-36121
MISC
MISC
MISC
blue_prism — blue_prism_enterprise An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the getChartData administrative function. Using a low/no privilege Blue Prism user account, the attacker can alter the server’s settings by abusing the getChartData method, allowing the Blue Prism server to execute any MSSQL stored procedure by name. 2022-08-26 not yet calculated CVE-2022-36120
MISC
MISC
MISC
bluez — bluez BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c. 2022-09-02 not yet calculated CVE-2022-39177
MISC
MISC
bluez — bluez BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. 2022-09-02 not yet calculated CVE-2022-39176
MISC
MISC
broadcom — symantec_privileged_access_management A malicious unauthorized PAM user can access the administration configuration data and change the values. 2022-08-26 not yet calculated CVE-2022-25625
MISC
canaan — avalon_asic_miner
 
An access control issue in Canaan Avalon ASIC Miner 2020.3.30 and below allows unauthenticated attackers to arbitrarily change user passwords via a crafted POST request. 2022-09-01 not yet calculated CVE-2022-36604
MISC
carel — pcoweb_hvac_bacnet_gateway
 
Carel pCOWeb HVAC BACnet Gateway 2.1.0, Firmware: A2.1.0 – B2.1.0, Application Software: 2.15.4A Software v16 13020200 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the ‘file’ GET parameter through the ‘logdownload.cgi’ Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks. 2022-08-31 not yet calculated CVE-2022-37122
MISC
MISC
MISC
centreon — centreon Centreon 22.04.0 is vulnerable to Cross Site Scripting (XSS) from the function Pollers > Broker Configuration by adding a crafted payload into the name parameter. 2022-08-29 not yet calculated CVE-2022-36194
MISC
MISC
clinic’s_patient_management_system — clinic’s_patient_management_system Clinic’s Patient Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /pms/update_patient.php. 2022-09-02 not yet calculated CVE-2022-36609
MISC
clusterlabs — hawk An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive “shell” that isn’t limited to the commands specified in hawk_invoke, allowing escalation to root. 2022-08-26 not yet calculated CVE-2021-3020
MISC
MISC
MISC
cobub — razor Razor v0.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the function uploadchannel(). 2022-08-30 not yet calculated CVE-2022-36747
MISC
contiki-ng — contiki-ng
 
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a missing length check in the input function, it is possible to write outside the packet buffer’s boundary. The vulnerability can be exploited by anyone who has the possibility to send 6LoWPAN packets to a Contiki-NG system. In particular, the vulnerability is exposed when sending either of two types of 6LoWPAN packets: an unfragmented packet or the first fragment of a fragmented packet. If the packet is sufficiently large, a subsequent memory copy will cause an out-of-bounds write with data supplied by the attacker. 2022-09-01 not yet calculated CVE-2022-36054
MISC
CONFIRM
contiki-ng — contiki-ng
 
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The low-power IPv6 network stack of Contiki-NG has a buffer module (os/net/ipv6/uipbuf.c) that processes IPv6 extension headers in incoming data packets. As part of this processing, the function uipbuf_get_next_header casts a pointer to a uip_ext_hdr structure into the packet buffer at different offsets where extension headers are expected to be found, and then reads from this structure. Because of a lack of bounds checking, the casting can be done so that the structure extends beyond the packet’s end. Hence, with a carefully crafted packet, it is possible to cause the Contiki-NG system to read data outside the packet buffer. A patch that fixes the vulnerability is included in Contiki-NG 4.8. 2022-09-01 not yet calculated CVE-2022-36053
MISC
CONFIRM
contiki-ng — contiki-ng
 
Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in Contiki-NG may cast a UDP header structure at a certain offset in a packet buffer. The code does not check whether the packet buffer is large enough to fit a full UDP header structure from the offset where the casting is made. Hence, it is possible to cause an out-of-bounds read beyond the packet buffer. The problem affects anyone running devices with Contiki-NG versions previous to 4.8, and which may receive 6LoWPAN packets from external parties. The problem has been patched in Contiki-NG version 4.8. 2022-09-01 not yet calculated CVE-2022-36052
MISC
CONFIRM
cskefu — cskefu Insecure permissions in cskefu v7.0.1 allows unauthenticated attackers to arbitrarily add administrator accounts. 2022-08-26 not yet calculated CVE-2022-36521
MISC
d-link — dir-816_a2 D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection. 2022-08-31 not yet calculated CVE-2022-37129
MISC
MISC
d-link — dir-816_a2 In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end. 2022-08-31 not yet calculated CVE-2022-37128
MISC
MISC
d-link — dir-816_a2 In D-link DIR-816 A2_v1.10CNB04.img,the network can be reset without authentication via /goform/setMAC. 2022-08-31 not yet calculated CVE-2022-36619
MISC
MISC
d-link — dir-816_a2 D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost. 2022-08-31 not yet calculated CVE-2022-37125
MISC
MISC
d-link — dir-816_a2 In D-Link DIR-816 A2_v1.10CNB04.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability 2022-08-31 not yet calculated CVE-2022-37130
MISC
MISC
d-link — dir-816_a2 D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi. 2022-08-31 not yet calculated CVE-2022-37123
MISC
MISC
d-link — dir-816_a2
 
D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/addRouting. 2022-08-31 not yet calculated CVE-2022-36620
MISC
MISC
d-link — dir845l D-Link DIR845L v1.00-v1.03 contains a Static Default Credential vulnerability in /etc/init0.d/S80telnetd.sh. 2022-08-28 not yet calculated CVE-2022-38557
MISC
MISC
d-link — dir845l_a1 DIR845L A1 v1.00-v1.03 is vulnerable to command injection via /htdocs/upnpinc/gena.php. 2022-08-28 not yet calculated CVE-2022-36756
MISC
MISC
d-link — dir845l_a1 D-Link DIR845L A1 contains a authentication vulnerability via an AUTHORIZED_GROUP=1 value, as demonstrated by a request for getcfg.php. 2022-08-28 not yet calculated CVE-2022-36755
MISC
MISC
d-link — go-rt-ac750 D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, 2022-08-28 not yet calculated CVE-2022-37056
MISC
MISC
d-link — go-rt-ac750 D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main, 2022-08-28 not yet calculated CVE-2022-37055
MISC
MISC
d-link — go-rt-ac750 D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Command Injection via cgibin, ssdpcgi_main. 2022-08-28 not yet calculated CVE-2022-37057
MISC
MISC
databasir — databasir
 
Databasir is a database metadata management platform. Databasir <= 1.06 has Server-Side Request Forgery (SSRF) vulnerability. The SSRF is triggered by a sending a **single** HTTP POST request to create a databaseType. By supplying a `jdbcDriverFileUrl` that returns a non `200` response code, the url is executed, the response is logged (both in terminal and in database) and is included in the response. This would allow an attackers to obtain the real IP address and scan Intranet information. This issue was fixed in version 1.0.7. 2022-09-02 not yet calculated CVE-2022-31196
MISC
CONFIRM
MISC
debian — schroot Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session. 2022-08-27 not yet calculated CVE-2022-2787
MISC
MISC
MISC
dedecms — dedecms DedeCMS V5.7.97 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/co_do.php via the dopost, rpok, and aid parameters. 2022-09-01 not yet calculated CVE-2022-36583
MISC
dell — cloudlink Dell EMC CloudLink 7.1.2 and all prior versions contain an Authentication Bypass Vulnerability. A remote attacker, with the knowledge of the active directory usernames, could potentially exploit this vulnerability to gain unauthorized access to the system. 2022-09-01 not yet calculated CVE-2022-34379
CONFIRM
dell — cloudlink Dell CloudLink 7.1.3 and all earlier versions contain an Authentication Bypass Using an Alternate Path or Channel Vulnerability. A high privileged local attacker may potentially exploit this vulnerability leading to authentication bypass and access the CloudLink system console. This is critical severity vulnerability as it allows attacker to take control of the system. 2022-09-01 not yet calculated CVE-2022-34380
CONFIRM
dell — command_integration_suite Dell Command | Integration Suite for System Center, versions prior to 6.2.0, contains arbitrary file write vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability in order to perform an arbitrary write as system. 2022-08-31 not yet calculated CVE-2022-34373
CONFIRM
dell — container_storage_modules Dell Container Storage Modules 1.2 contains an OS command injection in goiscsi and gobrick libraries. A remote authenticated malicious user with low privileges could exploit this vulnerability leading to to execute arbitrary OS commands on the affected system. 2022-08-30 not yet calculated CVE-2022-34374
MISC
dell — container_storage_modules
 
Dell Container Storage Modules 1.2 contains a path traversal vulnerability in goiscsi and gobrick libraries. A remote authenticated malicious user with low privileges could exploit this vulnerability leading to unintentional access to path outside of restricted directory. 2022-08-30 not yet calculated CVE-2022-34375
MISC
dell — edge_gateway
 
Dell Edge Gateway 5200 (EGW) versions before 1.03.10 contain an operating system command injection vulnerability. A local malicious user may potentially exploit this vulnerability by using an SMI to bypass PMC mitigation and gain arbitrary code execution during SMM. 2022-08-31 not yet calculated CVE-2022-34383
CONFIRM
dell — emc_data_protection_advisor
 
Dell EMC Data Protection Advisor versions 19.6 and earlier, contains a Stored Cross Site Scripting, an attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. 2022-08-30 not yet calculated CVE-2022-33935
MISC
dell — emc_networker
 
Dell EMC NetWorker 19.2.1.x 19.3.x, 19.4.x, 19.5.x, 19.6.x and 19.7.0.0 contain an Improper Handling of Insufficient Permissions or Privileges vulnerability. Authenticated non admin user could exploit this vulnerability and gain access to restricted resources. 2022-08-30 not yet calculated CVE-2022-34368
MISC
dell — multiple_products Dell Command Update, Dell Update and Alienware Update versions prior to 4.6.0 contains a Local Privilege Escalation Vulnerability in the custom catalog configuration. A local malicious user may potentially exploit this vulnerability in order to elevate their privileges. 2022-09-02 not yet calculated CVE-2022-34382
MISC
dell — powermax
 
Unisphere for PowerMax versions before 9.2.3.15 contain a privilege escalation vulnerability. An adjacent malicious user may potentially exploit this vulnerability to escalate their privileges and access functionalities they do not have access to. 2022-08-31 not yet calculated CVE-2022-31233
CONFIRM
dell — powerprotect Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality 2022-09-01 not yet calculated CVE-2022-34372
CONFIRM
dell — powerscale Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.3, contain an unprotected transport of credentials vulnerability. A malicious unprivileged network attacker could potentially exploit this vulnerability, leading to full system compromise. 2022-09-02 not yet calculated CVE-2022-34371
MISC
dell — powerscale
 
Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.20, 9.2.1.13, 9.3.0.6, and 9.4.0.3 , contain an insertion of sensitive information in log files vulnerability. A remote unprivileged attacker could potentially exploit this vulnerability, leading to exposure of this sensitive data. 2022-09-02 not yet calculated CVE-2022-34369
MISC
dell — powerscale
 
Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.20, 9.2.1.13, 9.3.0.6, and 9.4.0.3, contain a relative path traversal vulnerability. A low privileged local attacker could potentially exploit this vulnerability, leading to denial of service. 2022-09-02 not yet calculated CVE-2022-34378
MISC
dell — smartfabric_storage
 
SmartFabric storage software version 1.0.0 contains a Command-Injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access and perform actions on the affected system. 2022-08-30 not yet calculated CVE-2022-31232
MISC
delta_electronics — cncsoft CNCSoft: All versions prior to 1.01.32 does not properly sanitize input while processing a specific project file, allowing a possible stack-based buffer overflow condition. 2022-08-31 not yet calculated CVE-2022-1405
MISC
delta_electronics — cncsoft
 
Delta Electronics CNCSoft (All versions prior to 1.01.32) does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition. 2022-08-31 not yet calculated CVE-2022-1404
MISC
delta_electronics — robot_automation_studio Delta Electronics Delta Robot Automation Studio (DRAS) versions prior to 1.13.20 are affected by improper restrictions where the software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. This may allow an attacker to view sensitive documents and information on the affected host. 2022-08-31 not yet calculated CVE-2022-2759
MISC
deluge-torrent — deluge_web-ui The Deluge Web-UI is vulnerable to XSS through a crafted torrent file. The the data from torrent files is not properly sanitised as it’s interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user’s browser session. 2022-08-26 not yet calculated CVE-2021-3427
MISC
MISC
discourse — discourse Discourse through 2.8.7 allows admins to send invitations to arbitrary email addresses at an unlimited rate. 2022-09-02 not yet calculated CVE-2022-37458
MISC
MISC
MISC
dlink — wireless_ac1200_dual_band_vdsl_adsl_modem_router_dsl-3782 D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp. 2022-08-26 not yet calculated CVE-2022-35192
MISC
MISC
MISC
MISC
doctor’s_appointment_system — doctor’s_appointment_system Doctor’s Appointment System 1.0 is vulnerable to SQL Injection via booking.php has ?id=. 2022-08-31 not yet calculated CVE-2022-36201
MISC
MISC
MISC
doctor’s_appointment_system — doctor’s_appointment_system Doctor’s Appointment System 1.0 is vulnerable to Cross Site Scripting (XSS) via the admin panel. In addition, it leads to takeover the administrator account by stealing the cookie via XSS. 2022-08-31 not yet calculated CVE-2022-36203
MISC
MISC
MISC
doctor’s_appointment_system — doctor’s_appointment_system Doctor’s Appointment System1.0 is vulnerable to Incorrect Access Control via edoc/patient/settings.php. The settings.php is affected by Broken Access Control (IDOR) via id= parameter. 2022-08-31 not yet calculated CVE-2022-36202
MISC
MISC
MISC
dpdk — dpdk A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service. 2022-08-29 not yet calculated CVE-2022-0669
MISC
MISC
MISC
MISC
MISC
dpdk — dpdk
 
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK. 2022-08-31 not yet calculated CVE-2022-2132
MISC
MISC
MLIST
dpdk– dpdk
 
NVIDIA’s distribution of the Data Plane Development Kit (MLNX_DPDK) contains a vulnerability in the network stack, where error recovery is not handled properly, which can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality. 2022-09-01 not yet calculated CVE-2022-28199
MISC
draytek — vigor3910 An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field. 2022-08-29 not yet calculated CVE-2022-32548
MISC
MISC
eclipse_foundation — jasminer-x4-server
 
The Eclipse TCF debug interface in JasMiner-X4-Server-20220621-090907 and below is open on port 1534. This issue allows unauthenticated attackers to gain root privileges on the affected device and access sensitive data or execute arbitrary commands. 2022-09-01 not yet calculated CVE-2022-36601
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/booking.php. 2022-08-26 not yet calculated CVE-2022-36544
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability at /patient/settings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name text field. 2022-08-26 not yet calculated CVE-2022-36548
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/doctors.php. 2022-08-26 not yet calculated CVE-2022-36543
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/settings.php. 2022-08-26 not yet calculated CVE-2022-36545
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a Cross-Site Request Forgery (CSRF) via /patient/settings.php. 2022-08-26 not yet calculated CVE-2022-36546
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system Edoc-doctor-appointment-system v1.0.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /patient/index.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field. 2022-08-26 not yet calculated CVE-2022-36547
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system An access control issue in the component /ip/admin/ of Edoc-doctor-appointment-system v1.0.1 allows attackers to arbitrarily edit, read, and delete Administrator data. 2022-08-26 not yet calculated CVE-2022-36542
MISC
MISC
ericsson — network_manager In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation. 2022-08-26 not yet calculated CVE-2021-32570
MISC
MISC
eurosoft-uk — uefi_bootloader A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34303
MISC
MISC
exotel — exotel The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. 2022-08-27 not yet calculated CVE-2022-38792
MISC
MISC
MISC
MISC
fast_food_ordering_system — fast_food_ordering_system A vulnerability, which was classified as problematic, has been found in oretnom23 Fast Food Ordering System. This issue affects some unknown processing of the file admin/?page=reports. The manipulation of the argument date leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-207425 was assigned to this vulnerability. 2022-08-27 not yet calculated CVE-2022-3015
N/A
fast_food_ordering_system — fast_food_ordering_system A vulnerability was found in oretnom23 Fast Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file ffos/admin/reports/index.php. The manipulation of the argument date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207422 is the identifier assigned to this vulnerability. 2022-08-27 not yet calculated CVE-2022-3012
N/A
N/A
fatek — fvdesigner FATEK FvDesigner version 1.5.103 and prior is vulnerable to an out-of-bounds write while processing project files. If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution. 2022-08-31 not yet calculated CVE-2022-2866
CONFIRM
fiberhome — vdsl2_modem_hg150-ub_v3.0 In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed. 2022-08-29 not yet calculated CVE-2022-36200
MISC
MISC
flux — flux
 
Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy. 2022-08-31 not yet calculated CVE-2022-36035
CONFIRM
MISC
font-converter — font-converter All versions of package font-converter are vulnerable to Arbitrary Command Injection due to missing sanitization of input that potentially flows into the child_process.exec() function. 2022-08-29 not yet calculated CVE-2022-21165
CONFIRM
CONFIRM
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41783
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, mishandle hidden and incremental data in signed documents. An attacker can write to an arbitrary file, and display controlled contents, during signature verification. 2022-08-29 not yet calculated CVE-2021-40326
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41784
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41785
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41782
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41781
MISC
foxit — multiple_products Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. 2022-08-29 not yet calculated CVE-2021-41780
MISC
foxit — pdf_editor Foxit PDF Reader before 11.2.2 and PDF Editor before 11.2.2, and PhantomPDF before 10.1.8, mishandle cross-reference information during compressed-object parsing within signed documents. This leads to delivery of incorrect signature information via an Incremental Saving Attack and a Shadow Attack. 2022-08-29 not yet calculated CVE-2022-25641
MISC
freeciv — freeciv Freeciv before 2.6.7 and before 3.0.3 is prone to a buffer overflow vulnerability in the Modpack Installer utility’s handling of the modpack URL. 2022-08-31 not yet calculated CVE-2022-39047
MISC
MISC
MISC
MLIST
freedesktop — poppler Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf. 2022-08-30 not yet calculated CVE-2022-38784
CONFIRM
MISC
MISC
CONFIRM
MISC
MLIST
froxlor — froxlor Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38. 2022-08-28 not yet calculated CVE-2022-3017
CONFIRM
MISC
fuji_electric — alpha_7_pc_loader
 
Alpha7 PC Loader (All versions) is vulnerable to a stack-based buffer overflow while processing a specifically crafted project file, which may allow an attacker to execute arbitrary code. 2022-08-31 not yet calculated CVE-2022-1888
MISC
garage management system — garage management system The application manage_website.php on Garage Management System 1.0 is vulnerable to Shell File Upload. The already authenticated malicious user, can upload a dangerous RCE or LCE exploit file. 2022-08-31 not yet calculated CVE-2022-37184
MISC
garage_management_system — garage_management_system Garage Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /print.php. 2022-09-02 not yet calculated CVE-2022-36636
MISC
MISC
garage_management_system — garage_management_system Garage Management System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via the brand_name parameter at /brand.php. 2022-09-02 not yet calculated CVE-2022-36637
MISC
MISC
garage_management_system — garage_management_system An access control issue in the component print.php of Garage Management System v1.0 allows unauthenticated attackers to access data for all existing orders. 2022-09-02 not yet calculated CVE-2022-36638
MISC
MISC
garage_management_system — garage_management_system A stored cross-site scripting (XSS) vulnerability in /client.php of Garage Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter. 2022-09-02 not yet calculated CVE-2022-36639
MISC
MISC
garage_management_system — garage_management_system An arbitrary file upload vulnerability in the component /php_action/createProduct.php of Garage Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. 2022-08-31 not yet calculated CVE-2022-36582
MISC
gcc — gcc
 
In gcc, a crafted input source file could cause g++ to crash during compilation when provided certain optimization flags. The problem resides in the ipcp_store_vr_results function in gcc/ipa-cp.c. 2022-08-31 not yet calculated CVE-2020-35537
MISC
gcc — gcc
 
In gcc, an internal compiler error in match_reload function at lra-constraints.c may cause a crash through a crafted input file. 2022-08-31 not yet calculated CVE-2020-35536
MISC
gcc — libiberty
 
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol. 2022-09-01 not yet calculated CVE-2021-3826
MISC
MISC
get-process-by-name — get-process-by-name All versions of package @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution due to improper sanitization of getProcessByName function. 2022-08-29 not yet calculated CVE-2022-25644
CONFIRM
CONFIRM
glyphandcog — xpdfreader In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the ‘interleaved’ flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc. 2022-08-30 not yet calculated CVE-2022-24106
CONFIRM
CONFIRM
CONFIRM
CONFIRM
glyphandcog — xpdfreader Xpdf prior to 4.04 lacked an integer overflow check in JPXStream.cc. 2022-08-30 not yet calculated CVE-2022-24107
CONFIRM
CONFIRM
CONFIRM
CONFIRM
gnu — binutils Assertion fail in the display_debug_names() function in binutils/dwarf.c may lead to program crash and denial of service. 2022-09-01 not yet calculated CVE-2022-38126
MISC
gnu — binutils A NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c may lead to program crash when parsing corrupt DWARF data. 2022-09-01 not yet calculated CVE-2022-38127
MISC
gnu — binutils An infinite loop may be triggered in display_debug_abbrev() function in binutils/dwarf.c while opening a crafted ELF, which may lead to denial of service by a local attacker. 2022-09-01 not yet calculated CVE-2022-38128
MISC
gnu — binutils In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file. 2022-08-26 not yet calculated CVE-2022-38533
MISC
MISC
gnu — glibc An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap. 2022-08-31 not yet calculated CVE-2022-39046
MISC
gnu — zgrep
 
An arbitrary file write vulnerability was found in GNU gzip’s zgrep utility. When zgrep is applied on the attacker’s chosen file name (for example, a crafted file name), this can overwrite an attacker’s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system. 2022-08-31 not yet calculated CVE-2022-1271
MISC
MISC
MISC
MISC
MISC
MISC
MISC
grafana — image_renderer
 
Grafana Image Renderer is a Grafana backend plugin that handles rendering of panels & dashboards to PNGs using a headless browser (Chromium/Chrome). An internal security review identified an unauthorized file disclosure vulnerability. It is possible for a malicious user to retrieve unauthorized files under some network conditions or via a fake datasource (if user has admin permissions in Grafana). All Grafana installations should be upgraded to version 3.6.1 as soon as possible. As a workaround it is possible to [disable HTTP remote rendering](https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#plugingrafana-image-renderer). 2022-09-02 not yet calculated CVE-2022-31176
CONFIRM
MISC
gvim — gvim An issue in the installer of gvim 9.0.0000 allows authenticated attackers to execute arbitrary code via a binary hijacking attack on C:Program.exe. 2022-08-30 not yet calculated CVE-2022-37173
MISC
hashicorp — boundary
 
HashiCorp Boundary up to 0.10.1 did not properly perform data integrity checks to ensure the resources were associated with the correct scopes, allowing potential privilege escalation for authorized users of another scope. Fixed in Boundary 0.10.2. 2022-09-01 not yet calculated CVE-2022-36130
MISC
MISC
hcltech — inotes HCL iNotes is susceptible to a Broken Password Strength Checks vulnerability. Custom password policies are not enforced on certain iNotes forms which could allow users to set weak passwords, leading to easier cracking. 2022-08-29 not yet calculated CVE-2022-27558
CONFIRM
hcltech — inotes HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc. 2022-08-29 not yet calculated CVE-2022-27547
CONFIRM
hcltech — inotes HCL iNotes is susceptible to a Reflected Cross-site Scripting (XSS) vulnerability caused by improper validation of user-supplied input supplied with a form POST request. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s web browser within the security context of the hosting web site and/or steal the victim’s cookie-based authentication credentials. 2022-08-29 not yet calculated CVE-2022-27546
CONFIRM
hcltech — versionvault_express An unauthenticated user can overload a part of HCL VersionVault Express and cause a denial of service. 2022-08-30 not yet calculated CVE-2022-27563
MISC
hcltech — versionvault_express HCL VersionVault Express exposes administrator credentials. 2022-08-30 not yet calculated CVE-2022-27560
MISC
helm — helm
 
Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `–set`, `–set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won’t create large arrays causing significant memory usage before passing them to the _strvals_ functions. 2022-09-01 not yet calculated CVE-2022-36055
MISC
CONFIRM
hgiga — oaklouds_portal OAKlouds Portal website’s Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service. 2022-08-30 not yet calculated CVE-2022-38118
MISC
hitachi_kokusai_electric — isnex_hc-ip9100hd An access control issue in Hitachi Kokusai Electric Inc ISnex HC-IP9100HD Version 1.07 and below allows attackers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. 2022-08-29 not yet calculated CVE-2022-37680
MISC
MISC
hitachi_kokusai_electric — isnex_hc-ip9100hd Hitachi Kokusai Electric Inc ISnex HC-IP9100HD Version 1.07 and below allows attackers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. 2022-08-29 not yet calculated CVE-2022-37681
MISC
MISC
honeywell — experion_lx
 
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols’ functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service. 2022-08-31 not yet calculated CVE-2022-30317
MISC
MISC
honeywell — controledge
 
Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service. 2022-08-31 not yet calculated CVE-2022-30318
MISC
MISC
horizondatasys — uefi_bootloader A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34302
MISC
MISC
hpe — oneview
 
A local disclosure of sensitive information vulnerability was discovered in HPE OneView version(s): Prior to 7.0 or 6.60.01. A low privileged user could locally exploit this vulnerability to disclose sensitive information resulting in a complete loss of confidentiality, integrity, and availability. To exploit this vulnerability, HPE OneView must be configured with credential access to external repositories. HPE has provided a software update to resolve this vulnerability in HPE OneView. 2022-08-31 not yet calculated CVE-2022-28625
MISC
htmly — htmly htmly v2.8.1 was discovered to contain an arbitrary file deletion vulnerability via the component viewsbackup.html.php. 2022-08-26 not yet calculated CVE-2021-40285
MISC
hytec_inter — hwl-2511-ss Hytec Inter HWL-2511-SS v1.05 and below implements a SHA512crypt hash for the root account which can be easily cracked via a brute-force attack. 2022-08-29 not yet calculated CVE-2022-36555
MISC
MISC
MISC
hytec_inter — hwl-2511-ss A command injection vulnerability in the CLI (Command Line Interface) implementation of Hytec Inter HWL-2511-SS v1.05 and below allows attackers to execute arbitrary commands with root privileges. 2022-08-29 not yet calculated CVE-2022-36554
MISC
MISC
MISC
hytec_inter — hwl-2511-ss Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi. 2022-08-29 not yet calculated CVE-2022-36553
MISC
MISC
MISC
ibm — cognos_analytics IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204465. 2022-09-01 not yet calculated CVE-2021-29823
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 176609. 2022-09-01 not yet calculated CVE-2020-4301
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to a denial of service via email flooding caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 227591. 2022-09-01 not yet calculated CVE-2022-30614
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 233571. 2022-09-01 not yet calculated CVE-2022-36773
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a local attacker to obtain information due to the autocomplete feature on password input fields. IBM X-Force ID: 214345. 2022-09-01 not yet calculated CVE-2021-39045
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 213554. 2022-09-01 not yet calculated CVE-2021-39009
CONFIRM
XF
ibm — cognos_analytics
 
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 196825. 2022-09-01 not yet calculated CVE-2021-20468
CONFIRM
XF
ibm — datapower_gateway IBM DataPower Gateway V10CD, 10.0.1, and 2018.4.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 228357. 2022-08-26 not yet calculated CVE-2022-31773
XF
CONFIRM
ibm — engineering_test_management IBM Engineering Test Management 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210671. 2022-08-29 not yet calculated CVE-2021-38934
CONFIRM
XF
ibm — maximo_asset_management IBM Maximo Asset Management 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231116. 2022-08-26 not yet calculated CVE-2022-35714
CONFIRM
XF
ibm — security_identity_manager IBM Security Identity Manager 6.0 and 6.0.2 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 206089 2022-08-30 not yet calculated CVE-2021-29864
CONFIRM
XF
imagemagick — imagemagick A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks. 2022-08-26 not yet calculated CVE-2021-3574
MISC
MISC
MISC
imagemagick — imagemagick A heap-based-buffer-over-read flaw was found in ImageMagick’s GetPixelAlpha() function of ‘pixel-accessor.h’. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service and information disclosure. 2022-08-29 not yet calculated CVE-2022-0284
MISC
MISC
MISC
MISC
imagemagick — imagemagick
 
A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service. 2022-08-29 not yet calculated CVE-2022-1115
MISC
MISC
MISC
MISC
MISC
ingredients_stock_management_systemt — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/stockin&month=. 2022-08-29 not yet calculated CVE-2022-36686
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the Id parameter at /stocks/manage_waste.php. 2022-08-28 not yet calculated CVE-2022-36705
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /classes/Master.php?f=delete_img. 2022-08-29 not yet calculated CVE-2022-36687
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user&id=. 2022-08-29 not yet calculated CVE-2022-36690
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the Id parameter at /stocks/manage_stockout.php. 2022-08-28 not yet calculated CVE-2022-36706
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/waste&month=. 2022-08-29 not yet calculated CVE-2022-36689
MISC
ingredients_stock_management_system — ingredients_stock_management_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the month parameter at /admin/?page=reports/stockout&month=. 2022-08-29 not yet calculated CVE-2022-36688
MISC
innosilicon — a10
 
InnoSilicon A10 a10_20200924_120556 was discovered to contain a remote code execution (RCE) vulnerability in the setPlatformAPI function. 2022-09-01 not yet calculated CVE-2022-36602
MISC
innosilicon — t3t/t2t
 
InnoSilicon T3T+ t2t+_soc_20190911_151433.swu was discovered to contain a remote code execution (RCE) vulnerability in the checkUrl function. 2022-09-01 not yet calculated CVE-2022-36603
MISC
intelliants — subrion_cms Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field 2022-08-29 not yet calculated CVE-2022-37059
MISC
jcopy_sample_rows() — jcopy_sample_rows()
 
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo. 2022-08-31 not yet calculated CVE-2020-35538
MISC
MISC
jgraph/drawi — jgraph/drawi
 
Improper Access Control in GitHub repository jgraph/drawio prior to 20.2.8. 2022-09-02 not yet calculated CVE-2022-3065
CONFIRM
MISC
joomla — joomla! An issue was discovered in Joomla! 4.2.0. Multiple Full Path Disclosures because of missing ‘_JEXEC or die check’ caused by the PSR12 changes. 2022-08-31 not yet calculated CVE-2022-27911
MISC
jsoup — jsoup jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: – disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs – ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.) 2022-08-29 not yet calculated CVE-2022-36033
CONFIRM
MISC
MISC
kensite_cms — kensite_cms Kensite CMS v1.0 was discovered to contain multiple SQL injection vulnerabilities via the name and oldname parameters at /framework/mod/db/DBMapper.xml. 2022-08-26 not yet calculated CVE-2022-36529
MISC
MISC
kidan — cryptopro_securedisk_for_bitlocker A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34301
MISC
MISC
kirby — kirby
 
kirby is a content management system (CMS) that adapts to many different projects and helps you build your own ideal interface. Cross-site scripting (XSS) is a type of vulnerability that allows execution of any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby’s API with the permissions of the victim. If bad actors gain access to your group of authenticated Panel users they can escalate their privileges via the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. The multiselect field allows selection of tags from an autocompleted list. Unfortunately, the Panel in Kirby 3.5 used HTML rendering for the raw option value. This allowed **attackers with influence on the options source** to store HTML code. The browser of the victim who visited a page with manipulated multiselect options in the Panel will then have rendered this malicious HTML code when the victim opened the autocomplete dropdown. Users are *not* affected by this vulnerability if you don’t use the multiselect field or don’t use it with options that can be manipulated by attackers. The problem has been patched in Kirby 3.5.8.1. 2022-08-29 not yet calculated CVE-2022-36037
MISC
CONFIRM
MISC
kkfileview — kkfileview
 
kkFileView v4.0.0 was discovered to contain an arbitrary file deletion vulnerability via the fileName parameter at /controller/FileController.java. 2022-09-02 not yet calculated CVE-2022-36593
MISC
lexmark — multiple_products Various Lexmark products through 2022-04-27 allow External Control of a System or Configuration Setting because of Improper Input Validation. 2022-08-26 not yet calculated CVE-2022-29850
MISC
MISC
leyan — personnel_and_salary_management_system Le-yan Personnel and Salary Management System has hard-coded database account and password within the website source code. An unauthenticated remote attacker can access, modify system data or disrupt service. 2022-08-30 not yet calculated CVE-2022-38116
MISC
libdwarf — libdwarf libdwarf 0.4.1 has a double free in _dwarf_exec_frame_instr in dwarf_frame.c. 2022-09-02 not yet calculated CVE-2022-39170
MISC
MISC
libmodbus — libmodbus A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c. 2022-08-29 not yet calculated CVE-2022-0367
MISC
MISC
MISC
MLIST
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Id parameter at /student/bookdetails.php. 2022-08-28 not yet calculated CVE-2022-36708
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the RollNo parameter at /admin/delstu.php. 2022-08-30 not yet calculated CVE-2022-36734
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Id parameter at /librarian/studentdetails.php. 2022-08-28 not yet calculated CVE-2022-36704
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /staff/edit_book_details.php. 2022-08-30 not yet calculated CVE-2022-36709
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at /admin/delete.php. 2022-08-30 not yet calculated CVE-2022-36735
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /staff/bookdetails.php. 2022-08-30 not yet calculated CVE-2022-36711
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /staff/studentdetails.php. 2022-08-30 not yet calculated CVE-2022-36712
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Section parameter at /librarian/lab.php. 2022-08-30 not yet calculated CVE-2022-36713
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at /librarian/delete.php. 2022-08-30 not yet calculated CVE-2022-36730
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Section parameter at /staff/lab.php. 2022-08-30 not yet calculated CVE-2022-36714
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the RollNo parameter at /librarian/delstu.php. 2022-08-30 not yet calculated CVE-2022-36731
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /librarian/edit_book_details.php. 2022-08-30 not yet calculated CVE-2022-36657
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the M_Id parameter at /admin/del.php. 2022-08-30 not yet calculated CVE-2022-36733
MISC
library_management_system — library_management_system Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /librarian/dele.php. 2022-08-30 not yet calculated CVE-2022-36732
MISC
libraw — libraw
 
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (librawsrcx3fx3f_utils_patched.cpp) when reading data from an image file. 2022-09-01 not yet calculated CVE-2020-35531
MISC
MISC
libraw — libraw
 
In LibRaw, there is a memory corruption vulnerability within the “crxFreeSubbandData()” function (librawsrcdecoderscrx.cpp) when processing cr3 files. 2022-09-01 not yet calculated CVE-2020-35534
MISC
MISC
libraw — libraw
 
In LibRaw, an out-of-bounds read vulnerability exists within the “LibRaw::adobe_copy_pixel()” function (librawsrcdecodersdng.cpp) when reading data from the image file. 2022-09-01 not yet calculated CVE-2020-35533
MISC
MISC
libraw — libraw
 
In LibRaw, an out-of-bounds read vulnerability exists within the “simple_decode_row()” function (librawsrcx3fx3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. 2022-09-01 not yet calculated CVE-2020-35532
MISC
MISC
libraw — libraw
 
In LibRaw, there is an out-of-bounds read vulnerability within the “LibRaw::parseSonySRF()” function (librawsrcmetadatasony.cpp) when processing srf files. 2022-09-01 not yet calculated CVE-2020-35535
MISC
MISC
libraw — libraw
 
In LibRaw, there is an out-of-bounds write vulnerability within the “new_node()” function (librawsrcx3fx3f_utils_patched.cpp) that can be triggered via a crafted X3F file. 2022-09-01 not yet calculated CVE-2020-35530
MISC
MISC
librenms — librenms LibreNMS v22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component oxidized-cfg-check.inc.php. 2022-08-30 not yet calculated CVE-2022-36746
MISC
librenms — librenms LibreNMS v22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component print-customoid.php. 2022-08-30 not yet calculated CVE-2022-36745
MISC
libtiff — libtiff There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1 2022-08-31 not yet calculated CVE-2022-2519
MISC
MISC
libtiff — libtiff LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8. 2022-08-29 not yet calculated CVE-2022-2953
MISC
MISC
CONFIRM
libtiff — libtiff
 
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input. 2022-08-31 not yet calculated CVE-2022-2521
MISC
MISC
libtiff — libtiff
 
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input. 2022-08-31 not yet calculated CVE-2022-2520
MISC
MISC
libvnclient — libvnclient
 
libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup(). 2022-09-02 not yet calculated CVE-2020-29260
MISC
linksys — e1200 Linksys E1200 v1.0.04 is vulnerable to Buffer Overflow via ej_get_web_page_name. 2022-08-28 not yet calculated CVE-2022-38555
MISC
MISC
linux — kernel An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured. 2022-09-01 not yet calculated CVE-2022-2663
MISC
MISC
linux — kernel
 
A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system. 2022-08-31 not yet calculated CVE-2022-2590
MISC
MISC
linux — kernel
 
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system. 2022-09-01 not yet calculated CVE-2022-2639
MISC
MISC
linux — linux_kernel An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. 2022-09-02 not yet calculated CVE-2022-39190
MISC
MISC
MISC
MISC
linux — linux_kernel A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. 2022-08-29 not yet calculated CVE-2022-1204
MISC
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges. 2022-08-26 not yet calculated CVE-2021-3864
MISC
MISC
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel A use-after-free flaw was found in the Linux kernel’s PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system. 2022-08-29 not yet calculated CVE-2022-2961
MISC
linux — linux_kernel A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS. 2022-08-26 not yet calculated CVE-2021-3669
MISC
MISC
MISC
MISC
linux — linux_kernel An out-of-bounds read vulnerability was discovered in linux kernel in the smc protocol stack, causing remote dos. 2022-08-29 not yet calculated CVE-2022-0400
MISC
MISC
MISC
linux — linux_kernel A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 2022-08-29 not yet calculated CVE-2022-21385
MISC
linux — linux_kernel A flaw was found in the Linux kernel’s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges. 2022-08-29 not yet calculated CVE-2022-1043
MISC
MISC
MISC
MISC
linux — linux_kernel An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs. 2022-09-02 not yet calculated CVE-2022-39188
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service. 2022-08-29 not yet calculated CVE-2022-1184
MISC
MISC
MISC
linux — linux_kernel A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system. 2022-08-26 not yet calculated CVE-2022-0168
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV). 2022-08-26 not yet calculated CVE-2022-0171
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks. 2022-08-29 not yet calculated CVE-2022-0480
MISC
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations. 2022-09-02 not yet calculated CVE-2022-39189
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. 2022-08-31 not yet calculated CVE-2022-2153
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c. 2022-09-01 not yet calculated CVE-2022-3078
MISC
linux — linux_kernel
 
A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free(). 2022-09-01 not yet calculated CVE-2020-27784
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel’s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation. 2022-08-31 not yet calculated CVE-2022-1976
MISC
linux — linux_kernel
 
Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn’t check the value of ‘pixclock’, so it may cause a divide by zero error. 2022-09-01 not yet calculated CVE-2022-3061
MISC
linux — linux_kernel
 
A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace. 2022-08-29 not yet calculated CVE-2022-0850
MISC
MISC
MISC
MISC
linux — linux_kernel
 
There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space. 2022-08-31 not yet calculated CVE-2022-1975
MISC
linux — linux_kernel
 
A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space. 2022-08-29 not yet calculated CVE-2022-1198
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A race condition was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket. 2022-08-31 not yet calculated CVE-2022-3028
MISC
MISC
FEDORA
FEDORA
FEDORA
linux — linux_kernel
 
A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc. 2022-09-01 not yet calculated CVE-2022-1729
MISC
MISC
linux — linux_kernel
 
An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh->use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their “count” and “use” are zero. 2022-08-31 not yet calculated CVE-2022-1247
MISC
MISC
linux — linux_kernel
 
A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. 2022-08-31 not yet calculated CVE-2022-1205
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability. 2022-08-29 not yet calculated CVE-2022-1199
MISC
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A use-after-free flaw was found in the Linux kernel’s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information. 2022-08-31 not yet calculated CVE-2022-1974
MISC
linux — linux_kernel
 
An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds. 2022-08-31 not yet calculated CVE-2022-1508
MISC
MISC
MISC
MISC
linux — linux_kernel
 
An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information. 2022-08-29 not yet calculated CVE-2022-0812
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle ‘return’ with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. 2022-08-29 not yet calculated CVE-2022-1016
MISC
MISC
MISC
MISC
ls_industrial_systems — electric_plcs_and_xg5000_plc
 
All versions of LS Industrial Systems (LSIS) Co. Ltd LS Electric PLCs and XG5000 PLC programming software are affected where passwords are not adequately encrypted during the communication process between the XG5000 software and the affected PLC. This would allow an attacker to identify and decrypt the affected PLC’s password by sniffing the traffic. 2022-08-31 not yet calculated CVE-2022-2758
MISC
mariadb — mariadb In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock. 2022-08-27 not yet calculated CVE-2022-38791
MISC
matrix — synapse
 
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix specification specifies a list of [event authorization rules](https://spec.matrix.org/v1.2/rooms/v9/#authorization-rules) which must be checked when determining if an event should be accepted into a room. In versions of Synapse up to and including version 1.61.0, some of these rules are not correctly applied. An attacker could craft events which would be accepted by Synapse but not a spec-conformant server, potentially causing divergence in the room state between servers. Administrators of homeservers with federation enabled are advised to upgrade to version 1.62.0 or higher. Federation can be disabled by setting [`federation_domain_whitelist`](https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#federation_domain_whitelist) to an empty list (`[]`) as a workaround. 2022-09-02 not yet calculated CVE-2022-31152
MISC
MISC
MISC
CONFIRM
mdx-mermaid — mdx-mermaid mdx-mermaid provides plug and play access to Mermaid in MDX. There is a potential for an arbitrary javascript injection in versions less than 1.3.0 and 2.0.0-rc1. Modify any mermaid code blocks with arbitrary code and it will execute when the component is loaded by MDXjs. This vulnerability was patched in version(s) 1.3.0 and 2.0.0-rc2. There are currently no known workarounds. 2022-08-29 not yet calculated CVE-2022-36036
CONFIRM
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server (Versions prior to 6.8.0.1) uses an unmaintained ActiveX control, which may allow an out-of-bounds write condition while processing a specific project file. 2022-08-31 not yet calculated CVE-2022-2892
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. The controls may allow seven untrusted pointer deference instances while processing a specific project file. 2022-08-31 not yet calculated CVE-2022-2894
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. These controls may allow two stack-based buffer overflow instances while processing a specific project file. 2022-08-31 not yet calculated CVE-2022-2895
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server (All Versions) allows use after free while processing a specific project file. 2022-08-31 not yet calculated CVE-2022-2896
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server and Client (All Versions) do not properly resolve links before file access; this could allow privilege escalation.. 2022-08-31 not yet calculated CVE-2022-2897
MISC
measuresoft — scadapro_server Measuresoft ScadaPro Server and Client (All Versions) do not properly resolve links before file access; this could allow a denial-of-service condition. 2022-08-31 not yet calculated CVE-2022-2898
MISC
mediawiki — mediawiki An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed. 2022-09-02 not yet calculated CVE-2022-39194
MISC
mikrotik — routeros Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. 2022-08-26 not yet calculated CVE-2022-36522
MISC
MISC
mit — krb5 telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a “telnet/tcp server failing (looping), service terminated” error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8. 2022-08-30 not yet calculated CVE-2022-39028
MISC
MISC
MISC
mm-wiki — mm-wiki mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor. 2022-08-26 not yet calculated CVE-2021-39393
MISC
mm-wiki — mm-wiki mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information. 2022-08-26 not yet calculated CVE-2021-39394
MISC
modsecurity — owasp-modsecurity-crs
 
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. 2022-09-02 not yet calculated CVE-2020-22669
CONFIRM
MISC
mongoose — mongoose Schema in lib/schema.js in Mongoose before 6.4.6 is vulnerable to prototype pollution. 2022-08-26 not yet calculated CVE-2022-24304
MISC
CONFIRM
CONFIRM
morgan-json — morgan-json All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the Function constructor. 2022-08-29 not yet calculated CVE-2022-25921
CONFIRM
CONFIRM
moxa — nport_5110
 
MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that may allow an attacker to overwrite values in memory, causing a denial-of-service condition or potentially bricking the device. 2022-08-31 not yet calculated CVE-2022-2044
MISC
moxa — nport_5110
 
MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that can cause the device to become unresponsive. 2022-08-31 not yet calculated CVE-2022-2043
MISC
msys2 — msys2 Incorrect access control in the install directory (C:msys64) of Msys2 v20220603 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. 2022-08-30 not yet calculated CVE-2022-37172
MISC
mybatis — mapper Mapper v4.0.0 to v4.2.0 was discovered to contain a SQL injection vulnerability via the ids parameter at the selectByIds function. 2022-09-02 not yet calculated CVE-2022-36594
MISC
next.js — next.js
 
Next.js is a React framework that can provide building blocks to create web applications. All of the following must be true to be affected by this CVE: Next.js version 12.2.3, Node.js version above v15.0.0 being used with strict `unhandledRejection` exiting AND using next start or a [custom server](https://nextjs.org/docs/advanced-features/custom-server). Deployments on Vercel ([vercel.com](https://vercel.com/)) are not affected along with similar environments where `next-server` isn’t being shared across requests. 2022-08-31 not yet calculated CVE-2022-36046
CONFIRM
MISC
nitrado.js — nitrado.js nitrado.js is a type safe wrapper for the Nitrado API. Possible ReDoS with lib input of `{{` and with many repetitions of `{{|`. This issue has been patched in all versions above `0.2.5`. There are currently no known workarounds. 2022-08-29 not yet calculated CVE-2022-36034
MISC
CONFIRM
node.js — node.js
 
NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. Due to an unnecessarily strict conditional in the code handling the first step of the SSO process, the pre-existing logic that added (and later checked) a nonce was inadvertently rendered opt-in instead of opt-out. This re-exposed a vulnerability in that a specially crafted Man-in-the-Middle (MITM) attack could theoretically take over another user account during the single sign-on process. The issue has been fully patched in version 1.17.2. 2022-09-02 not yet calculated CVE-2022-36076
MISC
CONFIRM
MISC
node.js — node.js
 
NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. It utilizes web sockets for instant interactions and real-time notifications. `utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the password reset functionality could enable an attacker to correctly calculate the reset code for an account they do not have access to. This vulnerability impacts all installations of NodeBB. The vulnerability allows for an attacker to take over any account without the involvement of the victim, and as such, the remediation should be applied immediately (either via NodeBB upgrade or cherry-pick of the specific changeset. The vulnerability has been patched in version 2.x and 1.19.x. There is no known workaround, but the patch sets listed above will fully patch the vulnerability. 2022-08-31 not yet calculated CVE-2022-36045
MISC
CONFIRM
MISC
novel-plus — novel-plus Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the project config file. This vulnerability allows attackers to create a custom user session. 2022-09-01 not yet calculated CVE-2022-36672
MISC
novel-plus — novel-plus Novel-Plus v3.6.2 was discovered to contain an arbitrary file download vulnerability via the background file download API. 2022-09-01 not yet calculated CVE-2022-36671
MISC
nvidia — nvflare NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity. 2022-08-29 not yet calculated CVE-2022-34668
CONFIRM
oauth2-server — oauth2-server
 
In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern (“[a-zA-Z][a-zA-Z0-9+.-]+:”) before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741. 2022-08-29 not yet calculated CVE-2020-26938
MISC
MISC
MISC
MISC
MISC
oliver_v5_library_server — oliver_v5_library_server
 
An arbitrary file download vulnerability in Oliver v5 Library Server Versions < 5.00.008.053 via the FileServlet function allows for arbitrary file download by an attacker using unsanitized user supplied input. 2022-09-01 not yet calculated CVE-2021-45027
MISC
MISC
online_food_ordering system — online_food ordering_system
 
Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=. 2022-09-02 not yet calculated CVE-2022-36759
MISC
online_ordering_system — online_ordering_system Online Ordering System v2.3.2 was discovered to contain a SQL injection vulnerability via the user_email parameter at /admin/login.php. 2022-08-31 not yet calculated CVE-2022-36581
MISC
online_ordering_system — online_ordering_system An arbitrary file upload vulnerability in the component /admin/products/controller.php?action=add of Online Ordering System v2.3.2 allows attackers to execute arbitrary code via a crafted PHP file. 2022-08-31 not yet calculated CVE-2022-36580
MISC
openscad — openscad A vulnerbiility was found in Openscad, where a .scad file with no trailing newline could cause an out-of-bounds read during parsing of annotations. 2022-08-29 not yet calculated CVE-2022-0497
MISC
MISC
MISC
openscad — openscad A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import(). 2022-08-29 not yet calculated CVE-2022-0496
MISC
MISC
MISC
MISC
ovirt — vdsm A race condition was found in vdsm. Functionality to obfuscate sensitive values in log files that may lead to values being stored in clear text. 2022-08-26 not yet calculated CVE-2022-0207
MISC
MISC
MISC
MISC
MISC
ovirt-log-collector/sosreport — ovirt-log-collector/sosreport
 
It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev 2022-09-01 not yet calculated CVE-2022-2806
MISC
pagekit — pagekit A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit. 2022-08-29 not yet calculated CVE-2022-36573
MISC
perl — strawberry_perl
 
Incorrect access control in the install directory (C:Strawberry) of StrawberryPerl v5.32.1.1 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. 2022-08-30 not yet calculated CVE-2022-36564
MISC
picuploader — picuploader PicUploader v2.6.3 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /master/index.php. 2022-08-30 not yet calculated CVE-2022-36748
MISC
pinniped_supervisor — pinniped_supervisor
 
An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow. 2022-08-29 not yet calculated CVE-2022-31677
MISC
piwigo — piwigo Piwigo 12.3.0 is vulnerable to Cross Site Scripting (XSS) via /search/1940/created-monthly-list. 2022-08-31 not yet calculated CVE-2022-37183
MISC
pkuvcl_davs2 — pkuvcl_davs2 PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overflow via the function parse_sequence_header() at source/common/header.cc:269. 2022-09-02 not yet calculated CVE-2022-36647
MISC
prestashop — prestashop
 
This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator’s cookie. The issue is fixed in version 5.0.2. 2022-09-02 not yet calculated CVE-2022-35933
CONFIRM
MISC
prestashop– prestashop A SQL injection vulnerability in the product_all_one_img and image_product parameters of the ApolloTheme AP PageBuilder component through 2.4.4 for PrestaShop allows unauthenticated attackers to exfiltrate database data. 2022-08-29 not yet calculated CVE-2022-22897
MISC
prosody — prosody It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611). 2022-08-26 not yet calculated CVE-2022-0217
MISC
MISC
MISC
publiccms — publiccms
 
Server-side Request Forgery (SSRF) vulnerability in PublicCMS before 4.0.202011.b via /publiccms/admin/ueditor when the action is catchimage. 2022-09-02 not yet calculated CVE-2021-27693
MISC
MISC
python — python-scciclient
 
A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server’s certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks. 2022-09-01 not yet calculated CVE-2022-2996
MISC
qemu — qemu A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system. 2022-08-29 not yet calculated CVE-2022-0358
MISC
MISC
MISC
qemu — qemu A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. 2022-08-26 not yet calculated CVE-2022-0216
MISC
MISC
MISC
MISC
MISC
qemu — qemu A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. 2022-08-26 not yet calculated CVE-2021-3735
MISC
MISC
MISC
qualcomm — snapdragon Out of bounds writing is possible while verifying device IDs due to improper length check before copying the data in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22061
CONFIRM
qualcomm — snapdragon Memory corruption in multimedia due to buffer overflow while processing count variable from client in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-25680
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia due to improper length check while copying the data in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22106
CONFIRM
qualcomm — snapdragon
 
Potential memory leak in modem during the processing of NSA RRC Reconfiguration with invalid Radio Bearer Config in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22067
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia due to improper check on the messages received. in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22104
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia due to incorrect type conversion while adding data in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22102
CONFIRM
qualcomm — snapdragon
 
Denial of service in multimedia due to uncontrolled resource consumption while parsing an incoming HAB message in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22101
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia due to improper check on received export descriptors in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22100
CONFIRM
qualcomm — snapdragon
 
Devices with keyprotect off may store unencrypted keybox in RPMB and cause cryptographic issue in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-22069
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia due to improper validation of array index in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22099
CONFIRM
qualcomm — snapdragon
 
Memory corruption in multimedia driver due to untrusted pointer dereference while reading data from socket in Snapdragon Auto 2022-09-02 not yet calculated CVE-2022-22098
CONFIRM
qualcomm — snapdragon
 
An out-of-bounds read can occur while parsing a server certificate due to improper length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking 2022-09-02 not yet calculated CVE-2022-22062
CONFIRM
qualcomm — snapdragon
 
Memory corruption in graphic driver due to use after free while calling multiple threads application to driver. in Snapdragon Consumer IOT 2022-09-02 not yet calculated CVE-2022-22097
CONFIRM
qualcomm — snapdragon
 
Memory corruption in Bluetooth HOST due to stack-based buffer overflow when when extracting data using command length parameter in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22096
CONFIRM
qualcomm — snapdragon
 
Improper validation of backend id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music 2022-09-02 not yet calculated CVE-2022-22080
CONFIRM
qualcomm — snapdragon
 
Memory corruption due to out of bound read while parsing a video file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2022-22059
CONFIRM
qualcomm — snapdragon
 
Memory corruption in audio due to lack of check of invalid routing address into APR Routing table in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-22070
CONFIRM
qualcomm — snapdragon
 
A null pointer dereference may potentially occur during RSA key import in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35135
CONFIRM
qualcomm — snapdragon
 
Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35109
CONFIRM
qualcomm — snapdragon
 
Due to insufficient validation of ELF headers, an Incorrect Calculation of Buffer Size can occur in Boot leading to memory corruption in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35134
CONFIRM
qualcomm — snapdragon
 
Use after free in the synx driver issue while performing other functions during multiple invocation of synx release calls in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35133
CONFIRM
qualcomm — snapdragon
 
Out of bound write in DSP service due to improper bound check for response buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35132
CONFIRM
qualcomm — snapdragon
 
Non-secure region can try modifying RG permissions of IO space xPUs due to improper input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35122
CONFIRM
qualcomm — snapdragon
 
Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35113
CONFIRM
qualcomm — snapdragon
 
Memory corruption due to buffer overflow occurs while processing invalid MKV clip which has invalid seek header in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25657
CONFIRM
qualcomm — snapdragon
 
Memory corruption due to incorrect pointer arithmetic when attempting to change the endianness in video parser function in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25658
CONFIRM
qualcomm — snapdragon
 
Memory corruption due to buffer overflow while parsing MKV clips with invalid bitmap size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25659
CONFIRM
qualcomm — snapdragon
 
Memory corruption in video driver due to double free while parsing ASF clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2022-25668
CONFIRM
qualcomm — snapdragon
 
Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2022-09-02 not yet calculated CVE-2021-35097
CONFIRM
qualcomm — snapdragon
 
Improper checking of AP-S lock bit while verifying the secure resource group permissions can lead to non secure read and write access in Snapdragon Connectivity, Snapdragon Mobile 2022-09-02 not yet calculated CVE-2021-35108
CONFIRM
realtek — bluetooth_mesh_software_development_kit Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets’ reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service. 2022-08-30 not yet calculated CVE-2022-26527
MISC
realtek — bluetooth_mesh_software_development_kit Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for broadcast network packet length. An unauthenticated attacker in the adjacent network can exploit this vulnerability to disrupt service. 2022-08-30 not yet calculated CVE-2022-25635
MISC
realtek — bluetooth_mesh_software_development_kit Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for segmented packets’ link parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service. 2022-08-30 not yet calculated CVE-2022-26529
MISC
realtek — bluetooth_mesh_software_development_kit Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the length of segmented packets’ shift parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service. 2022-08-30 not yet calculated CVE-2022-26528
MISC
redhat — openshift_container_platform A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate. 2022-09-01 not yet calculated CVE-2022-2403
MISC
MISC
redhat — podman The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-14370, which was previously fixed via RHSA-2020:5056. This issue could possibly allow an attacker to gain access to sensitive information stored in environment variables. 2022-09-01 not yet calculated CVE-2022-2739
MISC
MISC
redhat — podman The version of podman as released for Red Hat Enterprise Linux 7 Extras via RHSA-2022:2190 advisory included an incorrect version of podman missing the fix for CVE-2020-8945, which was previously fixed via RHSA-2020:2117. This issue could possibly be used to crash or cause potential code execution in Go applications that use the Go GPGME wrapper library, under certain conditions, during GPG signature verification. 2022-09-01 not yet calculated CVE-2022-2738
MISC
MISC
redhat — clmg
 
A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer. 2022-08-31 not yet calculated CVE-2022-1325
MISC
MISC
MISC
MISC
MISC
MISC
redhat — convert2rhel
 
There is a flaw in convert2rhel. convert2rhel passes the Red Hat account password to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the password via the process command line via e.g. htop or ps. The specific impact varies upon the privileges of the Red Hat account in question, but it could affect the integrity, availability, and/or data confidentiality of other systems that are administered by that account. This occurs regardless of how the password is supplied to convert2rhel. 2022-08-29 not yet calculated CVE-2022-0852
MISC
MISC
MISC
MISC
MISC
redhat — convert2rhel
 
There is a flaw in convert2rhel. When the –activationkey option is used with convert2rhel, the activation key is subsequently passed to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the activation key via the process command line via e.g. htop or ps. The specific impact varies upon the subscription, but generally this would allow an attacker to register systems purchased by the victim until discovered; a form of fraud. This could occur regardless of how the activation key is supplied to convert2rhel because it involves how convert2rhel provides it to subscription-manager. 2022-08-29 not yet calculated CVE-2022-0851
MISC
MISC
redhat — dnsmasq A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service. 2022-08-29 not yet calculated CVE-2022-0934
MISC
MISC
MISC
MISC
redhat — fapolicyd A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution. 2022-08-29 not yet calculated CVE-2022-1117
MISC
MISC
MISC
MISC
redhat — jboss_core_services_http_server A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3688
MISC
MISC
redhat — keycloak A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack. 2022-08-26 not yet calculated CVE-2022-0225
MISC
MISC
redhat — keycloak A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality. 2022-09-01 not yet calculated CVE-2022-2256
MISC
MISC
redhat — keycloak A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow. 2022-08-26 not yet calculated CVE-2021-3632
MISC
MISC
MISC
MISC
MISC
redhat — keycloak A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password. 2022-08-26 not yet calculated CVE-2021-3754
MISC
MISC
redhat — keycloak ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available. 2022-08-26 not yet calculated CVE-2021-3856
MISC
MISC
MISC
MISC
MISC
redhat — kubernetes
 
A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting. 2022-09-01 not yet calculated CVE-2022-2238
MISC
MISC
redhat — kubernetes
 
A flaw was found in the Red Hat Advanced Cluster Security for Kubernetes. Notifier secrets were not properly sanitized in the GraphQL API. This flaw allows authenticated ACS users to retrieve Notifiers from the GraphQL API, revealing secrets that can escalate their privileges. 2022-09-01 not yet calculated CVE-2022-1902
MISC
MISC
MISC
redhat — kvm
 
A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. 2022-08-31 not yet calculated CVE-2022-1263
MISC
MISC
MISC
MISC
redhat — libnbd A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the silent creation of a corrupted destination image. 2022-08-29 not yet calculated CVE-2022-0485
MISC
MISC
MISC
MISC
MISC
redhat — libtiff
 
A heap buffer overflow flaw was found in Libtiffs’ tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service. 2022-08-31 not yet calculated CVE-2022-1354
MISC
MISC
MISC
MISC
redhat — libtiff
 
A stack buffer overflow flaw was found in Libtiffs’ tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service. 2022-08-31 not yet calculated CVE-2022-1355
MISC
MISC
MISC
MISC
redhat — openshift
 
In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router’s HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control. 2022-09-01 not yet calculated CVE-2022-1677
MISC
MISC
redhat — openshift
 
OpenShift doesn’t properly verify subdomain ownership, which allows route takeover. Once a custom route is created, the user must update the DNS provider by creating a canonical name (CNAME) record (if he likes to expose this route externally). The CNAME record should point the custom domain to the OpenShift router as the alias. In a case that the CNAME is not removed when the route is not in use anymore we are dealing with a dangling route. A malicious actor may take over the route. 2022-08-31 not yet calculated CVE-2022-2220
MISC
redhat — openshift
 
An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality. 2022-09-01 not yet calculated CVE-2022-1632
MISC
MISC
redhat — openstack
 
A flaw was found in OpenStack. The application credential tokens can be used even after they have expired. This flaw allows an authenticated remote attacker to obtain access despite the defender’s efforts to remove access. 2022-09-01 not yet calculated CVE-2022-2447
MISC
MISC
redhat — openstack-barbican
 
An authorization flaw was found in openstack-barbican, where anyone with an admin role could add secrets to a different project container. This flaw allows an attacker on the network to consume protected resources and cause a denial of service. 2022-09-01 not yet calculated CVE-2022-23452
MISC
MISC
MISC
MISC
MISC
redhat — openstack-tripleo_heat_templates A flaw was found in openstack-tripleo-heat-templates. Plain passwords from RHSM exist in the logs during OSP13 deployment with subscription-manager. 2022-08-26 not yet calculated CVE-2021-3585
MISC
MISC
MISC
MISC
MISC
redhat — openstack_keystone A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3563
MISC
MISC
MISC
MISC
redhat — postgresql
 
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user’s objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity. 2022-08-31 not yet calculated CVE-2022-1552
MISC
MISC
MISC
MISC
redhat — python-oslo-utils A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( ” ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext. 2022-08-29 not yet calculated CVE-2022-0718
MISC
MISC
MISC
MISC
MISC
redhat — quarkus
 
It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior. 2022-08-31 not yet calculated CVE-2022-2466
MISC
redhat — satellite A flaw was found in satellite. When giving granular permission related to the organization, other permissions allowing a user to view and manage other organizations are also granted. The highest threat from this vulnerability is to data confidentiality. 2022-08-26 not yet calculated CVE-2021-3414
MISC
MISC
redhat — serverless It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless 1.16.0 and Serverless client kn 1.16.0. These have been fixed with Serverless 1.17.0. 2022-08-26 not yet calculated CVE-2021-3703
MISC
MISC
redhat — undertow A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks. 2022-08-26 not yet calculated CVE-2021-3859
MISC
MISC
MISC
MISC
MISC
redhat — undertow
 
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629. 2022-08-31 not yet calculated CVE-2022-1259
MISC
MISC
redhat — undertow
 
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG. 2022-08-31 not yet calculated CVE-2022-1319
MISC
MISC
MISC
MISC
MISC
redhat — vdpa
 
A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers. 2022-09-01 not yet calculated CVE-2022-2308
MISC
redhat — wildfly-core A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3644
MISC
MISC
MISC
MISC
MISC
MISC
redhat — xino A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. 2022-08-26 not yet calculated CVE-2022-0084
MISC
MISC
MISC
MISC
redhat — xorg-x11-server
 
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root. 2022-09-01 not yet calculated CVE-2022-2320
MISC
MISC
MISC
redhat — xorg-x11-server
 
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length. 2022-09-01 not yet calculated CVE-2022-2319
MISC
MISC
redhat–undertow
 
A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations. 2022-09-01 not yet calculated CVE-2022-2764
MISC
rengine — rengine
 
Rengine v1.3.0 was discovered to contain a command injection vulnerability via the scan engine function. 2022-08-31 not yet calculated CVE-2022-36566
MISC
rosariosis — rosariosis Cross-site Scripting (XSS) – Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3. 2022-09-01 not yet calculated CVE-2022-3072
CONFIRM
MISC
rpi-jukebox-rfid — rpi-jukebox-rfid
 
RPi-Jukebox-RFID v2.3.0 was discovered to contain a command injection vulnerability via the component /htdocs/utils/Files.php. This vulnerability is exploited via a crafted payload injected into the file name of an uploaded file. 2022-08-30 not yet calculated CVE-2022-36749
MISC
rpm — rpm It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-26 not yet calculated CVE-2021-35939
MISC
MISC
MISC
MISC
MISC
rubrik — cdm A buffer overflow vulnerability in the Rubrik Backup Service (RBS) Agent for Linux or Unix-based systems in Rubrik CDM 7.0.1, 7.0.1-p1, 7.0.1-p2 or 7.0.1-p3 before CDM 7.0.2-p2 could allow a local attacker to obtain root privileges by sending a crafted message to the RBS agent. 2022-08-26 not yet calculated CVE-2022-30984
MISC
MISC
rubyinstaller — rubyinstaller2
 
Incorrect access control in the install directory (C:Ruby31-x64) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. 2022-08-30 not yet calculated CVE-2022-36562
MISC
rubyinstaller — rubyinstaller2
 
Incorrect access control in the install directory (C:RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. 2022-08-30 not yet calculated CVE-2022-36563
MISC
samba — samba The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account, such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally, an attacker who can intercept traffic can impersonate existing services, resulting in a loss of confidentiality and integrity. 2022-08-29 not yet calculated CVE-2022-0336
MISC
MISC
MISC
MISC
MISC
MISC
samba — samba
 
In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values. 2022-09-01 not yet calculated CVE-2022-1615
MISC
MISC
samba — samba
 
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it. 2022-09-01 not yet calculated CVE-2022-32743
MISC
MISC
samsung — mtower
 
Samsung Electronics mTower v0.3.0 and earlier was discovered to contain a NULL pointer dereference via the function TEE_AllocateTransientObject. 2022-09-01 not yet calculated CVE-2022-36621
MISC
MISC
MISC
samsung — mtower
 
Samsung Electronics mTower v0.3.0 and earlier was discovered to contain a NULL pointer dereference via the function TEE_GetObjectInfo1. 2022-09-01 not yet calculated CVE-2022-36622
MISC
MISC
MISC
MISC
sangoma — asterix
 
res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation. 2022-08-30 not yet calculated CVE-2021-46837
MISC
seiko_solutions — skybridge_mb-a100 Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01. 2022-08-29 not yet calculated CVE-2022-36556
MISC
MISC
seiko_solutions — skybridge_mb-a100 Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain an arbitrary file upload vulnerability via the restore backup function. This vulnerability allows attackers to execute arbitrary code via a crafted html file. 2022-08-29 not yet calculated CVE-2022-36557
MISC
MISC
seiko_solutions — skybridge_mb-a200 Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi. 2022-08-29 not yet calculated CVE-2022-36559
MISC
MISC
seiko_solutions — skybridge_mb-a200 Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain multiple hard-coded passcodes for root. Attackers are able to access the passcodes at /etc/srapi/config/system.conf and /usr/sbin/ssol-sshd.sh. 2022-08-29 not yet calculated CVE-2022-36560
MISC
MISC
seiko_solutions– skybridge_mb-a100 Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg. 2022-08-29 not yet calculated CVE-2022-36558
MISC
MISC
sensormatic_electronics — istar_ultra
 
All versions of iSTAR Ultra prior to version 6.8.9.CU01are vulnerable to a command injection that could allow an unauthenticated user root access to the system. 2022-08-31 not yet calculated CVE-2022-21941
CERT
CONFIRM
sftpgo — sftpgo
 
SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user’s password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it. 2022-09-02 not yet calculated CVE-2022-36071
MISC
CONFIRM
simple_task_managing_system — simple_task_managing_system A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423. 2022-08-27 not yet calculated CVE-2022-3013
N/A
simple_task_managing_system — simple_task_managing_system A vulnerability classified as problematic was found in SourceCodester Simple Task Managing System. This vulnerability affects unknown code. The manipulation of the argument student_add leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-207424. 2022-08-27 not yet calculated CVE-2022-3014
N/A
N/A
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /schedules/view_schedule.php. 2022-09-01 not yet calculated CVE-2022-36674
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/view_category.php. 2022-09-01 not yet calculated CVE-2022-36676
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /schedules/manage_schedule.php. 2022-09-01 not yet calculated CVE-2022-36675
MISC
sinsiu — enterprise_website_system Sinsiu Sinsiu Enterprise Website System v1.1.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /upload/admin.php?/deal/. 2022-08-29 not yet calculated CVE-2022-36572
MISC
siteservercms — siteservercms SiteServerCMS 5.X has a Remote-download-Getshell-vulnerability via /SiteServer/Ajax/ajaxOtherService.aspx. 2022-08-26 not yet calculated CVE-2022-36226
MISC
MISC
snakeyaml — snakeyaml The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. 2022-08-30 not yet calculated CVE-2022-25857
CONFIRM
CONFIRM
CONFIRM
CONFIRM
snipeitapp — snipe-it Cross-site Scripting (XSS) – Stored in GitHub repository snipe/snipe-it prior to v6.0.11. 2022-08-29 not yet calculated CVE-2022-3035
MISC
CONFIRM
sonicwall — sma100 A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions. 2022-08-26 not yet calculated CVE-2022-2915
CONFIRM
sourcecodester — expense_management_system Expense Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /Home/debit_credit_p. 2022-09-02 not yet calculated CVE-2022-36754
MISC
sqlite — sqlite
 
In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause. 2022-09-01 not yet calculated CVE-2020-35527
MISC
sqlite — sqlite
 
In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing. 2022-09-01 not yet calculated CVE-2020-35525
MISC
subsys/net/ip/tcp.c — subsys/net/ip/tcp.c
 
In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero. 2022-08-31 not yet calculated CVE-2022-1841
MISC
tcpdump — tcpdump The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463. 2022-08-27 not yet calculated CVE-2019-15167
CONFIRM
telos_alliance — omnia mpx node A local file disclosure vulnerability in /appConfig/userDB.json of Telos Alliance Omnia MPX Node through 1.5.0+r1 allows attackers to escalate privileges to root and execute arbitrary commands. 2022-09-02 not yet calculated CVE-2022-36642
MISC
MISC
MISC
MISC
tenda — ac6(ac1200) Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains an issue in the component /cgi-bin/DownloadFlash which allows attackers to steal all data such as source code and system files via a crafted GET request. 2022-08-30 not yet calculated CVE-2022-36552
MISC
MISC
MISC
tenda — ac6(ac1200) Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains a vulnerability which allows attackers to remove the Wi-Fi password and force the device into open security mode via a crafted packet sent to goform/setWizard. 2022-08-30 not yet calculated CVE-2022-37176
MISC
MISC
MISC
tenda — ac9 Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the time parameter at /goform/SetLEDCfg. 2022-08-31 not yet calculated CVE-2022-36570
MISC
tenda — ac9 Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the mask parameter at /goform/WanParameterSetting. 2022-08-31 not yet calculated CVE-2022-36571
MISC
tenda — ac9 Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the list parameter at /goform/setPptpUserList. 2022-08-31 not yet calculated CVE-2022-36568
MISC
tenda — ac9 Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the deviceList parameter at /goform/setMacFilterCfg. 2022-08-31 not yet calculated CVE-2022-36569
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the MACAddr parameter. 2022-08-28 not yet calculated CVE-2022-38563
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow vulnerability in the function formSetPicListItem. This vulnerability allows attackers to cause a Denial of Service (DoS) via the adItemUID parameter. 2022-08-28 not yet calculated CVE-2022-38564
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formEmailTest. This vulnerability allows attackers to cause a Denial of Service (DoS) via the mailpwd parameter. 2022-08-28 not yet calculated CVE-2022-38565
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formEmailTest. This vulnerability allows attackers to cause a Denial of Service (DoS) via the mailname parameter. 2022-08-28 not yet calculated CVE-2022-38566
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow vulnerability in the function formSetAdConfigInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the authIPs parameter. 2022-08-28 not yet calculated CVE-2022-38567
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the hostname parameter. 2022-08-28 not yet calculated CVE-2022-38568
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow in the function formDelAd. 2022-08-28 not yet calculated CVE-2022-38569
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow in the function formDelPushedAd. This vulnerability allows attackers to cause a Denial of Service (DoS) via the adPushUID parameter. 2022-08-28 not yet calculated CVE-2022-38570
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow in the function formSetGuideListItem. 2022-08-28 not yet calculated CVE-2022-38571
MISC
tenda — m3 Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the lan parameter. 2022-08-28 not yet calculated CVE-2022-38562
MISC
tenda — tx9pro Tenda_TX9pro V22.03.02.10 was discovered to contain a buffer overflow via the component httpd/SetNetControlList. 2022-08-29 not yet calculated CVE-2022-38510
MISC
theforeman — foreman A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-26 not yet calculated CVE-2021-20260
MISC
MISC
tooljet — tooljet The forgot password token basically just makes us capable of taking over the account of whoever comment in an app that we can see (bruteforcing comment id’s might also be an option but I wouldn’t count on it, since it would take a long time to find a valid one). 2022-08-29 not yet calculated CVE-2022-3019
MISC
CONFIRM
totolink — a3000ru TOTOLINK A3000RU V4.1.2cu.5185_B20201128 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36615
MISC
totolink — a7000r
 
TOTOLINK A7000R V4.1cu.4134 was discovered to contain an access control issue via /cgi-bin/ExportSettings.sh. 2022-08-29 not yet calculated CVE-2022-32993
MISC
MISC
totolink — a720r TOTOLINK A720R V4.1.5cu.532_B20210610 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36610
MISC
totolink — a800r TOTOLINK A800R V4.1.2cu.5137_B20200730 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36611
MISC
totolink — a810r TOTOLINK A810R V5.9c.4050_B20190424 was discovered to contain a command injection vulnerability via the component downloadFile.cgi. 2022-08-29 not yet calculated CVE-2022-38511
MISC
totolink — a810r TOTOLINK A810R V4.1.2cu.5182_B20201026 and V5.9c.4050_B20190424 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36616
MISC
totolink — a860r TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36614
MISC
totolink — a950rg TOTOLINK A950RG V4.1.2cu.5204_B20210112 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36612
MISC
totolink — n600r TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a hardcoded password for root at /etc/shadow.sample. 2022-08-29 not yet calculated CVE-2022-36613
MISC
trellix — dlp_endpoint_for_windows
 
Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 and 11.6.600 allows a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn’t usually have access to via a carefully constructed XML file, which the DLP Agent doesn’t parse correctly. 2022-08-30 not yet calculated CVE-2022-2330
CONFIRM
trendnet — tew733gr Trendnet TEW733GR v1.03B01 contains a Static Default Credential vulnerability in /etc/init0.d/S80telnetd.sh. 2022-08-28 not yet calculated CVE-2022-38556
MISC
trendnet — tew733gr TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htdocs/upnpinc/gena.php. 2022-08-28 not yet calculated CVE-2022-37053
MISC
MISC
vim — vim Use After Free in GitHub repository vim/vim prior to 9.0.0322. 2022-08-30 not yet calculated CVE-2022-3037
CONFIRM
MISC
FEDORA
FEDORA
vim — vim Use After Free in GitHub repository vim/vim prior to 9.0.0286. 2022-08-28 not yet calculated CVE-2022-3016
CONFIRM
MISC
vim — vim
 
Use After Free in GitHub repository vim/vim prior to 9.0.0360. 2022-09-03 not yet calculated CVE-2022-3099
CONFIRM
MISC
virglrenderer — virglrenderer A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure. 2022-08-26 not yet calculated CVE-2022-0175
MISC
MISC
MISC
MISC
MISC
wamp — wamp_server
 
Incorrect access control in the install directory (C:Wamp64) of Wamp v3.2.6 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. 2022-08-30 not yet calculated CVE-2022-36565
MISC
wavlink — router WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter. 2022-08-30 not yet calculated CVE-2022-37149
MISC
weaveworks — gitops_enterprise Weave GitOps Enterprise before 0.9.0-rc.5 has a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim’s permission. The exposure appears in Weave GitOps Enterprise UI via a GitopsCluster dashboard link. An annotation can be added to a GitopsCluster custom resource. 2022-09-01 not yet calculated CVE-2022-38790
MISC
MISC
MISC
MISC
wolfssl — wolfssl An issue was discovered in wolfSSL before 5.5.0 (when –enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a “free(): invalid pointer” message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle. 2022-08-31 not yet calculated CVE-2022-38153
MISC
CONFIRM
MISC
MISC
wolfssl — wolfssl
 
wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers. 2022-09-02 not yet calculated CVE-2021-44718
MISC
MISC
wolfssl — wolfssl
 
An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL’s compatibility layer and is not enabled by default. It is not part of wolfSSL’s native API. 2022-08-31 not yet calculated CVE-2022-38152
MISC
CONFIRM
MISC
MISC
wordpress — wordpress The WP Hide & Security Enhancer WordPress plugin before 1.8 does not escape a parameter before outputting it back in an attribute of a backend page, leading to a Reflected Cross-Site Scripting 2022-08-29 not yet calculated CVE-2022-2538
MISC
wordpress — wordpress The Mailchimp for WooCommerce WordPress plugin before 2.7.2 has an AJAX action that allows high privilege users to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example 2022-08-29 not yet calculated CVE-2022-2556
MISC
wordpress — wordpress The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request. 2022-08-29 not yet calculated CVE-2022-1663
MISC
wordpress — wordpress The Sensei LMS WordPress plugin before 4.5.0 does not have proper permissions set in one of its REST endpoint, allowing unauthenticated users to access private messages sent to teachers 2022-08-29 not yet calculated CVE-2022-2034
MISC
MISC
wordpress — wordpress The Sensei LMS WordPress plugin before 4.5.2 does not ensure that the sender of a private message is either the teacher or the original sender, allowing any authenticated user to send messages to arbitrary private conversation via a IDOR attack. Note: Attackers are not able to see responses/messages between the teacher and student 2022-08-29 not yet calculated CVE-2022-2080
MISC
MISC
wordpress — wordpress The Export All URLs WordPress plugin before 4.4 does not validate the path of the file to be removed on the system which is supposed to be the CSV file. This could allow high privilege users to delete arbitrary file from the server 2022-08-29 not yet calculated CVE-2022-2638
MISC
wordpress — wordpress The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.21.83 does not sanitise and escape some parameters before outputting them back in an admin dashboard, leading to Reflected Cross-Site Scripting 2022-08-29 not yet calculated CVE-2022-2599
MISC
wordpress — wordpress The Fluent Support WordPress plugin before 1.5.8 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection vulnerability exploitable by high privilege users 2022-08-29 not yet calculated CVE-2022-2559
MISC
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in CallRail, Inc. CallRail Phone Call Tracking plugin <= 0.4.9 at WordPress. 2022-09-01 not yet calculated CVE-2022-36796
CONFIRM
CONFIRM
wordpress — wordpress The WPIDE WordPress plugin before 3.0 does not sanitize and validate the filename parameter before using it in a require statement in the admin dashboard, leading to a Local File Inclusion issue. 2022-08-29 not yet calculated CVE-2022-2261
MISC
wordpress — wordpress The Simply Schedule Appointments WordPress plugin before 1.5.7.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-08-29 not yet calculated CVE-2022-2374
MISC
wordpress — wordpress The Mailchimp for WooCommerce WordPress plugin before 2.7.1 has an AJAX action that allows any logged in users (such as subscriber) to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example 2022-08-29 not yet calculated CVE-2022-2267
MISC
wordpress — wordpress The Simply Schedule Appointments WordPress plugin before 1.5.7.7 is missing authorisation in a REST endpoint, allowing unauthenticated users to retrieve WordPress users details such as name and email address 2022-08-29 not yet calculated CVE-2022-2373
MISC
wordpress — wordpress The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 3.0.1 does not sanitise and escape some parameters before outputting them back in an attributes of an admin page, leading to Reflected Cross-Site Scripting. 2022-08-29 not yet calculated CVE-2022-2537
MISC
wordpress — wordpress Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in PluginlySpeaking Easy Org Chart plugin <= 3.1 at WordPress. 2022-09-01 not yet calculated CVE-2022-36355
CONFIRM
CONFIRM
wordpress — wordpress The Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) WordPress plugin before 3.12.5 does not properly sanitize some parameters before inserting them into SQL queries. As a result, high privilege users could perform SQL injection attacks. 2022-08-29 not yet calculated CVE-2022-1123
MISC
wordpress — wordpress Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Simon Ward MP3 jPlayer plugin <= 2.7.3 at WordPress. 2022-09-01 not yet calculated CVE-2022-36373
CONFIRM
CONFIRM
wuzhicms — wuzhicms A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php: 2022-08-26 not yet calculated CVE-2022-36168
MISC
MISC
x-data-spreadsheet — x-data-spreadsheet All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells. 2022-08-30 not yet calculated CVE-2022-25646
CONFIRM
CONFIRM
CONFIRM
xpdfreader — xpdf XPDF v4.0.4 was discovered to contain a segmentation violation via the component /xpdf/AcroForm.cc:538. 2022-08-30 not yet calculated CVE-2022-36561
MISC
zaver — zaver Zaver through 2020-12-15 allows directory traversal via the GET /.. substring. 2022-08-27 not yet calculated CVE-2022-38794
MISC
zitadel — zitadel
 
ZITADEL combines the ease of Auth0 and the versatility of Keycloak.**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role.`ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, **Actions** were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update. 2022-08-31 not yet calculated CVE-2022-36051
MISC
MISC
CONFIRM
zkoss — zk_framework ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. 2022-08-26 not yet calculated CVE-2022-36537
MISC
zlmediakit — zlmediakit_server An attacker can send malicious RTMP requests to make the ZLMediaKit server crash remotely. Affected version is below commit 7d8b212a3c3368bc2f6507cb74664fc419eb9327. 2022-08-30 not yet calculated CVE-2022-37237
MISC
zohocorp — multiple_products Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, and OpUtils before 125658, 126003, 126105, and 126120 allow authenticated users to make database changes that lead to remote code execution in the NMAP feature. 2022-08-29 not yet calculated CVE-2022-38772
MISC
MISC
zulip — zulip
 
Zulip is an open source team chat and Zulip Mobile is an app for iOS and Andriod users. In Zulip Mobile through version 27.189, a crafted link in a message sent by an authenticated user could lead to credential disclosure if a user follows the link. A patch was released in version 27.190. 2022-08-29 not yet calculated CVE-2022-35962
CONFIRM
MISC
MISC
zulip — zulip
 
Zulip is an open-source team collaboration tool with topic-based threading that combines email and chat. When displaying messages with embedded remote images, Zulip normally loads the image preview via a go-camo proxy server. However, an attacker who can send messages could include a crafted URL that tricks the server into embedding a remote image reference directly. This could allow the attacker to infer the viewer’s IP address and browser fingerprinting information. This vulnerability is fixed in Zulip Server 5.6. Zulip organizations with image and link previews [disabled](https://zulip.com/help/allow-image-link-previews) are not affected. 2022-08-31 not yet calculated CVE-2022-36048
CONFIRM

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

CISA Releases Four Industrial Control Systems Advisories

Original release date: September 8, 2022

CISA released four Industrial Control Systems (ICS) advisories on September 08, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

AA22-249A: #StopRansomware: Vice Society

Original release date: September 6, 2022

Summary

Actions to take today to mitigate cyber threats from ransomware:

• Prioritize and remediate known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce multifactor authentication.

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate IOCs and TTPs associated with Vice Society actors identified through FBI investigations as recently as September 2022. The FBI, CISA, and the MS-ISAC have recently observed Vice Society actors disproportionately targeting the education sector with ransomware attacks.

Over the past several years, the education sector, especially kindergarten through twelfth grade (K-12) institutions, have been a frequent target of ransomware attacks. Impacts from these attacks have ranged from restricted access to networks and data, delayed exams, canceled school days, and unauthorized access to and theft of personal information regarding students and staff. The FBI, CISA, and the MS-ISAC anticipate attacks may increase as the 2022/2023 school year begins and criminal ransomware groups perceive opportunities for successful attacks. School districts with limited cybersecurity capabilities and constrained resources are often the most vulnerable; however, the opportunistic targeting often seen with cyber criminals can still put school districts with robust cybersecurity programs at risk. K-12 institutions may be seen as particularly lucrative targets due to the amount of sensitive student data accessible through school systems or their managed service providers.

The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

Technical Details

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 11. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.

Vice Society is an intrusion, exfiltration, and extortion hacking group that first appeared in summer 2021. Vice Society actors do not use a ransomware variant of unique origin. Instead, the actors have deployed versions of Hello Kitty/Five Hands and Zeppelin ransomware, but may deploy other variants in the future.

Vice Society actors likely obtain initial network access through compromised credentials by exploiting internet-facing applications [T1190]. Prior to deploying ransomware, the actors spend time exploring the network, identifying opportunities to increase accesses, and exfiltrating data [TA0010] for double extortion–a tactic whereby actors threaten to publicly release sensitive data unless a victim pays a ransom. Vice Society actors have been observed using a variety of tools, including SystemBC, PowerShell Empire, and Cobalt Strike to move laterally. They have also used “living off the land” techniques targeting the legitimate Windows Management Instrumentation (WMI) service [T1047] and tainting shared content [T1080].

Vice Society actors have been observed exploiting the PrintNightmare vulnerability (CVE-2021-1675 and CVE-2021-34527 ) to escalate privileges [T1068]. To maintain persistence, the criminal actors have been observed leveraging scheduled tasks [T1053], creating undocumented autostart Registry keys [T1547.001], and pointing legitimate services to their custom malicious dynamic link libraries (DLLs) through a tactic known as DLL side-loading [T1574.002]. Vice Society actors attempt to evade detection through masquerading their malware and tools as legitimate files [T1036], using process injection [T1055], and likely use evasion techniques to defeat automated dynamic analysis [T1497]. Vice Society actors have been observed escalating privileges, then gaining access to domain administrator accounts, and running scripts to change the passwords of victims’ network accounts to prevent the victim from remediating. 

Indicators of Compromise (IOCs)

Email Addresses

v-society.official@onionmail[.]org

ViceSociety@onionmail[.]org

OnionMail email accounts in the format of [First Name][Last Name]@onionmail[.]org

 

TOR Address

http://vsociethok6sbprvevl4dlwbqrzyhxcxaqpvcqt5belwvsuxaxsutyad[.]onion

 

IP Addresses for C2

Confidence Level

5.255.99[.]59

High Confidence

5.161.136[.]176

Medium Confidence

198.252.98[.]184

Medium Confidence

194.34.246[.]90

Low Confidence

See Table 1 for file hashes obtained from FBI incident response investigations in September 2022.

Table 1: File Hashes as of September 2022

MD5

SHA1

fb91e471cfa246beb9618e1689f1ae1d

a0ee0761602470e24bcea5f403e8d1e8bfa29832

 

3122ea585623531df2e860e7d0df0f25cce39b21

 

41dc0ba220f30c70aea019de214eccd650bc6f37

 

c9c2b6a5b930392b98f132f5395d54947391cb79

MITRE ATT&CK TECHNIQUES

Vice Society actors have used ATT&CK techniques, similar to Zeppelin techniques, listed in Table 2.

Table 2: Vice Society Actors ATT&CK Techniques for Enterprise

Initial Access

Technique Title

ID

Use

Exploit Public-Facing Application

T1190

Vice Society actors exploit vulnerabilities in an internet-facing systems to gain access to victims’ networks.

Valid Accounts

T1078

Vice Society actors obtain initial network access through compromised valid accounts.

Execution

Technique Title

ID

Use

Windows Management Instrumentation (WMI)

T1047

Vice Society actors leverage WMI as a means of “living off the land” to execute malicious commands. WMI is a native Windows administration feature.

Scheduled Task/Job

T1053

Vice Society have used malicious files that create component task schedule objects, which are often mean to register a specific task to autostart on system boot. This facilitates recurring execution of their code.

Persistence

Technique Title

ID

Use

Modify System Process

T1543.003

Vice Society actors encrypt Windows Operating functions to preserve compromised system functions.

Registry Run Keys/Startup Folder

T1547.001

Vice Society actors have employed malicious files that create an undocumented autostart Registry key to maintain persistence after boot/reboot.

DLL Side-Loading

T1574.002

Vice Society actors may directly side-load their payloads by planting their own DLL then invoking a legitimate application that executes the payload within that DLL. This serves as both a persistence mechanism and a means to masquerade actions under legitimate programs.

Privilege Escalation

Technique Title

ID

Use

Exploitation for Privilege Escalation

T1068

Vice Society actors have been observed exploiting PrintNightmare vulnerability (CVE-2021-1675 and CVE-2021-34527) to escalate privileges.

Defense Evasion

Technique Title

ID

Use

Masquerading

T1036

Vice Society actors may attempt to manipulate features of the files they drop in a victim’s environment to mask the files or make the files appear legitimate.

Process Injection

T1055

Vice Society artifacts have been analyzed to reveal the ability to inject code into legitimate processes for evading process-based defenses. This tactic has other potential impacts, including the ability to escalate privileges or gain additional accesses.

Sandbox Evasion

T1497

Vice Society actors may have included sleep techniques in their files to hinder common reverse engineering or dynamic analysis.

Lateral Movement

Technique Title

ID

Use

Taint Shared Content

T1080

Vice Society actors may deliver payloads to remote systems by adding content to shared storage locations such as network drives.

Exfiltration

Technique Title

ID

Use

Exfiltration

TA0010

Vice Society actors are known for double extortion, which is a second attempt to force a victim to pay by threatening to expose sensitive information if the victim does not pay a ransom.

Impact

Technique Title

ID

Use

Data Encrypted for Impact

T1486

Vice Society actors have encrypted data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources.

Account Access Removal

T1531

Vice Society actors run a script to change passwords of victims’ email accounts.

 

 

Mitigations

The FBI and CISA recommend organizations, particularly the education sector, establish and maintain strong liaison relationships with the FBI Field Office in their region and their regional CISA Cybersecurity Advisor. The location and contact information for FBI Field Offices and CISA Regional Offices can be located at www.fbi.gov/contact-us/field-offices and www.cisa.gov/cisa-regions, respectively. Through these partnerships, the FBI and CISA can assist with identifying vulnerabilities to academia and mitigating potential threat activity. The FBI and CISA further recommend that academic entities review and, if needed, update incident response and communication plans that list actions an organization will take if impacted by a cyber incident.

The FBI, CISA, and the MS-ISAC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Vice Society actors:

Preparing for Cyber Incidents

  • Maintain offline backups of data, and regularly maintain backup and restoration.  By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data.
  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure. Ensure your backup data is not already infected.
  • Review the security posture of third-party vendors and those interconnected with your organization. Ensure all connections between third-party vendors and outside software or hardware are monitored and reviewed for suspicious activity.
  • Implement listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.
  • Document and monitor external remote connections. Organizations should document approved solutions for remote management and maintenance, and immediately investigate if an unapproved solution is installed on a workstation.
  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).

Identity and Access Management

  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.
    • Use longer passwords consisting of at least 8 characters and no more than 64 characters in length;
    • Store passwords in hashed format using industry-recognized password managers;
    • Add password user “salts” to shared login credentials;
    • Avoid reusing passwords;
    • Implement multiple failed login attempt account lockouts;
    • Disable password “hints”;
    • Refrain from requiring password changes more frequently than once per year unless a password is known or suspected to be compromised.
      Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software.
  • Require phishing-resistant multifactor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.
  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege. 
  • Implement time-based access for accounts set at the admin level and higher. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.

Protective Controls and Architecture

  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.
  • Install, regularly update, and enable real time detection for antivirus software on all hosts.
  • Secure and closely monitor remote desktop protocol (RDP) use.
    • Limit access to resources over internal networks, especially by restricting RDP and using virtual desktop infrastructure. If RDP is deemed operationally necessary, restrict the originating sources and require MFA to mitigate credential theft and reuse. If RDP must be available externally, use a VPN, virtual desktop infrastructure, or other means to authenticate and secure the connection before allowing RDP to connect to internal devices. Monitor remote access/RDP logs, enforce account lockouts after a specified number of attempts to block brute force campaigns, log RDP login attempts, and disable unused remote access/RDP ports.

Vulnerability and Configuration Management

  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Organizations should prioritize patching of vulnerabilities on CISA’s Known Exploited Vulnerabilities catalog.
  • Disable unused ports.
  • Consider adding an email banner to emails received from outside your organization.
  • Disable hyperlinks in received emails.
  • Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally.
  • Ensure devices are properly configured and that security features are enabled.
  • Disable ports and protocols that are not being used for a business purpose (e.g., RDP Transmission Control Protocol Port 3389).
  • Restrict Server Message Block (SMB) Protocol within the network to only access servers that are necessary, and remove or disable outdated versions of SMB (i.e., SMB version 1). Threat actors use SMB to propagate malware across organizations.

REFERENCES

REPORTING

The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Vice Society actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

The FBI, CISA, and the MS-ISAC strongly discourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, or to CISA at report@cisa.gov or (888) 282-0870. SLTT government entities can also report to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and the MS-ISAC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, or the MS-ISAC.

Revisions

  • September 6, 2022: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

CISA Releases Five Industrial Control Systems Advisories

Original release date: September 6, 2022

CISA has released five Industrial Control Systems (ICS) advisories on September 06, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:

ICSA-22-249-01 Triangle Microworks Library
ICSA-22-249-02 AVEVA Edge 2020 R2 SP12020 R2
ICSA-22-249-03 Cognex 3D-A1000 Dimensioning System
ICSA-22-249-04 Hitachi Energy TXpert Hub CoreTec 4
ICSA-21-252-02 Delta Electronics DOPSoft 2 (Update A)

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Vulnerability Summary for the Week of August 22, 2022

Original release date: August 29, 2022 | Last revised: August 30, 2022

 

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no high vulnerabilities recorded this week.

Back to top

 

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no medium vulnerabilities recorded this week.

Back to top

 

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
72crm — wukong_crm 72crm 9.0 has an Arbitrary file upload vulnerability. 2022-08-24 not yet calculated CVE-2022-37181
MISC
72crm — wukong_crm An issue was discovered in 72crm 9.0. There is a SQL Injection vulnerability in View the task calendar. 2022-08-24 not yet calculated CVE-2022-37178
MISC
abb — abb_zenon
 
Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon system and user also can add own log messages and e.g., flood the log entries. An attacker who successfully exploit the vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc. 2022-08-24 not yet calculated CVE-2022-34836
MISC
abb — abb_zenon
 
Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add more network clients that may monitor various activities of the Zenon. 2022-08-24 not yet calculated CVE-2022-34837
MISC
abb — abb_zenon
 
Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add or alter data points and corresponding attributes. Once such engineering data is used the data visualization will be altered for the end user. 2022-08-24 not yet calculated CVE-2022-34838
MISC
adobe — commerce Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to leak minor information of another user’s account detials. Exploitation of this issue does not require user interaction. 2022-08-19 not yet calculated CVE-2022-35692
MISC
anjuta-bookmarks.c — anjuta-bookmarks.c
 
There is a Information Disclosure vulnerability in anjuta/plugins/document-manager/anjuta-bookmarks.c. This issue was caused by the incorrect use of libxml2 API. The vendor forgot to call ‘g_free()’ to release the return value of ‘xmlGetProp()’. 2022-08-25 not yet calculated CVE-2021-42522
MISC
apache — activemq_artemis In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue. 2022-08-23 not yet calculated CVE-2022-35278
MISC
apache — flume Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol. 2022-08-21 not yet calculated CVE-2022-34916
MISC
MISC
apache — hadoop
 
ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used. 2022-08-25 not yet calculated CVE-2021-25642
MISC
apache — libapreq2 A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack. 2022-08-25 not yet calculated CVE-2022-22728
MISC
MLIST
MLIST
MLIST
apple — macos An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina. An app may be able to access sensitive user information. 2022-08-24 not yet calculated CVE-2022-32834
MISC
MISC
MISC
apple — macos A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. 2022-08-24 not yet calculated CVE-2022-32811
MISC
MISC
MISC
apple — macos The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to execute arbitrary code with kernel privileges. 2022-08-24 not yet calculated CVE-2022-32810
MISC
MISC
MISC
apple — macos Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to disclose kernel memory. 2022-08-24 not yet calculated CVE-2022-32793
MISC
MISC
MISC
MISC
FEDORA
apple — macos The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. 2022-08-24 not yet calculated CVE-2022-32812
MISC
MISC
MISC
apple — multiple_products This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. A user in a privileged network position can track a user’s activity. 2022-08-24 not yet calculated CVE-2022-32857
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. An app with root privileges may be able to execute arbitrary code with kernel privileges. 2022-08-24 not yet calculated CVE-2022-32813
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to cause unexpected system termination or write kernel memory. 2022-08-24 not yet calculated CVE-2022-32837
MISC
MISC
MISC
apple — multiple_products A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6. An app may be able to read arbitrary files. 2022-08-24 not yet calculated CVE-2022-32838
MISC
MISC
MISC
MISC
apple — multiple_products The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina, iOS 15.6 and iPadOS 15.6, tvOS 15.6, watchOS 8.7. A remote user may cause an unexpected app termination or arbitrary code execution. 2022-08-24 not yet calculated CVE-2022-32839
MISC
MISC
MISC
MISC
MISC
MISC
apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to execute arbitrary code with kernel privileges. 2022-08-24 not yet calculated CVE-2022-32840
MISC
MISC
MISC
apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. 2022-08-24 not yet calculated CVE-2022-32894
MISC
MISC
apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. 2022-08-24 not yet calculated CVE-2022-32893
MISC
MISC
MISC
MLIST
MLIST
FEDORA
DEBIAN
DEBIAN
arc_informatique — pcvue
 
The affected device stores sensitive information in cleartext, which may allow an authenticated user to access session data stored in the OAuth database belonging to legitimate users 2022-08-24 not yet calculated CVE-2022-2569
MISC
archer — archer_platform
 
Archer Platform 6.9 SP2 P2 before 6.11 P3 (6.11.0.3) contain a reflected XSS vulnerability. A remote unauthenticated malicious Archer user could potentially exploit this vulnerability by tricking a victim application user into supplying malicious JavaScript code to the vulnerable web application. This code is then reflected to the victim and gets executed by the web browser in the context of the vulnerable web application. 6.10 P4 (6.10.0.4) and 6.11 P2 HF4 (6.11.0.2.4) are also fixed releases. 2022-08-25 not yet calculated CVE-2022-37318
MISC
MISC
archer — archer_platform
 
Archer Platform 6.x before 6.11 P3 contain an HTML injection vulnerability. An authenticated remote attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious code in the context of the web application. 6.10 P4 (6.10.0.4) and 6.11 P2 HF4 (6.11.0.2.4) are also fixed releases. 2022-08-25 not yet calculated CVE-2022-37317
MISC
MISC
archer — archer_platform
 
Archer Platform 6.8 before 6.11 P3 (6.11.0.3) contains an improper API access control vulnerability in a multi-instance system that could potentially present unauthorized metadata to an authenticated user of the affected system. 6.10 P3 HF1 (6.10.0.3.1) is also a fixed release. 2022-08-25 not yet calculated CVE-2022-37316
MISC
MISC
articatech — artica_proxy An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php. 2022-08-24 not yet calculated CVE-2022-37153
MISC
artifex — ghostscript A heap-based buffer over write vulnerability was found in GhostScript’s lp8000_print_page() function in gdevlp8k.c file. An attacker could trick a user to open a crafted PDF file, triggering the heap buffer overflow that could lead to memory corruption or a denial of service. 2022-08-19 not yet calculated CVE-2020-27792
MISC
MISC
asneg — opc_ua_stack All versions of package asneg/opcuastack are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. 2022-08-23 not yet calculated CVE-2022-24381
CONFIRM
atlassian — bitbucket_server_and_data_center
 
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew. 2022-08-25 not yet calculated CVE-2022-36804
MISC
atlassian — jira
 
ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. 2022-08-26 not yet calculated CVE-2022-36537
MISC
baijiacms — baijiacms Baijicms v4 was discovered to contain an arbitrary file upload vulnerability. 2022-08-22 not yet calculated CVE-2022-35150
MISC
MISC
bdg — mobiledoc_kit Cross-site Scripting (XSS) – Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2. 2022-08-22 not yet calculated CVE-2022-2932
MISC
CONFIRM

blue_prism — enterprise

An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for a domain authenticated user to send a crafted message to the Blue Prism Server and accomplish a remote code execution attack that is possible because of insecure deserialization. Exploitation of this vulnerability allows for code to be executed in the context of the Blue Prism Server service. 2022-08-25 not yet calculated CVE-2022-36119
MISC
MISC
MISC
blue_prism — enterprise An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the getChartData administrative function. Using a low/no privilege Blue Prism user account, the attacker can alter the server’s settings by abusing the getChartData method, allowing the Blue Prism server to execute any MSSQL stored procedure by name. 2022-08-26 not yet calculated CVE-2022-36120
MISC
MISC
MISC
blue_prism — enterprise An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the UpdateOfflineHelpData administrative function. Abusing this function will allow any Blue Prism user to change the offline help URL to one of their choice, opening the possibility of spoofing the help page or executing a local file. 2022-08-26 not yet calculated CVE-2022-36121
MISC
MISC
MISC
blue_prism — enterprise
 
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the SetProcessAttributes administrative function. Abusing this function will allow any Blue Prism user to publish, unpublish, or retire processes. Using this function, any logged-in user can change the status of a process, an action allowed only intended for users with the Edit Process permission. 2022-08-25 not yet calculated CVE-2022-36118
MISC
MISC
MISC
blue_prism — enterprise
 
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for an administrative function. If credential access is configured to be accessible by a machine or the runtime resource security group, using further reverse engineering, an attacker can spoof a known machine and request known encrypted credentials to decrypt later. 2022-08-25 not yet calculated CVE-2022-36117
MISC
MISC
MISC
blue_prism — enterprise
 
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for unintended functionality. An attacker can abuse the CreateProcessAutosave() method to inject their own functionality into a development process. If (upon a warning) a user decides to recover unsaved work by using the last saved version, the malicious code could enter the workflow. Should the process action stages not be fully reviewed before publishing, this could result in the malicious code being run in a production environment. 2022-08-25 not yet calculated CVE-2022-36115
MISC
MISC
MISC
blue_prism — enterprise
 
An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the setValidationInfo administrative function. Removing the validation applied to newly designed processes increases the chance of successfully hiding malicious code that could be executed in a production environment. 2022-08-25 not yet calculated CVE-2022-36116
MISC
MISC
MISC
bluecms — bluecms BlueCMS 1.6 has SQL injection in line 55 of admin/model.php 2022-08-23 not yet calculated CVE-2022-37112
MISC
bluecms — bluecms BlueCMS 1.6 has SQL injection in line 132 of admin/article.php 2022-08-23 not yet calculated CVE-2022-37111
MISC
bluecm — bluecms Bluecms 1.6 has SQL injection in line 132 of admin/area.php 2022-08-23 not yet calculated CVE-2022-37113
MISC
bpcbt — smartvista Multiple reflected XSS vulnerabilities occur when handling error message of BPC SmartVista version 3.28.0 allowing an attacker to execute javascript code at client side. 2022-08-19 not yet calculated CVE-2022-35554
MISC
MISC
MISC
bus_pass_management — bus_pass_management Multiple SQL injections detected in Bus Pass Management System 1.0 via buspassms/admin/view-enquiry.php, buspassms/admin/pass-bwdates-reports-details.php, buspassms/admin/changeimage.php, buspassms/admin/search-pass.php, buspassms/admin/edit-category-detail.php, and buspassms/admin/edit-pass-detail.php 2022-08-22 not yet calculated CVE-2022-36198
MISC
MISC
chatwoot — chatwoot Cross-site Scripting (XSS) – DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0. 2022-08-19 not yet calculated CVE-2022-0542
CONFIRM
MISC
cisco — fxos
 
A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation of specific values that are within a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or cause the Cisco Discovery Protocol process to crash and restart multiple times, which would cause the affected device to reload, resulting in a DoS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2022-08-25 not yet calculated CVE-2022-20824
CISCO
cisco — fxos
 
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges. 2022-08-25 not yet calculated CVE-2022-20865
CISCO
cisco — nx-os
 
A vulnerability in the OSPF version 3 (OSPFv3) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incomplete input validation of specific OSPFv3 packets. An attacker could exploit this vulnerability by sending a malicious OSPFv3 link-state advertisement (LSA) to an affected device. A successful exploit could allow the attacker to cause the OSPFv3 process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The OSPFv3 feature is disabled by default. To exploit this vulnerability, an attacker must be able to establish a full OSPFv3 neighbor state with an affected device. For more information about exploitation conditions, see the Details section of this advisory. 2022-08-25 not yet calculated CVE-2022-20823
CISCO
cisco– aci_multi-site_orchestrator
 
A vulnerability in the API implementation of Cisco ACI Multi-Site Orchestrator (MSO) could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to improper authorization on specific APIs. An attacker could exploit this vulnerability by sending crafted HTTP requests. A successful exploit could allow an attacker who is authenticated with non-Administrator privileges to elevate to Administrator privileges on an affected device. 2022-08-25 not yet calculated CVE-2022-20921
CISCO
claroline — claroline Claroline 13.5.7 and prior is vulnerable to Cross Site Scripting (XSS). An attacker can obtain javascript code execution by adding arbitrary javascript code in the ‘Location’ field of a calendar event. 2022-08-25 not yet calculated CVE-2022-37162
MISC
claroline — claroline Claroline 13.5.7 and prior is vulnerable to Cross Site Scripting (XSS) via SVG file upload. 2022-08-25 not yet calculated CVE-2022-37161
MISC
claroline — claroline Claroline 13.5.7 and prior allows an authenticated attacker to elevate privileges via the arbitrary creation of a privileged user. By combining the XSS vulnerability present in several upload forms and a javascript request to the present API, it is possible to trigger the creation of a user with administrative rights by opening an SVG file as an administrator user. 2022-08-25 not yet calculated CVE-2022-37160
MISC
claroline — claroline Claroline 13.5.7 and prior is vulnerable to Remote code execution via arbitrary file upload. 2022-08-25 not yet calculated CVE-2022-37159
MISC
clinic’s_patient_management — clinic’s_patient_management Clinic’s Patient Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via patients.php. 2022-08-22 not yet calculated CVE-2022-36251
MISC
clusterlabs — clusterlabs_hawk
 
An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive “shell” that isn’t limited to the commands specified in hawk_invoke, allowing escalation to root. 2022-08-26 not yet calculated CVE-2021-3020
MISC
MISC
MISC
codesys — visualization All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information exposure allowing a remote, unauthenticated attacker to enumerate valid users. 2022-08-23 not yet calculated CVE-2022-1989
CONFIRM
colord — colord
 
There are two Information Disclosure vulnerabilities in colord, and they lie in colord/src/cd-device-db.c and colord/src/cd-profile-db.c separately. They exist because the ‘err_msg’ of ‘sqlite3_exec’ is not releasing after use, while libxml2 emphasizes that the caller needs to release it. 2022-08-25 not yet calculated CVE-2021-42523
MISC
crowcpp — crow HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive data from stack memory when fulfilling a request for a static file smaller than 16 KB. 2022-08-22 not yet calculated CVE-2022-38668
MISC
crowcpp — crow HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. 2022-08-22 not yet calculated CVE-2022-38667
MISC
crowdstrike — falcon A vulnerability was found in CrowdStrike Falcon 6.31.14505.0/6.42.15610. It has been classified as problematic. Affected is the Uninstallation Handler which makes it possible to circumvent and disable the security feature. The manipulation leads to missing authorization. The identifier of this vulnerability is VDB-206880. 2022-08-22 not yet calculated CVE-2022-2841
N/A
N/A
N/A
N/A
cryptopro — cryptopro_secure_disk
 
A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34301
MISC
MISC
cskefu — cskefu
 
Insecure permissions in cskefu v7.0.1 allows unauthenticated attackers to arbitrarily add administrator accounts. 2022-08-26 not yet calculated CVE-2022-36521
MISC
d-link — dir-615 The WAN configuration page “wan.htm” on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page. 2022-08-23 not yet calculated CVE-2021-42627
MISC
MISC
MISC
MISC
d-link — dsl-3782 D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via a crafted HTTP connection request. 2022-08-23 not yet calculated CVE-2022-35191
MISC
MISC
MISC
MISC
d-link — modem_router
 
D-Link Wireless AC1200 Dual Band VDSL ADSL Modem Router DSL-3782 Firmware v1.01 allows unauthenticated attackers to cause a Denial of Service (DoS) via the User parameter or Pwd parameter to Login.asp. 2022-08-26 not yet calculated CVE-2022-35192
MISC
MISC
MISC
MISC
de.fac2 — de.fac2 de.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim’s PC. 2022-08-24 not yet calculated CVE-2022-33172
MISC
MISC
dell — emc_powerscale_onefs Dell PowerScale OneFS, versions 9.0.0, up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.2, contain an insecure default initialization of a resource vulnerability. A remote authenticated attacker may potentially exploit this vulnerability, leading to information disclosure. 2022-08-22 not yet calculated CVE-2022-32480
MISC
dell — emc_powerscale_onefs Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.2, contain an unprotected primary channel vulnerability. An unauthenticated network malicious attacker may potentially exploit this vulnerability, leading to a denial of filesystem services. 2022-08-22 not yet calculated CVE-2022-33932
MISC
dell — emc_powerscale_onefs Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.2, contain a process invoked with sensitive information vulnerability. A CLI user may potentially exploit this vulnerability, leading to information disclosure. 2022-08-22 not yet calculated CVE-2022-31238
MISC
dell — emc_powerscale_onefs Dell PowerScale OneFS, versions 9.2.0 up to and including 9.2.1.12 and 9.3.0.5 contain an improper preservation of permissions vulnerability in SyncIQ. A low privileged local attacker may potentially exploit this vulnerability, leading to limited information disclosure. 2022-08-22 not yet calculated CVE-2022-31237
MISC
deluge — deluge_web-ui
 
The Deluge Web-UI is vulnerable to XSS through a crafted torrent file. The the data from torrent files is not properly sanitised as it’s interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user’s browser session. 2022-08-26 not yet calculated CVE-2021-3427
MISC
MISC
dlink — dir-816 D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow. 2022-08-22 not yet calculated CVE-2022-37134
MISC
MISC
dlink — dir-816 D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end. 2022-08-22 not yet calculated CVE-2022-37133
MISC
MISC
dolphinphp — dolphinphp DolphinPHP 1.5.1 is vulnerable to Cross Site Scripting (XSS) via Background – > System – > system function – > configuration management. 2022-08-19 not yet calculated CVE-2022-37254
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability at /patient/settings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name text field. 2022-08-26 not yet calculated CVE-2022-36548
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a Cross-Site Request Forgery (CSRF) via /patient/settings.php. 2022-08-26 not yet calculated CVE-2022-36546
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/settings.php. 2022-08-26 not yet calculated CVE-2022-36545
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/booking.php. 2022-08-26 not yet calculated CVE-2022-36544
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /patient/doctors.php. 2022-08-26 not yet calculated CVE-2022-36543
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
An access control issue in the component /ip/admin/ of Edoc-doctor-appointment-system v1.0.1 allows attackers to arbitrarily edit, read, and delete Administrator data. 2022-08-26 not yet calculated CVE-2022-36542
MISC
MISC
edoc-doctor-appointment-system — edoc-doctor-appointment-system
 
Edoc-doctor-appointment-system v1.0.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /patient/index.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field. 2022-08-26 not yet calculated CVE-2022-36547
MISC
MISC
elastic — elasticsearch
 
A flaw was discovered in ECE before 3.4.0 that might lead to the disclosure of sensitive information such as user passwords and Elasticsearch keystore settings values in logs such as the audit log or deployment logs in the Logging and Monitoring cluster. The affected APIs are PATCH /api/v1/user and PATCH /deployments/{deployment_id}/elasticsearch/{ref_id}/keystore 2022-08-25 not yet calculated CVE-2022-23715
MISC
MISC
emerson — proficy_machine_edition Emerson Electric’s Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-353 Missing Support for Integrity Check, and has no authentication or authorization of data packets after establishing a connection for the SRTP protocol. 2022-08-19 not yet calculated CVE-2022-2793
MISC
emerson — proficy_machine_edition Emerson Electric’s Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Traversal: ‘..Filename’, also known as a ZipSlip attack, through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code. 2022-08-19 not yet calculated CVE-2022-2788
MISC
emerson — proficy_machine_edition Emerson Electric’s Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-284 Improper Access Control, and stores project data in a directory with improper access control lists. 2022-08-19 not yet calculated CVE-2022-2792
MISC
emerson — proficy_machine_edition Emerson Electric’s Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-347 Improper Verification of Cryptographic Signature, and does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files). 2022-08-19 not yet calculated CVE-2022-2790
MISC
emerson — proficy_machine_edition Emerson Electric’s Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-345 Insufficient Verification of Data Authenticity, and can display logic that is different than the compiled logic. 2022-08-19 not yet calculated CVE-2022-2789
MISC
ericsson — network_manager
 
In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the same AMOS authorization group can retrieve the data from certain log files. All AMOS users are considered to be highly privileged users in ENM system and all must be previously defined and authorized by the Security Administrator. Those users can access some log’s files, under a common path, and read information stored in the log’s files in order to conduct privilege escalation. 2022-08-26 not yet calculated CVE-2021-32570
MISC
MISC
ethereum — eth-account An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method 2022-08-22 not yet calculated CVE-2022-1930
MISC
ethz — safe_exam_browser Kiosk breakout (without quit password) in Safe Exam Browser (Windows) <3.4.0, which allows an attacker to achieve code execution via the browsers’ print dialog. 2022-08-19 not yet calculated CVE-2022-36220
MISC
MISC
eurosoft — eurosoft_bootloader A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34303
MISC
MISC
exceedone — exment Reflected cross-site scripting vulnerability in Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows a remote authenticated attacker to inject an arbitrary script. 2022-08-24 not yet calculated CVE-2022-38080
MISC
MISC
MISC
exceedone — exment Stored cross-site scripting vulnerability in Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows a remote authenticated attacker to inject an arbitrary script. 2022-08-24 not yet calculated CVE-2022-38089
MISC
MISC
MISC
exceedone — exment SQL injection vulnerability in the Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows remote authenticated attackers to execute arbitrary SQL commands. 2022-08-24 not yet calculated CVE-2022-37333
MISC
MISC
MISC
eyoucms — eyoucms EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add. 2022-08-19 not yet calculated CVE-2022-36225
MISC
f-secure — elements_endpoint_protection A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker. 2022-08-23 not yet calculated CVE-2022-28882
MISC
f-secure — elements_endpoint_protection A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl unpack function crashes. This can lead to a possible scanning engine crash. The exploit can be triggered remotely by an attacker. 2022-08-23 not yet calculated CVE-2022-28883
MISC
fiserv — prologue Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database. 2022-08-23 not yet calculated CVE-2020-35992
MISC
MISC
fishbowlinventory — fishbowl_server A Java Deserialization vulnerability in the Fishbowl Server in Fishbowl Inventory before 2022.4.1 allows remote attackers to execute arbitrary code via a crafted XML payload. 2022-08-19 not yet calculated CVE-2022-29805
MISC
MISC
frappe — erpnext Frappe ERPNext 12.29.0 is vulnerable to XSS where the software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. 2022-08-22 not yet calculated CVE-2022-28598
MISC
MISC
MISC
freeopcua_project — freeopcua All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False. 2022-08-23 not yet calculated CVE-2022-24298
CONFIRM
CONFIRM
ge_gas_power — workstationst
 
An HTTP response splitting vulnerability exists in the AM Gateway Challenge-Response dialog of WorkstationST (<v07.09.15) and could allow an attacker to compromise a victim’s browser/session. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. 2022-08-25 not yet calculated CVE-2022-37953
CONFIRM
ge_gas_power — workstationst
 
A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim’s browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. 2022-08-25 not yet calculated CVE-2022-37952
CONFIRM
getkirby — kirby An issue was discovered in Kirby 2.5.12. The application allows malicious HTTP requests to be sent in order to trick a user into adding web pages. 2022-08-24 not yet calculated CVE-2018-14520
MISC
MISC
getkirby — kirby An issue was discovered in Kirby 2.5.12. The delete page functionality suffers from a CSRF flaw. A remote attacker can craft a malicious CSRF page and force the user to delete a page. 2022-08-24 not yet calculated CVE-2018-14519
MISC
MISC
glibc — glibc
 
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system. 2022-08-24 not yet calculated CVE-2021-3999
MISC
MISC
MISC
MISC
MISC
MISC
glibc — glibc
 
A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data. 2022-08-24 not yet calculated CVE-2021-3998
MISC
MISC
MISC
MISC
MISC
MISC
MISC
gnu — binutils
 
In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file. 2022-08-26 not yet calculated CVE-2022-38533
MISC
MISC
google — android In PVRSRVBridgeHeapCfgHeapDetails, there is a possible leak of kernel heap content due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-236848165 2022-08-24 not yet calculated CVE-2021-0698
MISC
google — android In PVRSRVBridgeHeapCfgHeapConfigName, there is a possible leak of kernel heap content due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-236848817 2022-08-24 not yet calculated CVE-2021-0887
MISC
google — android An unprivileged app can trigger PowerVR driver to return an uninitialized heap memory causing information disclosure.Product: AndroidVersions: Android SoCAndroid ID: A-236849490 2022-08-24 not yet calculated CVE-2021-0891
MISC
google — android The PowerVR GPU driver allows unprivileged apps to allocated pinned memory, unpin it (which makes it available to be freed), and continue using the page in GPU calls. No privileges required and this results in kernel memory corruption.Product: AndroidVersions: Android SoCAndroid ID: A-232440670 2022-08-24 not yet calculated CVE-2021-39815
MISC
google — android The method PVRSRVBridgePMRPDumpSymbolicAddr allocates puiMemspaceNameInt on the heap, fills the contents of the buffer via PMR_PDumpSymbolicAddr, and then copies the buffer to userspace. The method PMR_PDumpSymbolicAddr may fail, and if it does the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236846966 2022-08-24 not yet calculated CVE-2021-0946
MISC
google — android The method PVRSRVBridgeTLDiscoverStreams allocates puiStreamsInt on the heap, fills the contents of the buffer via TLServerDiscoverStreamsKM, and then copies the buffer to userspace. The method TLServerDiscoverStreamsKM may fail for several reasons including invalid sizes. If this method fails the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236838960 2022-08-24 not yet calculated CVE-2021-0947
MISC
google — android The PowerVR GPU driver allows unprivileged apps to allocated pinned memory, unpin it (which makes it available to be freed), and continue using the page in GPU calls. No privileges required and this results in kernel memory corruption.Product: AndroidVersions: Android SoCAndroid ID: A-232441339 2022-08-24 not yet calculated CVE-2022-20122
MISC
gosecure — titan Key reuse in GoSecure Titan Inbox Detection & Response (IDR) through 2022-04-05 leads to remote code execution. To exploit this vulnerability, an attacker must craft and sign a serialized payload. 2022-08-25 not yet calculated CVE-2022-28747
MISC
MISC
gravitee — api_management HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request. 2022-08-23 not yet calculated CVE-2019-25075
MISC
MISC
grokability– snipe-it Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10. 2022-08-25 not yet calculated CVE-2022-2997
MISC
CONFIRM
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetMacAccessMode. 2022-08-25 not yet calculated CVE-2022-36471
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function EditMacList.d. 2022-08-25 not yet calculated CVE-2022-36467
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed. 2022-08-25 not yet calculated CVE-2022-36468
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAP5GWifiById. 2022-08-25 not yet calculated CVE-2022-36470
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById. 2022-08-25 not yet calculated CVE-2022-36469
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Edit_BasicSSID. 2022-08-25 not yet calculated CVE-2022-36478
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function AddWlanMacList. 2022-08-25 not yet calculated CVE-2022-36477
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function AddMacList. 2022-08-25 not yet calculated CVE-2022-36475
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function WlanWpsSet. 2022-08-25 not yet calculated CVE-2022-36474
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G. 2022-08-25 not yet calculated CVE-2022-36473
MISC
h3c — b5_mini H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetMobileAPInfoById. 2022-08-25 not yet calculated CVE-2022-36472
MISC
h3c — gr-1200w H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function switch_debug_info_set. 2022-08-25 not yet calculated CVE-2022-37074
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList. 2022-08-25 not yet calculated CVE-2022-37070
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateOne2One. 2022-08-25 not yet calculated CVE-2022-37071
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateMacCloneFinal. 2022-08-25 not yet calculated CVE-2022-37068
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanLinkspyMulti. 2022-08-25 not yet calculated CVE-2022-37072
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanModeMulti. 2022-08-25 not yet calculated CVE-2022-37073
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanParamsMulti. 2022-08-25 not yet calculated CVE-2022-37067
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateSnat. 2022-08-25 not yet calculated CVE-2022-37069
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function AddWlanMacList. 2022-08-25 not yet calculated CVE-2022-36519
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateDDNS. 2022-08-25 not yet calculated CVE-2022-37066
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function EditWlanMacList. 2022-08-25 not yet calculated CVE-2022-36518
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function EditApAdvanceInfo. 2022-08-25 not yet calculated CVE-2022-36511
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function edditactionlist. 2022-08-25 not yet calculated CVE-2022-36513
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function addactionlist. 2022-08-25 not yet calculated CVE-2022-36515
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function ap_version_check. 2022-08-25 not yet calculated CVE-2022-36516
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function debug_wlan_advance. 2022-08-25 not yet calculated CVE-2022-36517
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function WanModeSetMultiWan. 2022-08-25 not yet calculated CVE-2022-36514
MISC
h3c — gr-1200w
 
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function DEleteusergroup. 2022-08-25 not yet calculated CVE-2022-36520
MISC
h3c — gr2200 H3C GR2200 MiniGR1A0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList. 2022-08-25 not yet calculated CVE-2022-36510
MISC
h3c — gr3200 H3C GR3200 MiniGR1B0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList. 2022-08-25 not yet calculated CVE-2022-36509
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPInfoById. 2022-08-25 not yet calculated CVE-2022-37097
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateMacClone. 2022-08-25 not yet calculated CVE-2022-37100
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateSnat. 2022-08-25 not yet calculated CVE-2022-37099
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateIpv6Params. 2022-08-25 not yet calculated CVE-2022-37098
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetMobileAPInfoById. 2022-08-25 not yet calculated CVE-2022-37087
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EnableIpv6. 2022-08-25 not yet calculated CVE-2022-37096
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function AddMacList. 2022-08-25 not yet calculated CVE-2022-37093
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateWanParams. 2022-08-25 not yet calculated CVE-2022-37095
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID. 2022-08-25 not yet calculated CVE-2022-37090
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G. 2022-08-25 not yet calculated CVE-2022-37094
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EditWlanMacList. 2022-08-25 not yet calculated CVE-2022-37091
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed. 2022-08-25 not yet calculated CVE-2022-37086
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById. 2022-08-25 not yet calculated CVE-2022-37092
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAP5GWifiById. 2022-08-25 not yet calculated CVE-2022-37088
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EditMacList. 2022-08-25 not yet calculated CVE-2022-37089
MISC
h3c — h200
 
H3C H200 H200V100R004 was discovered to contain a stack overflow via the AddWlanMacList function. 2022-08-25 not yet calculated CVE-2022-37085
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditMacList. 2022-08-25 not yet calculated CVE-2022-36490
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function DEleteusergroup. 2022-08-25 not yet calculated CVE-2022-36499
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EnableIpv6. 2022-08-25 not yet calculated CVE-2022-36489
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetAPInfoById. 2022-08-25 not yet calculated CVE-2022-36508
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function AddWlanMacList. 2022-08-25 not yet calculated CVE-2022-36507
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetMacAccessMode. 2022-08-25 not yet calculated CVE-2022-36506
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Edit_BasicSSID. 2022-08-25 not yet calculated CVE-2022-36504
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateMacClone. 2022-08-25 not yet calculated CVE-2022-36503
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateWanParams. 2022-08-25 not yet calculated CVE-2022-36502
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateSnat. 2022-08-25 not yet calculated CVE-2022-36501
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditWlanMacList. 2022-08-25 not yet calculated CVE-2022-36500
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EDitusergroup. 2022-08-25 not yet calculated CVE-2022-36505
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed. 2022-08-25 not yet calculated CVE-2022-36498
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetMobileAPInfoById. 2022-08-25 not yet calculated CVE-2022-36496
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function addactionlist. 2022-08-25 not yet calculated CVE-2022-36495
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function edditactionlist. 2022-08-25 not yet calculated CVE-2022-36494
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById. 2022-08-25 not yet calculated CVE-2022-36493
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function AddMacList. 2022-08-25 not yet calculated CVE-2022-36492
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateIpv6Params. 2022-08-25 not yet calculated CVE-2022-36491
MISC
h3c — magic_nx18_plus H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G. 2022-08-25 not yet calculated CVE-2022-36497
MISC
hdfgroup — hdf5 A heap-based buffer overflow vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-26061
MISC
hdfgroup — hdf5 An out-of-bounds write vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-25972
MISC
hdfgroup — hdf5 An out-of-bounds read vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-25942
MISC
honda — remote_keyless_entry_receiving_unit
 
The Remote Keyless Entry (RKE) receiving unit on certain Honda vehicles through 2018 allows remote attackers to perform unlock operations and force a resynchronization after capturing five consecutive valid RKE signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely. 2022-08-24 not yet calculated CVE-2022-37305
MISC
MISC
MISC
MISC
MISC
htmly — htmly
 
htmly v2.8.1 was discovered to contain an arbitrary file deletion vulnerability via the component viewsbackup.html.php. 2022-08-26 not yet calculated CVE-2021-40285
MISC
ibm — datapower_gateway
 
IBM DataPower Gateway V10CD, 10.0.1, and 2018.4.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 228357. 2022-08-26 not yet calculated CVE-2022-31773
XF
CONFIRM
ibm — maximo_asset_management IBM Maximo Asset Management 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231116. 2022-08-26 not yet calculated CVE-2022-35714
CONFIRM
XF
ibm — mq IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339. 2022-08-19 not yet calculated CVE-2022-22489
XF
CONFIRM
ibm — openbmc_op910_and_op940 IBM OPENBMC OP910 and OP940 could allow a privileged user to upload an improper site identity certificate that may cause it to lose network services. IBM X-Force ID: 207221. 2022-08-22 not yet calculated CVE-2021-29891
XF
CONFIRM
icewarp — lenovo_pcmanager A potential vulnerability was reported in Lenovo PCManager prior to version 5.0.10.4191 that may allow code execution when visiting a specially crafted website. 2022-08-23 not yet calculated CVE-2022-1513
MISC
icewarp — webclient_dc2 IceWarp WebClient DC2 – Update 2 Build 9 (13.0.2.9) was discovered to contain a SQL injection vulnerability via the search parameter at /webmail/server/webmail.php. 2022-08-23 not yet calculated CVE-2022-35115
MISC
MISC
imagemagick — imagemagick
 
A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks. 2022-08-26 not yet calculated CVE-2021-3574
MISC
MISC
MISC
imagemagick — imagemagick
 
An integer overflow issue was discovered in ImageMagick’s ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the ‘unsigned char’. When ImageMagick processes a crafted pdf file, this could lead to an undefined behaviour or a crash. 2022-08-25 not yet calculated CVE-2021-20224
MISC
MISC
MISC
ingredients_stock_management — ingredients_stock_management Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /items/view_item.php. 2022-08-25 not yet calculated CVE-2022-36701
MISC
jenkins — collabnet Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2022-08-23 not yet calculated CVE-2022-38665
CONFIRM
MLIST
jenkins — git Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding. 2022-08-23 not yet calculated CVE-2022-38663
CONFIRM
MLIST
jenkins — job_configuration_history Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names. 2022-08-23 not yet calculated CVE-2022-38664
CONFIRM
MLIST
jfinal_cms — jfinal_cms JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/user/list. 2022-08-23 not yet calculated CVE-2022-37199
MISC
jfinal_cms — jfinal_cms JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/role/list. 2022-08-23 not yet calculated CVE-2022-37223
MISC
jfinal_cms — jfinal_cms Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module. 2022-08-25 not yet calculated CVE-2022-36527
MISC
jizhicms — jizhicms An issue was discovered in jizhicms v2.3.1. There is a CSRF vulnerability that can add a admin. 2022-08-19 not yet calculated CVE-2022-36577
MISC
jizhicms — jizhicms jizhicms v2.3.1 has SQL injection in the background. 2022-08-19 not yet calculated CVE-2022-36578
MISC
jsonxx — jsonxx Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement. 2022-08-19 not yet calculated CVE-2022-23459
CONFIRM
jsonxx — jsonxx Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. This issue may lead to Denial of Service if the program using the jsonxx library crashes. This issue exists on the current commit of the jsonxx project and the project itself has been archived. Updates are not expected. Users are advised to find a replacement. 2022-08-19 not yet calculated CVE-2022-23460
CONFIRM
kensite_cms — kensite_cms
 
Kensite CMS v1.0 was discovered to contain multiple SQL injection vulnerabilities via the name and oldname parameters at /framework/mod/db/DBMapper.xml. 2022-08-26 not yet calculated CVE-2022-36529
MISC
MISC
laravel — laravel A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688. 2022-08-19 not yet calculated CVE-2022-2886
N/A
N/A
lexmark — multiple_products Various Lexmark products through 2022-04-27 allow External Control of a System or Configuration Setting because of Improper Input Validation. 2022-08-26 not yet calculated CVE-2022-29850
MISC
MISC
libarchive — libarchive An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system. 2022-08-23 not yet calculated CVE-2021-31566
MISC
MISC
MISC
MISC
libarchive — libarchive An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges. 2022-08-23 not yet calculated CVE-2021-23177
MISC
MISC
MISC
MISC
libpng — pngcheck A global buffer overflow was discovered in pngcheck function in pngcheck-2.4.0(5 patches applied) via a crafted png file. 2022-08-23 not yet calculated CVE-2020-35511
MISC
libpngs — pngimage.c A heap overflow flaw was found in libpngs’ pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service. 2022-08-24 not yet calculated CVE-2021-4214
MISC
MISC
MISC
MISC
library_management — library_management Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Textbook parameter at /admin/modify.php. 2022-08-25 not yet calculated CVE-2022-36721
MISC
library_management — library_management Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the ok parameter at /admin/history.php. 2022-08-25 not yet calculated CVE-2022-36719
MISC
library_management — library_management Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/modify1.php. 2022-08-25 not yet calculated CVE-2022-36720
MISC
library_management — library_management Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/changestock.php. 2022-08-25 not yet calculated CVE-2022-36716
MISC
library_management — library_management Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/search.php. 2022-08-25 not yet calculated CVE-2022-36715
MISC
linksys — mr8300_router
 
Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router’s web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0. 2022-08-24 not yet calculated CVE-2022-38132
MISC
linux — linux_kernel A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability. 2022-08-22 not yet calculated CVE-2021-3659
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information. 2022-08-23 not yet calculated CVE-2021-3736
MISC
MISC
MISC
linux — linux_kernel A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. 2022-08-23 not yet calculated CVE-2021-3759
MISC
MISC
MISC
linux — linux_kernel A flaw was found in the Linux kernel’s implementation of reading the SVC RDMA counters. Reading the counter sysctl panics the system. This flaw allows a local attacker with local access to cause a denial of service while the system reboots. The issue is specific to CentOS/RHEL. 2022-08-24 not yet calculated CVE-2021-4218
MISC
MISC
MISC
linux — linux_kernel A memory leak flaw was found in the Linux kernel’s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability. 2022-08-23 not yet calculated CVE-2021-3764
MISC
MISC
MISC
MISC
linux — linux_kernel An out-of-bounds (OOB) memory access flaw was found in the Linux kernel’s eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information. 2022-08-24 not yet calculated CVE-2021-4204
MISC
MISC
MISC
MISC
linux — linux_kernel An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system. 2022-08-22 not yet calculated CVE-2022-2873
MISC
linux — linux_kernel
 
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. 2022-08-24 not yet calculated CVE-2022-2978
MISC
linux — linux_kernel
 
A flaw in the Linux kernel’s implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. 2022-08-24 not yet calculated CVE-2021-4028
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A race condition was found in the Linux kernel’s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system. 2022-08-25 not yet calculated CVE-2022-2959
MISC
MISC
linux — linux_kernel
 
A heap-based buffer overflow was found in the Linux kernel’s LightNVM subsystem. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. This vulnerability allows a local attacker to escalate privileges and execute arbitrary code in the context of the kernel. The attacker must first obtain the ability to execute high-privileged code on the target system to exploit this vulnerability. 2022-08-25 not yet calculated CVE-2022-2991
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged. 2022-08-23 not yet calculated CVE-2021-3714
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV). 2022-08-26 not yet calculated CVE-2022-0171
MISC
MISC
MISC
linux — linux_kernel
 
A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system. 2022-08-26 not yet calculated CVE-2022-0168
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS. 2022-08-26 not yet calculated CVE-2021-3669
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A flaw was found in the Linux kernel’s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects. 2022-08-23 not yet calculated CVE-2022-2938
MISC
linux — linux_kernel
 
A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS. 2022-08-24 not yet calculated CVE-2021-4037
MISC
MISC
MISC
MISC
MISC
linux — linux_kernel
 
A vulnerability was found in the Linux kernel’s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. 2022-08-24 not yet calculated CVE-2021-4159
MISC
MISC
MISC
MISC
litejs — uri-template-lite An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the uri-template-lite npm package, when an attacker is able to supply arbitrary input to the “URI.expand” method 2022-08-24 not yet calculated CVE-2021-43309
MISC
logitech — streamlabs_desktop StreamLabs Desktop Application 1.9.0 is vulnerable to Incorrect Access Control via obs64.exe. An attacker can execute arbitrary code via a crafted .exe file. 2022-08-19 not yet calculated CVE-2022-36263
MISC
malighting — grandma2_light MA Lighting grandMA2 Light has a password of root for the root account. NOTE: The vendor’s position is that the product was designed for isolated networks. Also, the successor product, grandMA3, is not affected by this vulnerability. 2022-08-21 not yet calculated CVE-2022-30036
MISC
MISC
mapgis — igserver MapGIS IGServer 10.5.6.11 is vulnerable to Arbitrary file deletion. 2022-08-19 not yet calculated CVE-2022-36171
MISC
mapgis — igserver MapGIS 10.5 Pro IGServer has hardcoded credentials in the front-end and can lead to escalation of privileges and arbitrary file deletion. 2022-08-19 not yet calculated CVE-2022-36170
MISC
MISC
mariadb — mariadb
 
The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. 2022-08-27 not yet calculated CVE-2022-38792
MISC
MISC
MISC
MISC
mariadb — mariadb
 
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock. 2022-08-27 not yet calculated CVE-2022-38791
MISC
matrix — dendrite gomatrixserverlib is a Go library for matrix protocol federation. Dendrite is a Matrix homeserver written in Go, an alternative to Synapse. The power level parsing within gomatrixserverlib was failing to parse the `”events_default”` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases. Power levels are the matrix terminology for user access level. In rooms where the `”events_default”` power level had been changed, this could result in events either being incorrectly authorised or rejected by Dendrite servers. gomatrixserverlib contains a fix as of commit `723fd49` and Dendrite 0.9.3 has been updated accordingly. Matrix rooms where the `”events_default”` power level has not been changed from the default of zero are not vulnerable. Users are advised to upgrade. There are no known workarounds for this issue. 2022-08-19 not yet calculated CVE-2022-36009
MISC
MISC
CONFIRM
mazda — remote_keyless_entry_receiving_unit
 
The Remote Keyless Entry (RKE) receiving unit on certain Mazda vehicles through 2020 allows remote attackers to perform unlock operations and force a resynchronization after capturing three consecutive valid key-fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely. 2022-08-24 not yet calculated CVE-2022-36945
MISC
MISC
MISC
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the whitelist endpoint. 2022-08-25 not yet calculated CVE-2022-37243
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the data_leak_list_ajax endpoint. 2022-08-25 not yet calculated CVE-2022-37241
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to HTTP Response splitting via the format parameter. 2022-08-25 not yet calculated CVE-2022-37240
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the currentRequest parameter. 2022-08-25 not yet calculated CVE-2022-37238
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the rulles_list_ajax endpoint. 2022-08-25 not yet calculated CVE-2022-37239
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the Blacklist endpoint. 2022-08-25 not yet calculated CVE-2022-37245
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers
 
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to IFRAME Injectionvia the currentRequest parameter. after login leads to inject malicious tag leads to IFRAME injection. 2022-08-25 not yet calculated CVE-2022-37244
MISC
MISC
mdaemon_technologies — security_gateway_for_email_servers
 
MDaemon Technologies SecurityGateway for Email Servers 8.5.2, is vulnerable to HTTP Response splitting via the data parameter. 2022-08-25 not yet calculated CVE-2022-37242
MISC
MISC
mealie — mealie Mealie1.0.0beta3 does not terminate download tokens after a user logs out, allowing attackers to perform a man-in-the-middle attack via a crafted GET request. 2022-08-19 not yet calculated CVE-2022-34624
MISC
MISC
MISC
mealie — mealie Mealie 1.0.0beta3 was discovered to contain an Insecure Direct Object Reference (IDOR) vulnerability which allows attackers to modify user passwords and other attributes via modification of the user_id parameter. 2022-08-19 not yet calculated CVE-2022-34621
MISC
MISC
MISC
MISC
MISC
mealie — mealie Mealie 1.0.0beta3 employs weak password requirements which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. 2022-08-19 not yet calculated CVE-2022-34615
MISC
MISC
MISC
MISC
mealie — mealie Mealie1.0.0beta3 is vulnerable to user enumeration via timing response discrepancy between users and non-users when an invalid password message is displayed during an authentication attempt. 2022-08-19 not yet calculated CVE-2022-34623
MISC
MISC
MISC
MISC
mikrotik — routeros
 
The container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointing to symbolic links, which resolve to locations on the host device. This allows the attacker to mount any arbitrary file to any location on the host. 2022-08-25 not yet calculated CVE-2022-34960
MISC
MISC
mikrotik — routeros
 
Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet. 2022-08-26 not yet calculated CVE-2022-36522
MISC
mm-wiki — mm-wiki
 
mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor. 2022-08-26 not yet calculated CVE-2021-39393
MISC
mm-wiki — mm-wiki
 
mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information. 2022-08-26 not yet calculated CVE-2021-39394
MISC
mod_wsgi — mod_wsgi
 
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. 2022-08-25 not yet calculated CVE-2022-2255
MISC
MISC
MISC
mongoose — mongoose
 
Schema in lib/schema.js in Mongoose before 6.4.6 is vulnerable to prototype pollution. 2022-08-26 not yet calculated CVE-2022-24304
MISC
CONFIRM
CONFIRM
monospace — directus Directus is a free and open-source data platform for headless content management. The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. This vulnerability has been patched and release v9.15.0 contains the fix. Users are advised to upgrade. Users unable to upgrade may prevent this problem by making sure no (untrusted) non-admin users have permissions to update the `filename_disk` field on `directus_files`. 2022-08-19 not yet calculated CVE-2022-36031
CONFIRM
moveable_type — moveable_type
 
Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability. 2022-08-24 not yet calculated CVE-2022-38078
MISC
MISC
multiple_vendors — remote_keyless_entry_receiving_unit
 
The Remote Keyless Entry (RKE) receiving unit on certain Nissan, Kia, and Hyundai vehicles through 2017 allows remote attackers to perform unlock operations and force a resynchronization after capturing two consecutive valid key fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely. 2022-08-24 not yet calculated CVE-2022-37418
MISC
MISC
MISC
MISC
MISC
mumara_classic — mumara_classic Odyssey passes to client unencrypted bytes from man-in-the-middle When Odyssey storage is configured to use the PostgreSQL server using ‘trust’ authentication with a ‘clientcert’ requirement or to use ‘cert’ authentication, a man-in-the-middle attacker can inject false responses to the client’s first few queries. Despite the use of SSL certificate verification and encryption, Odyssey will pass these results to client as if they originated from valid server. This is similar to CVE-2021-23222 for PostgreSQL. 2022-08-25 not yet calculated CVE-2021-43767
MISC
MISC
mumara_classic — mumara_classic Odyssey passes to server unencrypted bytes from man-in-the-middle When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. This is similar to CVE-2021-23214 for PostgreSQL. 2022-08-25 not yet calculated CVE-2021-43766
MISC
MISC
mumara_classic — mumara_classic
 
A SQL injection vulnerability in license_update.php in Mumara Classic through 2.93 allows a remote unauthenticated attacker to execute arbitrary SQL commands via the license parameter. 2022-08-25 not yet calculated CVE-2021-43329
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
mupdf — mupdf A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream. 2022-08-26 not yet calculated CVE-2021-4216
MISC
MISC
myscada — mypro
 
An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system. 2022-08-24 not yet calculated CVE-2022-2234
CONFIRM
new_horizon_datasys — new_horizon_datasys_bootloader
 
A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media. 2022-08-26 not yet calculated CVE-2022-34302
MISC
MISC
node-opcua_project — node-opcua The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False. 2022-08-24 not yet calculated CVE-2022-24375
CONFIRM
CONFIRM
CONFIRM
CONFIRM
node-opcua_project — node-opcua The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. 2022-08-23 not yet calculated CVE-2022-21208
CONFIRM
CONFIRM
CONFIRM
CONFIRM
node-opcua — node-opcua The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit. 2022-08-23 not yet calculated CVE-2022-25231
CONFIRM
CONFIRM
CONFIRM
nortek_control — linear_emerge_devices
 
Nortek Linear eMerge E3-Series devices through 0.32-09c place admin credentials in /test.txt that allow an attacker to open a building’s doors. (This occurs in situations where the CVE-2019-7271 default credentials have been changed.) 2022-08-25 not yet calculated CVE-2022-31269
MISC
MISC
MISC
MISC
nortek_control — linear_emerge_devices
 
Nortek Linear eMerge E3-Series 0.32-07p devices are vulnerable to /card_scan.php?CardFormatNo= XSS with session fixation (via PHPSESSID) when they are chained together. This would allow an attacker to take over an admin account or a user account. 2022-08-25 not yet calculated CVE-2022-31798
MISC
MISC
MISC
nortek_control — linear_emerge_devices
 
Nortek Linear eMerge E3-Series devices before 0.32-08f allow an unauthenticated attacker to inject OS commands via ReaderNo. NOTE: this issue exists because of an incomplete fix for CVE-2019-7256. 2022-08-25 not yet calculated CVE-2022-31499
MISC
MISC
MISC
notrinos — notrinoserp Improper Restriction of Rendered UI Layers or Frames in GitHub repository notrinos/notrinoserp prior to 0.7. 2022-08-23 not yet calculated CVE-2022-2965
MISC
CONFIRM
notrinos — notrinoserp Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository notrinos/notrinoserp prior to v0.7. This results in privilege escalation to a system administrator account. An attacker can gain access to protected functionality such as create/update companies, install/update languages, install/activate extensions, install/activate themes and other permissive actions. 2022-08-21 not yet calculated CVE-2022-2921
MISC
CONFIRM
notrinos — notrinoserp Weak Password Requirements in GitHub repository notrinos/notrinoserp prior to 0.7. 2022-08-22 not yet calculated CVE-2022-2927
CONFIRM
MISC
noxen — noxen A vulnerability classified as problematic has been found in ConsoleTVs Noxen. Affected is an unknown function of the file /Noxen-master/users.php. The manipulation of the argument create_user_username with the input “><script>alert(/xss/)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-207000. 2022-08-23 not yet calculated CVE-2022-2956
MISC
MISC
octoprint — octoprint Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3. 2022-08-22 not yet calculated CVE-2022-2930
CONFIRM
MISC
online_diagnostic_lab_management_system — online_diagnostic_lab_management_system An issue was discovered in Online Diagnostic Lab Management System 1.0, There is a SQL injection vulnerability via “dob” parameter in “/classes/Users.php?f=save_client” 2022-08-26 not yet calculated CVE-2022-37152
MISC
MISC
online_diagnostic_lab_management_system — online_diagnostic_lab_management_system There is an unauthorized access vulnerability in Online Diagnostic Lab Management System 1.0. 2022-08-26 not yet calculated CVE-2022-37151
MISC
MISC
online_diagnostic_lab_management_system — online_diagnostic_lab_management_system An issue was discovered in Online Diagnostic Lab Management System 1.0. There is a stored XSS vulnerability via firstname, address, middlename, lastname , gender, email, contact parameters. 2022-08-26 not yet calculated CVE-2022-37150
MISC
MISC
opc_ua_stack — opc_ua_stack All versions of package asneg/opcuastack are vulnerable to Denial of Service (DoS) due to a missing handler for failed casting when unvalidated data is forwarded to boost::get function in OpcUaNodeIdBase.h. Exploiting this vulnerability is possible when sending a specifically crafted OPC UA message with a special encoded NodeId. 2022-08-23 not yet calculated CVE-2022-25302
CONFIRM
opcfoundation — ua_.net_standard_reference_server OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information. 2022-08-23 not yet calculated CVE-2022-33916
MISC
MISC
opcua-asyncio — opcua-asyncio All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. 2022-08-23 not yet calculated CVE-2022-25304
CONFIRM
CONFIRM
CONFIRM
opcua — opcua The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed. 2022-08-24 not yet calculated CVE-2022-25903
CONFIRM
CONFIRM
CONFIRM
opcua — opcua The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. 2022-08-23 not yet calculated CVE-2022-25888
CONFIRM
CONFIRM
CONFIRM
open62541 — open62541 The package open62541/open62541 before 1.2.5, from 1.3-rc1 and before 1.3.1 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk. 2022-08-23 not yet calculated CVE-2022-25761
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
openexr — openexr A flaw was found in OpenEXR’s B44Compressor. This flaw allows an attacker who can submit a crafted file to be processed by OpenEXR, to exhaust all memory accessible to the application. The highest threat from this vulnerability is to system availability. 2022-08-23 not yet calculated CVE-2021-20298
MISC
MISC
MISC
MISC
MISC
openexr — openexr A flaw was found in OpenEXR’s hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability. 2022-08-23 not yet calculated CVE-2021-20304
MISC
MISC
MISC
MISC
MISC
openvswitch — openvswitch A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. 2022-08-23 not yet calculated CVE-2021-3905
MISC
MISC
MISC
MISC
MISC
oretnom23 — fast_food_ordering_system A vulnerability was found in oretnom23 Fast Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file ffos/admin/reports/index.php. The manipulation of the argument date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207422 is the identifier assigned to this vulnerability. 2022-08-27 not yet calculated CVE-2022-3012
N/A
N/A
oretnom23 — fast_food_ordering_system A vulnerability, which was classified as problematic, has been found in oretnom23 Fast Food Ordering System. This issue affects some unknown processing of the file admin/?page=reports. The manipulation of the argument date leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-207425 was assigned to this vulnerability. 2022-08-27 not yet calculated CVE-2022-3015
N/A
parity — frontier Frontier is Substrate’s Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. There are currently no known workarounds. 2022-08-19 not yet calculated CVE-2022-36008
MISC
MISC
CONFIRM
pega — pega_platform Pega Platform from 8.5.4 to 8.7.3 is affected by an XSS issue with an unauthenticated user and the redirect parameter. 2022-08-22 not yet calculated CVE-2022-35654
MISC
pega — pega_platform Pega Platform from 8.3 to 8.7.3 vulnerability may allow authenticated security administrators to alter CSRF settings directly. 2022-08-22 not yet calculated CVE-2022-35656
MISC
pega — pega_platform Pega Platform from 7.3 to 8.7.3 is affected by an XSS issue due to a misconfiguration of a datapage setting. 2022-08-22 not yet calculated CVE-2022-35655
MISC
pimcore — pimcore Cross-site Scripting (XSS) – Stored in GitHub repository pimcore/pimcore prior to 10.5.4. 2022-08-23 not yet calculated CVE-2022-2796
MISC
CONFIRM
planex — mzk-dp150n Insecure Permissions in administration interface in Planex MZK-DP150N 1.42 and 1.43 allows attackers to execute system command as root via etc_ro/web/syscmd.asp. 2022-08-22 not yet calculated CVE-2021-37289
MISC
MISC
MISC
powerdns — recursor PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties. 2022-08-23 not yet calculated CVE-2022-37428
MISC
MISC
printerlogic — printerlogic
 
PrinterLogic Windows Client through 25.0.0.676 allows attackers to execute directory traversal. Authenticated users with prior knowledge of the driver filename could exploit this to escalate privileges or distribute malicious content. 2022-08-25 not yet calculated CVE-2022-32427
MISC
MISC
project-nexus — project-nexus Project-nexus is a general-purpose blog website framework. Affected versions are subject to SQL injection due to a lack of sensitization of user input. This issue has not yet been patched. Users are advised to restrict user input and to upgrade when a new release becomes available. 2022-08-20 not yet calculated CVE-2022-36030
CONFIRM
prosody — prosody
 
It was discovered that an internal Prosody library to load XML based on libexpat does not properly restrict the XML features allowed in parsed XML data. Given suitable attacker input, this results in expansion of recursive entity references from DTDs (CWE-776). In addition, depending on the libexpat version used, it may also allow injections using XML External Entity References (CWE-611). 2022-08-26 not yet calculated CVE-2022-0217
MISC
MISC
MISC
pukiwiki — pukiwiki Path traversal vulnerability in PukiWiki versions 1.4.5 to 1.5.3 allows a remote authenticated attacker with an administrative privilege to execute a malicious script via unspecified vectors. 2022-08-23 not yet calculated CVE-2022-34486
MISC
MISC
pukiwiki — pukiwiki Stored cross-site scripting vulnerability in PukiWiki versions 1.3.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors. 2022-08-23 not yet calculated CVE-2022-36350
MISC
MISC
pukiwiki — pukiwiki Reflected cross-site scripting vulnerability in PukiWiki versions 1.5.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors. 2022-08-23 not yet calculated CVE-2022-27637
MISC
MISC
python — python A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible. 2022-08-24 not yet calculated CVE-2021-4189
MISC
MISC
MISC
MISC
MISC
MISC
qt — qt A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability. 2022-08-22 not yet calculated CVE-2021-3481
MISC
MISC
MISC
MISC
radare — radare2 An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack. 2022-08-19 not yet calculated CVE-2020-27793
MISC
MISC
radare — radare2 A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command “adf” has no or wrong argument, anal_fcn_data (core, input + 1) –> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn). 2022-08-19 not yet calculated CVE-2020-27795
MISC
MISC
MISC
radare — radare2 A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash. 2022-08-19 not yet calculated CVE-2020-27794
MISC
MISC
redhat — amq_broker A flaw was found in the Red Hat AMQ Broker management console in version 7.8 where an existing user is able to access some limited information even when the role the user is assigned to should not be allow access to the management console. The main impact is to confidentiality as this flaw means some role bindings are incorrectly checked, some privileged meta information such as queue names and configuration details are disclosed but the impact is limited as not all information is accessible and there is no affect to integrity. 2022-08-23 not yet calculated CVE-2021-3763
MISC
MISC
MISC
redhat — amq_broker
 
A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulnerability is system availability. 2022-08-24 not yet calculated CVE-2021-4040
MISC
MISC
MISC
MISC
redhat — ansible-runner A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner’s private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality. 2022-08-23 not yet calculated CVE-2021-3702
MISC
MISC
MISC
redhat — ansible-runner
 
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host’s shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment. 2022-08-24 not yet calculated CVE-2021-4041
MISC
MISC
MISC
redhat — ansible-tower
 
A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment. 2022-08-25 not yet calculated CVE-2021-4112
MISC
MISC
redhat — ansible_runner A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity. 2022-08-23 not yet calculated CVE-2021-3701
MISC
MISC
MISC
MISC
redhat — ceph_storage
 
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks. 2022-08-25 not yet calculated CVE-2021-3979
MISC
MISC
MISC
MISC
MISC
redhat — classloader
 
ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available. 2022-08-26 not yet calculated CVE-2021-3856
MISC
MISC
MISC
MISC
MISC
redhat — coreos-installer A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality. 2022-08-23 not yet calculated CVE-2021-3917
MISC
MISC
MISC
MISC
redhat — cryptsetup
 
It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium. 2022-08-24 not yet calculated CVE-2021-4122
MISC
MISC
MISC
MISC
MISC
redhat — dpdk_vhost_library A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability. 2022-08-23 not yet calculated CVE-2021-3839
MISC
MISC
MISC
redhat — enterprise
 
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-26 not yet calculated CVE-2021-35939
MISC
MISC
MISC
MISC
MISC
redhat — fabric_8_kubernetes_client A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML. 2022-08-24 not yet calculated CVE-2021-4178
MISC
MISC
MISC
MISC
redhat — foreman A flaw was found in Foreman project. A credential leak was identified which will expose Azure Compute Profile password through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-22 not yet calculated CVE-2021-3590
MISC
MISC
redhat — foreman
 
A flaw was found in the Foreman project. The Datacenter plugin exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-26 not yet calculated CVE-2021-20260
MISC
MISC
redhat — glib
 
A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition. 2022-08-23 not yet calculated CVE-2021-3800
MISC
MISC
MISC
MISC
redhat — gnutls A NULL pointer dereference flaw was found in GnuTLS. As Nettle’s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances. 2022-08-24 not yet calculated CVE-2021-4209
MISC
MISC
MISC
MISC
MISC
redhat — jboss_core_services_http_server
 
A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3688
MISC
MISC
redhat — jss A flaw was found in JSS, where it did not properly free up all memory. Over time, the wasted memory builds up in the server memory, saturating the server’s RAM. This flaw allows an attacker to force the invocation of an out-of-memory process, causing a denial of service. 2022-08-24 not yet calculated CVE-2021-4213
MISC
MISC
MISC
MISC
MISC
redhat — keycloak A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality. 2022-08-22 not yet calculated CVE-2021-3513
MISC
MISC
redhat — keycloak A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity. 2022-08-23 not yet calculated CVE-2020-35509
MISC
redhat — keycloak
 
A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow. 2022-08-26 not yet calculated CVE-2021-3632
MISC
MISC
MISC
MISC
MISC
redhat — keycloak
 
A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack. 2022-08-26 not yet calculated CVE-2022-0225
MISC
MISC
redhat — keycloak
 
A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password. 2022-08-26 not yet calculated CVE-2021-3754
MISC
MISC
redhat — libvirt A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash. 2022-08-23 not yet calculated CVE-2021-3975
MISC
MISC
MISC
MISC
redhat — opencryptoki
 
A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH public data. This may allow a malicious user to extract the private key by performing an invalid curve attack. 2022-08-23 not yet calculated CVE-2021-3798
MISC
MISC
MISC
MISC
redhat — openshift_api_management A flaw was found in the Red Hat OpenShift API Management product. User input is not validated allowing an authenticated user to inject scripts into some text boxes leading to a XSS attack. The highest threat from this vulnerability is to data confidentiality. 2022-08-22 not yet calculated CVE-2021-3442
MISC
MISC
redhat — openshift_container_platform A flaw was found in cluster-ingress-operator. A change to how the router-default service allows only certain IP source ranges could allow an attacker to access resources that would otherwise be restricted to specified IP ranges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.. 2022-08-22 not yet calculated CVE-2020-27836
MISC
MISC
MISC
MISC
redhat — openshift_metering_hive_container It was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6. 2022-08-24 not yet calculated CVE-2021-4125
MISC
MISC
MISC
MISC
MISC
MISC
MISC
redhat — openshift_service_mesh A flaw was found in servicemesh-operator. The NetworkPolicy resources installed for Maistra do not properly specify which ports may be accessed, allowing access to all ports on these resources from any pod. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-22 not yet calculated CVE-2021-3586
MISC
MISC
redhat — openstack-keystone
 
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3563
MISC
MISC
MISC
MISC
redhat — openstack-tripleo-heate-templates
 
A flaw was found in openstack-tripleo-heat-templates. Plain passwords from RHSM exist in the logs during OSP13 deployment with subscription-manager. 2022-08-26 not yet calculated CVE-2021-3585
MISC
MISC
MISC
MISC
MISC
redhat — qemu
 
A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. 2022-08-24 not yet calculated CVE-2021-4158
MISC
MISC
MISC
MISC
MISC
redhat — qemu
 
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host. 2022-08-25 not yet calculated CVE-2021-3929
MISC
MISC
MISC
MISC
MISC
redhat — qemu
 
A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. 2022-08-26 not yet calculated CVE-2021-3735
MISC
MISC
MISC
redhat — rpm
 
A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-25 not yet calculated CVE-2021-35937
MISC
MISC
MISC
MISC
redhat — rpm
 
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2022-08-25 not yet calculated CVE-2021-35938
MISC
MISC
MISC
MISC
MISC
MISC
redhat — satellite
 
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin. 2022-08-24 not yet calculated CVE-2021-4142
MISC
MISC
MISC
MISC
MISC
redhat — satellite
 
A flaw was found in satellite. When giving granular permission related to the organization, other permissions allowing a user to view and manage other organizations are also granted. The highest threat from this vulnerability is to data confidentiality. 2022-08-26 not yet calculated CVE-2021-3414
MISC
MISC
redhat — serverless_and_serverless_client_kn
 
It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless 1.16.0 and Serverless client kn 1.16.0. These have been fixed with Serverless 1.17.0. 2022-08-26 not yet calculated CVE-2021-3703
MISC
MISC
redhat — single_sign-on A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user’s credentials. The highest threat from this vulnerability is to confidentiality and integrity. 2022-08-23 not yet calculated CVE-2021-3827
MISC
MISC
MISC
MISC
redhat — smallrye_health_metrics
 
It was found that the smallrye health metrics UI component did not properly sanitize some user inputs. An attacker could use this flaw to conduct cross-site scripting attacks. 2022-08-25 not yet calculated CVE-2021-3914
MISC
MISC
redhat — sox
 
A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function lsx_read_w_buf() in formats_i.c file. The vulnerability is exploitable with a crafted file, that could cause an application to crash. 2022-08-25 not yet calculated CVE-2021-23159
MISC
MISC
MISC
MISC
redhat — sox
 
A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash. 2022-08-25 not yet calculated CVE-2021-23172
MISC
MISC
MISC
MISC
redhat — sox
 
A floating point exception (divide-by-zero) issue was discovered in SoX in functon startread() of wav.c file. An attacker with a crafted wav file, could cause an application to crash. 2022-08-25 not yet calculated CVE-2021-33844
MISC
MISC
MISC
MISC
redhat — sox
 
A floating point exception (divide-by-zero) issue was discovered in SoX in functon read_samples() of voc.c file. An attacker with a crafted file, could cause an application to crash. 2022-08-25 not yet calculated CVE-2021-23210
MISC
MISC
MISC
MISC
redhat — suid_binary
 
A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges. 2022-08-26 not yet calculated CVE-2021-3864
MISC
MISC
MISC
MISC
MISC
MISC
MISC
redhat — undertow A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability. 2022-08-23 not yet calculated CVE-2021-3690
MISC
MISC
MISC
MISC
redhat — undertow
 
A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks. 2022-08-26 not yet calculated CVE-2021-3859
MISC
MISC
MISC
MISC
MISC
redhat — unzip
 
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution. 2022-08-24 not yet calculated CVE-2021-4217
MISC
MISC
MISC
redhat — vdsm
 
A race condition was found in vdsm. Functionality to obfuscate sensitive values in log files that may lead to values being stored in clear text. 2022-08-26 not yet calculated CVE-2022-0207
MISC
MISC
MISC
MISC
MISC
redhat — wildfly-core
 
A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity. 2022-08-26 not yet calculated CVE-2021-3644
MISC
MISC
MISC
MISC
MISC
MISC
redhat — xfs_filesystem
 
A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them. 2022-08-24 not yet calculated CVE-2021-4155
MISC
MISC
MISC
MISC
MISC
redhat — xnio A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. 2022-08-26 not yet calculated CVE-2022-0084
MISC
MISC
MISC
MISC
redhat — qemu
 
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. 2022-08-26 not yet calculated CVE-2022-0216
MISC
MISC
MISC
MISC
MISC
rhonabwy — rhonabwy Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn’t check the RSA private key length before RSA-OAEP decryption. This allows attackers to cause a Denial of Service via a crafted JWE (JSON Web Encryption) token. 2022-08-20 not yet calculated CVE-2022-38493
MISC
rizin — rizin
 
A vulnerability was found in rizin. The bug involves an ELF64 binary for the HPPA architecture. When a specially crafted binarygets analysed by rizin, it causes rizin to crash by freeing an uninitialized (and potentially user controlled, depending on the build) memory address. 2022-08-25 not yet calculated CVE-2021-4022
MISC
rockwellautomation — isagraf_workbench Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful. 2022-08-25 not yet calculated CVE-2022-2463
MISC
rockwellautomation — isagraf_workbench Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful. 2022-08-25 not yet calculated CVE-2022-2464
MISC
rockwellautomation — isagraf_workbench Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. 2022-08-25 not yet calculated CVE-2022-2465
MISC
rpm — rpm There is a flaw in RPM’s signature functionality. OpenPGP subkeys are associated with a primary key via a “binding signature.” RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources. 2022-08-22 not yet calculated CVE-2021-3521
MISC
MISC
MISC
MISC
rubrik — rubrik_cdm A buffer overflow vulnerability in the Rubrik Backup Service (RBS) Agent for Linux or Unix-based systems in Rubrik CDM 7.0.1, 7.0.1-p1, 7.0.1-p2 or 7.0.1-p3 before CDM 7.0.2-p2 could allow a local attacker to obtain root privileges by sending a crafted message to the RBS agent. 2022-08-26 not yet calculated CVE-2022-30984
MISC
MISC
ruoyi — ruoyi
 
RuoYi v3.8.3 has a Weak password vulnerability in the management system. 2022-08-25 not yet calculated CVE-2022-37158
MISC
samba — samba A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl. 2022-08-25 not yet calculated CVE-2022-32746
MISC
samba — samba A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault. 2022-08-25 not yet calculated CVE-2022-32745
MISC
samba — samba A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users’ passwords, enabling full domain takeover. 2022-08-25 not yet calculated CVE-2022-32744
MISC
samba — samba A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share. 2022-08-23 not yet calculated CVE-2021-20316
MISC
MISC
MISC
MISC
MISC
samba — samba A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer). 2022-08-25 not yet calculated CVE-2022-32742
MISC
samba — samba
 
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other’s tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services. 2022-08-25 not yet calculated CVE-2022-2031
MISC
samba — samba
 
MaxQueryDuration not honoured in Samba AD DC LDAP 2022-08-23 not yet calculated CVE-2021-3670
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
schroot — schroot Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session. 2022-08-27 not yet calculated CVE-2022-2787
MISC
MISC
MISC
servicenow — servicenow ServiceNow through San Diego Patch 3 allows XSS via the name field during creation of a new dashboard for the Performance Analytics dashboard. 2022-08-23 not yet calculated CVE-2022-38172
CONFIRM
servicenow — servicenow ServiceNow through San Diego Patch 4b and Patch 6 allows reflected XSS in the logout functionality. 2022-08-23 not yet calculated CVE-2022-38463
CONFIRM
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_schedule. 2022-08-26 not yet calculated CVE-2022-36680
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user. 2022-08-26 not yet calculated CVE-2022-36679
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_payment. 2022-08-26 not yet calculated CVE-2022-36683
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_account. 2022-08-26 not yet calculated CVE-2022-36681
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_item. 2022-08-25 not yet calculated CVE-2022-36693
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_stockin. 2022-08-25 not yet calculated CVE-2022-36695
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_waste. 2022-08-25 not yet calculated CVE-2022-36697
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/view_category.php. 2022-08-25 not yet calculated CVE-2022-36698
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /categories/manage_category.php. 2022-08-25 not yet calculated CVE-2022-36699
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /items/manage_item.php. 2022-08-25 not yet calculated CVE-2022-36700
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /stocks/manage_stockin.php. 2022-08-25 not yet calculated CVE-2022-36703
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_category. 2022-08-25 not yet calculated CVE-2022-36692
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_student. 2022-08-26 not yet calculated CVE-2022-36682
MISC
simple_task_scheduling_system — simple_task_scheduling_system Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_stockout. 2022-08-25 not yet calculated CVE-2022-36696
MISC
simple_task_scheduling_system — simple_task_scheduling_system Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_category. 2022-08-26 not yet calculated CVE-2022-36678
MISC
siteservercms — siteservercms SiteServerCMS 5.X has a Remote-download-Getshell-vulnerability via /SiteServer/Ajax/ajaxOtherService.aspx. 2022-08-26 not yet calculated CVE-2022-36226
MISC
MISC
sonic_wall — sma100
 
A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions. 2022-08-26 not yet calculated CVE-2022-2915
CONFIRM
sourcecodester — gym_management A vulnerability classified as critical has been found in SourceCodester Gym Management System. This affects an unknown part of the file login.php. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-206451. 2022-08-22 not yet calculated CVE-2022-2842
MISC
MISC
sourcecodester — simple_and_nice_shopping_cart_script A vulnerability classified as critical was found in SourceCodester Simple and Nice Shopping Cart Script. Affected by this vulnerability is an unknown functionality of the file /mkshop/Men/profile.php. The manipulation of the argument mem_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207001 was assigned to this vulnerability. 2022-08-25 not yet calculated CVE-2022-2957
N/A
N/A
sourcecodester — simple_and_nice_shopping_cart_script A vulnerability was found in SourceCodester Simple and Nice Shopping Cart Script. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /mkshop/Men/profile.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206845 was assigned to this vulnerability. 2022-08-20 not yet calculated CVE-2022-2909
MISC
MISC
sourcecodester — simple_task_managing_system A vulnerability classified as problematic was found in SourceCodester Simple Task Managing System. This vulnerability affects unknown code. The manipulation of the argument student_add leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-207424. 2022-08-27 not yet calculated CVE-2022-3014
N/A
N/A
sourcecodester — simple_task_managing_system A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423. 2022-08-27 not yet calculated CVE-2022-3013
N/A
sqlite — sqlite
 
An issue was found in fts5UnicodeTokenize() in ext/fts5/fts5_tokenize.c in Sqlite. A unicode61 tokenizer configured to treat unicode “control-characters” (class Cc), was treating embedded nul characters as tokens. The issue was fixed in sqlite-3.34.0 and later. 2022-08-25 not yet calculated CVE-2021-20223
MISC
MISC
MISC
stormshield — network_security Flooding SNS firewall 3.7.0 to 3.7.26 with udp or icmp randomizing the source through an internal to internal or external to internal interfaces will lead the firewall to overwork. It will consume 100% CPU, 100 RAM and won’t be available and can crash. 2022-08-24 not yet calculated CVE-2022-27812
MISC
symantec — multiple_products
 
A malicious unauthorized PAM user can access the administration configuration data and change the values. 2022-08-26 not yet calculated CVE-2022-25625
MISC
systemd — systemd A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp. 2022-08-23 not yet calculated CVE-2021-3997
MISC
MISC
MISC
MISC
tabit_technologies — tabit Tabit – password enumeration. Description: Tabit – password enumeration. The passwords for the Tabit system is a 4 digit OTP. One can resend OTP and try logging in indefinitely. Once again, this is an example of OWASP: API4 – Rate limiting. 2022-08-22 not yet calculated CVE-2022-34772
MISC
tabit_technologies — tabit Tabit – HTTP Method manipulation. https://bridge.tabit.cloud/configuration/addresses-query – can be POST-ed to add addresses to the DB. This is an example of OWASP:API8 – Injection. 2022-08-22 not yet calculated CVE-2022-34773
MISC
tabit_technologies — tabit Tabit – Arbitrary account modification. One of the endpoints mapped by the tiny URL, was a page where an adversary can modify personal details, such as email addresses and phone numbers of a specific user in a restaurant’s loyalty program. Possibly allowing account takeover (the mail can be used to reset password). 2022-08-22 not yet calculated CVE-2022-34774
MISC
tabit_technologies — tabit Tabit – Excessive data exposure. Another endpoint mapped by the tiny url, was one for reservation cancellation, containing the MongoDB ID of the reservation, and organization. This can be used to query the http://tgm-api.tabit.cloud/rsv/management/{reservationId}?organization={orgId} API which returns a lot of data regarding the reservation (OWASP: API3): Name, mail, phone number, the number of visits of the user to this specific restaurant, the money he spent there, the money he spent on alcohol, whether he left a deposit etc. This information can easily be used for a phishing attack. 2022-08-22 not yet calculated CVE-2022-34775
MISC
tabit_technologies — tabit Tabit – giftcard stealth. Several APIs on the web system display, without authorization, sensitive information such as health statements, previous bills in a specific restaurant, alcohol consumption and smoking habits. Each of the described APIs, has in its URL one or more MongoDB ID which is not so simple to enumerate. However, they each receive a ‘tiny URL’ in tabits domain, in the form of https://tbit.be/{suffix} with suffix being a 5 character long string containing numbers, lower and upper case letters. It is not so simple to enumerate them all, but really easy to find some that work and lead to a personal endpoint. Furthermore, the redirect URL disclosed the MongoDB IDs discussed above, and we could use them to query other endpoints disclosing more personal information. 2022-08-22 not yet calculated CVE-2022-34776
MISC
tabit_technologies — tabit Tabit – sensitive information disclosure. Several APIs on the web system display, without authorization, sensitive information such as health statements, previous bills in a specific restaurant, alcohol consumption and smoking habits. Each of the described API’s, has in its URL one or more MongoDB ID which is not so simple to enumerate. However, they each receive a ‘tiny URL’ in Tabit’s domain, in the form of https://tbit.be/{suffix} with suffix being a 5 characters long string containing numbers, lower- and upper-case letters. It is not so simple to enumerate them all, but really easy to find some that work and lead to a personal endpoint. This is both an example of OWASP: API4 – rate limiting and OWASP: API1 – Broken object level authorization. Furthermore, the redirect URL disclosed the MongoDB IDs discussed above, and we could use them to query other endpoints disclosing more personal information. For example: The URL https://tabitisrael.co.il/online-reservations/health-statement?orgId={org_id}&healthStatementId={health_statement_id} is used to invite friends to fill a health statement before attending the restaurant. We can use the health_statement_id to access the https://tgm-api.tabit.cloud/health-statement/{health_statement_id} API which disclose medical information as well as id number. 2022-08-22 not yet calculated CVE-2022-34770
MISC
tabit_technologies — tabit Tabit – arbitrary SMS send on Tabits behalf. The resend OTP API of tabit allows an adversary to send messages on tabits behalf to anyone registered on the system – the API receives the parameters: phone number, and CustomMessage, We can use that API to craft malicious messages to any user of the system. In addition, the API probably has some kind of template injection potential. When entering {{OTP}} in the custom message field it is formatted into an OTP. 2022-08-22 not yet calculated CVE-2022-34771
MISC
taogogo — taocms An arbitrary file deletion vulnerability was discovered in taocms 3.0.2, that allows attacker to delete file in server when request url admin.php?action=file&ctrl=del&path=/../../../test.txt 2022-08-23 not yet calculated CVE-2022-36261
MISC
MISC
tcpdump — tcpdump
 
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463. 2022-08-27 not yet calculated CVE-2019-15167
CONFIRM
teleport — teleport
 
Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This is fully unauthenticated attack utilizing the trusted teleport server to deliver the payload. 2022-08-24 not yet calculated CVE-2022-36633
MISC
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter at the function setSmartPowerManagement. 2022-08-25 not yet calculated CVE-2022-37799
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the list parameter at the function fromSetRouteStatic. 2022-08-25 not yet calculated CVE-2022-37800
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the list parameter at the function formSetQosBand. 2022-08-25 not yet calculated CVE-2022-37801
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the list parameter at the function formSetVirtualSer. 2022-08-25 not yet calculated CVE-2022-37798
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromNatStaticSetting. 2022-08-25 not yet calculated CVE-2022-37802
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the firewallEn parameter in the function formSetFirewallCfg. 2022-08-25 not yet calculated CVE-2022-37812
MISC
tenda — ac1206 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the function fromSetIpMacBind. 2022-08-25 not yet calculated CVE-2022-37817
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromSetIpMacBind. 2022-08-25 not yet calculated CVE-2022-37816
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the PPPOEPassword parameter in the function formQuickIndex. 2022-08-25 not yet calculated CVE-2022-37815
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain multiple stack overflows via the deviceMac and the device_id parameters in the function addWifiMacFilter. 2022-08-25 not yet calculated CVE-2022-37814
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromSetSysTime. 2022-08-25 not yet calculated CVE-2022-37813
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the startIp parameter in the function formSetPPTPServer. 2022-08-25 not yet calculated CVE-2022-37811
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo. 2022-08-25 not yet calculated CVE-2022-37804
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a command injection vulnerability via the mac parameter in the function formWriteFacMac. 2022-08-25 not yet calculated CVE-2022-37810
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the speed_dir parameter in the function formSetSpeedWan. 2022-08-25 not yet calculated CVE-2022-37809
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the index parameter in the function formWifiWpsOOB. 2022-08-25 not yet calculated CVE-2022-37808
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function formSetClientState. 2022-08-25 not yet calculated CVE-2022-37807
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromDhcpListClient. 2022-08-25 not yet calculated CVE-2022-37806
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromWizardHandle. 2022-08-25 not yet calculated CVE-2022-37805
MISC
tenda — ac1206 Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromAddressNat. 2022-08-25 not yet calculated CVE-2022-37803
MISC
tenda — ac15_firmware Tenda ac15 firmware V15.03.05.18 httpd server has stack buffer overflow in /goform/formWifiBasicSet. 2022-08-19 not yet calculated CVE-2022-37175
MISC
MISC
tenda — ac18 Tenda-AC18 V15.03.05.05 was discovered to contain a remote command execution (RCE) vulnerability. 2022-08-19 not yet calculated CVE-2022-35201
MISC
MISC
MISC
tenda — ax12 Tenda AX12 V22.03.01.21_CN is vulnerable to Buffer Overflow. This overflow is triggered in the sub_42FDE4 function, which satisfies the request of the upper-level interface function sub_430124, that is, handles the post request under /goform/SetIpMacBind. 2022-08-25 not yet calculated CVE-2022-37292
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the ProvinceCode parameter in the function formSetProvince. 2022-08-25 not yet calculated CVE-2022-37821
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGusetBasic. 2022-08-25 not yet calculated CVE-2022-37824
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the timezone parameter in the function fromSetSysTime. 2022-08-25 not yet calculated CVE-2022-37819
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the ddnsEn parameter in the function formSetSysToolDDNS. 2022-08-25 not yet calculated CVE-2022-37820
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the list parameter at the function formSetQosBand. 2022-08-25 not yet calculated CVE-2022-37818
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the function fromSetRouteStatic. 2022-08-25 not yet calculated CVE-2022-37822
MISC
tenda — ax1803 Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function formSetVirtualSer. 2022-08-25 not yet calculated CVE-2022-37823
MISC
totolink — a3600r TOTOLink A3600R V4.1.2cu.5182_B20201102 was discovered to contain a command injection vulnerability via the username parameter in /cstecgi.cgi. 2022-08-25 not yet calculated CVE-2022-36455
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the pppoeUser parameter. 2022-08-25 not yet calculated CVE-2022-36465
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules. 2022-08-25 not yet calculated CVE-2022-36464
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-36463
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the lang parameter in the function setLanguageCfg. 2022-08-25 not yet calculated CVE-2022-36462
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg. 2022-08-25 not yet calculated CVE-2022-36461
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the FileName parameter in the function UploadFirmwareFile. 2022-08-25 not yet calculated CVE-2022-36460
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the ip parameter in the function setDiagnosisCfg. 2022-08-25 not yet calculated CVE-2022-36466
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost. 2022-08-25 not yet calculated CVE-2022-36459
MISC
totolink — a3700r TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the command parameter in the function setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-36458
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg. 2022-08-25 not yet calculated CVE-2022-37079
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the lang parameter at /setting/setLanguageCfg. 2022-08-25 not yet calculated CVE-2022-37078
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the ip parameter at the function setDiagnosisCfg. 2022-08-25 not yet calculated CVE-2022-37083
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the host_time parameter at the function NTPSyncWithHost. 2022-08-25 not yet calculated CVE-2022-37082
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the command parameter at setting/setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-37081
MISC
totolink — a7000r TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ip parameter in the function setDiagnosisCfg. 2022-08-25 not yet calculated CVE-2022-37075
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the FileName parameter in the function UploadFirmwareFile. 2022-08-25 not yet calculated CVE-2022-37076
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the command parameter at setting/setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-37080
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the pppoeUser parameter. 2022-08-25 not yet calculated CVE-2022-37077
MISC
totolink — a7000r TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the sPort parameter at the addEffect function. 2022-08-25 not yet calculated CVE-2022-37084
MISC
totolink — a720r TOTOLink A720R V4.1.5cu.532_B20210610 was discovered to contain a command injection vulnerability via the username parameter in /cstecgi.cgi. 2022-08-25 not yet calculated CVE-2022-36456
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the function setDiagnosisCfg. 2022-08-25 not yet calculated CVE-2022-36484
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the ip parameter in the function setDiagnosisCfg. 2022-08-25 not yet calculated CVE-2022-36481
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the FileName parameter in the function UploadFirmwareFile. 2022-08-25 not yet calculated CVE-2022-36486
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the pppoeUser parameter. 2022-08-25 not yet calculated CVE-2022-36483
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg. 2022-08-25 not yet calculated CVE-2022-36485
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost. 2022-08-25 not yet calculated CVE-2022-36479
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the command parameter in the function setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-36487
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules. 2022-08-25 not yet calculated CVE-2022-36488
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg. 2022-08-25 not yet calculated CVE-2022-36480
MISC
totolink — n350rt TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the lang parameter in the function setLanguageCfg. 2022-08-25 not yet calculated CVE-2022-36482
MISC
tp-link — archer_a7 TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router. 2022-08-23 not yet calculated CVE-2021-42232
MISC
MISC
MISC
trendnet — tv-ip572p An access control issue in TrendNet TV-IP572PI v1.0 allows unauthenticated attackers to access sensitive system information. 2022-08-23 not yet calculated CVE-2022-35203
MISC
MISC
MISC
unimo — udr-ja1004 Missing authentication for critical function vulnerability in UNIMO Technology digital video recorders (UDR-JA1004/JA1008/JA1016 firmware versions v1.0.20.13 and earlier, and UDR-JA1016 firmware versions v2.0.20.13 and earlier) allows a remote unauthenticated attacker to execute an arbitrary OS command by sending a specially crafted request to the affected device web interface. 2022-08-23 not yet calculated CVE-2022-35733
MISC
MISC
uninett — mod_auth_mellon A flaw was found in mod_auth_mellon where it does not sanitize logout URLs properly. This issue could be used by an attacker to facilitate phishing attacks by tricking users into visiting a trusted web application URL that redirects to an external and potentially malicious server. The highest threat from this liability is to confidentiality and integrity. 2022-08-22 not yet calculated CVE-2021-3639
MISC
MISC
MISC
upx — upx An invalid memory address reference was discovered in the adjABS function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27798
MISC
upx– upx An floating point exception was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27802
MISC
upx — upx A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27801
MISC
upx — upx A heap-based buffer over-read was discovered in the get_le32 function in bele.h in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27800
MISC
upx — upx A heap-based buffer over-read was discovered in the acc_ua_get_be32 function in miniacc.h in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27799
MISC
upx — upx An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27797
MISC
upx — upx A heap-based buffer over-read was discovered in the invert_pt_dynamic function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. 2022-08-25 not yet calculated CVE-2020-27796
MISC
util-linux — util-linux
 
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. 2022-08-23 not yet calculated CVE-2021-3995
MISC
MISC
MISC
MISC
util-linux — util-linux
 
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users’ filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. 2022-08-23 not yet calculated CVE-2021-3996
MISC
MISC
MISC
MISC
MISC
vim — vim NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240. 2022-08-22 not yet calculated CVE-2022-2923
CONFIRM
MISC
vim — vim Use After Free in GitHub repository vim/vim prior to 9.0.0246. 2022-08-23 not yet calculated CVE-2022-2946
CONFIRM
MISC
vim — vim NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259. 2022-08-25 not yet calculated CVE-2022-2980
MISC
CONFIRM
vim — vim Use After Free in GitHub repository vim/vim prior to 9.0.0260. 2022-08-25 not yet calculated CVE-2022-2982
MISC
CONFIRM
virgl — virtual_opengl_renderer
 
A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure. 2022-08-26 not yet calculated CVE-2022-0175
MISC
MISC
MISC
MISC
MISC
virgl — virtual_opengl_renderer
 
An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution. 2022-08-25 not yet calculated CVE-2022-0135
MISC
vmware — multiple_products
 
Active IQ Unified Manager for VMware vSphere, Linux, and Microsoft Windows versions prior to 9.10P1 are susceptible to a vulnerability which could allow an attacker to discover cluster, node and Active IQ Unified Manager specific information via AutoSupport telemetry data that is sent even when AutoSupport has been disabled. 2022-08-25 not yet calculated CVE-2022-23235
MISC
vmware — vmware_tools
 
VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine. 2022-08-23 not yet calculated CVE-2022-31676
MISC
MLIST
DEBIAN
MLIST
vtk — vtk
 
There is a NULL pointer dereference vulnerability in VTK, and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor didn’t check the return value of libxml2 API ‘xmlDocGetRootElement’, and try to dereference it. It is unsafe as the return value can be NULL and that NULL pointer dereference may crash the application. 2022-08-25 not yet calculated CVE-2021-42521
MISC
wellcms — wellcms Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF). 2022-08-19 not yet calculated CVE-2022-36579
MISC
wkhtmltopdf — wkhtmltopdf wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target’s system by injecting iframe tag with initial asset IP address on it’s source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets. 2022-08-22 not yet calculated CVE-2022-35583
MISC
MISC
MISC
wordpress — wordpress PHP Object Injection vulnerability in Easy Digital Downloads plugin <= 3.0.1 at WordPress. 2022-08-22 not yet calculated CVE-2022-33900
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WebbaPlugins Webba Booking plugin <= 4.2.21 at WordPress. 2022-08-22 not yet calculated CVE-2021-36847
CONFIRM
CONFIRM
wordpress — wordpress Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability in 8 Degree Themes otification Bar for WordPress plugin <= 1.1.8 at WordPress. 2022-08-23 not yet calculated CVE-2022-29476
CONFIRM
CONFIRM
wordpress — wordpress The WPQA Builder WordPress plugin before 5.7 which is a companion plugin to the Hilmer and Discy , does not check authorization before displaying private messages, allowing any logged in user to read other users private message using the message id, which can easily be brute forced. 2022-08-22 not yet calculated CVE-2022-2198
MISC
wordpress — wordpress The WP Edit Menu WordPress plugin before 1.5.0 does not have CSRF in an AJAX action, which could allow attackers to make a logged in admin delete arbitrary posts/pages from the blog via a CSRF attack 2022-08-22 not yet calculated CVE-2022-2275
MISC
wordpress — wordpress The WP Edit Menu WordPress plugin before 1.5.0 does not have authorisation and CSRF in an AJAX action, which could allow unauthenticated attackers to delete arbitrary posts/pages from the blog 2022-08-22 not yet calculated CVE-2022-2276
CONFIRM
MISC
wordpress — wordpress The Student Result or Employee Database WordPress plugin before 1.7.5 does not have CSRF in its AJAX actions, allowing attackers to make logged in user with a role as low as contributor to add/edit and delete students via CSRF attacks. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site scripting 2022-08-22 not yet calculated CVE-2022-2312
MISC
wordpress — wordpress The WP Social Chat WordPress plugin before 6.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks. 2022-08-22 not yet calculated CVE-2022-2361
MISC
wordpress — wordpress The Download Manager WordPress plugin before 3.2.50 prioritizes getting a visitor’s IP from certain HTTP headers over PHP’s REMOTE_ADDR, which makes it possible to bypass IP-based download blocking restrictions. 2022-08-22 not yet calculated CVE-2022-2362
MISC
wordpress — wordpress The WP Sticky Button WordPress plugin before 1.4.1 does not have authorisation and CSRF checks when saving its settings, allowing unauthenticated users to update them. Furthermore, due to the lack of escaping in some of them, it could lead to Stored Cross-Site Scripting issues 2022-08-22 not yet calculated CVE-2022-2375
MISC
wordpress — wordpress The Directorist WordPress plugin before 7.3.0 does not have authorisation and CSRF checks in an AJAX action, allowing any authenticated users to send arbitrary emails on behalf of the blog 2022-08-22 not yet calculated CVE-2022-2377
MISC
wordpress — wordpress The Product Slider for WooCommerce WordPress plugin before 2.5.7 has flawed CSRF checks and lack authorisation in some of its AJAX actions, allowing any authenticated users, such as subscriber to call them. One in particular could allow them to delete arbitrary blog options. 2022-08-22 not yet calculated CVE-2022-2382
MISC
wordpress — wordpress The Feed Them Social WordPress plugin before 3.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting 2022-08-22 not yet calculated CVE-2022-2383
MISC
wordpress — wordpress The WP Coder WordPress plugin before 2.5.3 does not have CSRF check in place when deleting code created by the plugin, which could allow attackers to make a logged in admin delete arbitrary ones via a CSRF attack 2022-08-22 not yet calculated CVE-2022-2388
MISC
wordpress — wordpress The Abandoned Cart Recovery for WooCommerce, Follow Up Emails, Newsletter Builder & Marketing Automation By Autonami WordPress plugin before 2.1.2 does not have authorisation and CSRF checks in one of its AJAX action, allowing any authenticated users, such as subscriber to create automations 2022-08-22 not yet calculated CVE-2022-2389
MISC
wordpress — wordpress The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin 2022-08-22 not yet calculated CVE-2021-24912
MISC
wordpress — wordpress The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin “Who can translate ?” setting. 2022-08-22 not yet calculated CVE-2021-24911
MISC
wordpress — wordpress Authenticated (subscriber+) Denial Of Service (DoS) vulnerability in WordPlus WordPress Better Messages plugin <= 1.9.10.57 at WordPress. 2022-08-23 not yet calculated CVE-2022-33142
CONFIRM
CONFIRM
wordpress — wordpress The Lana Downloads Manager WordPress plugin before 1.8.0 is affected by an arbitrary file download vulnerability that can be exploited by users with “Contributor” permissions or higher. 2022-08-22 not yet calculated CVE-2022-2392
MISC
wordpress — wordpress The WP phpMyAdmin WordPress plugin before 5.2.0.4 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-08-22 not yet calculated CVE-2022-2407
MISC
wordpress — wordpress The Feed Them Social WordPress plugin before 3.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting 2022-08-22 not yet calculated CVE-2022-2532
MISC
wordpress — wordpress The Ninja Job Board WordPress plugin before 1.3.3 does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes. 2022-08-22 not yet calculated CVE-2022-2544
CONFIRM
MISC
wordpress — wordpress The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating. 2022-08-22 not yet calculated CVE-2022-2551
MISC
MISC
wordpress — wordpress The Duplicator WordPress plugin before 1.4.7.1 does not authenticate or authorize visitors before displaying information about the system such as server software, php version and full file system path to the site. 2022-08-22 not yet calculated CVE-2022-2552
MISC
MISC
wordpress — wordpress The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel=”noopener noreferer” on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object. 2022-08-22 not yet calculated CVE-2022-2600
MISC
wordpress — wordpress The Advanced Custom Fields WordPress plugin before 5.12.3, Advanced Custom Fields Pro WordPress plugin before 5.12.3 allows unauthenticated users to upload files allowed in a default WP configuration (so PHP is not possible) if there is a frontend form available. This vulnerability was introduced in the 5.0 rewrite and did not exist prior to that release. 2022-08-22 not yet calculated CVE-2022-2594
MISC
MISC
wordpress — wordpress The Better Search Replace WordPress plugin before 1.4.1 does not properly sanitise and escape table data before inserting it into a SQL query, which could allow high privilege users to perform SQL Injection attacks 2022-08-22 not yet calculated CVE-2022-2593
MISC
wordpress — wordpress The Transposh WordPress Translation WordPress plugin before 1.0.8 does not validate its debug settings, which could allow allowing high privilege users such as admin to perform RCE 2022-08-22 not yet calculated CVE-2022-25812
MISC
wordpress — wordpress The Transposh WordPress Translation WordPress plugin through 1.0.8 does not sanitise and escape the order and orderby parameters before using them in a SQL statement, leading to a SQL injection 2022-08-22 not yet calculated CVE-2022-25811
MISC
wordpress — wordpress The Transposh WordPress Translation WordPress plugin through 1.0.8 exposes a couple of sensitive actions such has “tp_resetâ€? under the Utilities tab (/wp-admin/admin.php?page=tp_utils), which can be used/executed as the lowest-privileged user. Basically all Utilities functionalities are vulnerable this way, which involves resetting configurations and backup/restore operations. 2022-08-22 not yet calculated CVE-2022-25810
MISC
wordpress — wordpress The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations. 2022-08-22 not yet calculated CVE-2022-2558
MISC
wordpress — wordpress The LinkWorth WordPress plugin before 3.3.4 does not implement nonce checks, which could allow attackers to make a logged in admin change settings via a CSRF attack. 2022-08-22 not yet calculated CVE-2022-2172
CONFIRM
MISC
wordpress — wordpress The Rezgo Online Booking WordPress plugin before 4.1.8 does not sanitise and escape some parameters before outputting them back in a page, leading to a Reflected Cross-Site Scripting, which can be exploited either via a LFI in an AJAX action, or direct call to the affected file 2022-08-22 not yet calculated CVE-2022-1932
MISC
wordpress — wordpress The Yotpo Reviews for WooCommerce WordPress plugin through 2.0.4 lacks nonce check when updating its settings, which could allow attacker to make a logged in admin change them via a CSRF attack. 2022-08-22 not yet calculated CVE-2022-2555
MISC
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Hotel Booking plugin <= 1.10.5 at WordPress. 2022-08-22 not yet calculated CVE-2021-36852
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in amCharts: Charts and Maps plugin <= 1.4 at WordPress. 2022-08-23 not yet calculated CVE-2022-36405
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (author+) SQL Injection (SQLi) vulnerability in Contest Gallery plugin <= 17.0.4 at WordPress. 2022-08-23 not yet calculated CVE-2022-36394
CONFIRM
CONFIRM
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerability in WordPlus Better Messages plugin <= 1.9.9.148 at WordPress. 2022-08-23 not yet calculated CVE-2022-36389
CONFIRM
CONFIRM
wordpress — wordpress Cross-Site Request Forgery (CSRF) leading to plugin settings update in YooMoney ?Kassa ??? WooCommerce plugin <= 2.3.0 at WordPress. 2022-08-23 not yet calculated CVE-2022-36379
CONFIRM
CONFIRM
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerability in SEO Scout plugin <= 0.9.83 at WordPress allows attackers to trick users with administrative rights to unintentionally change the plugin settings. 2022-08-25 not yet calculated CVE-2022-36358
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alpine Press Alpine PhotoTile for Pinterest plugin <= 1.3.1 at WordPress. 2022-08-23 not yet calculated CVE-2022-36347
CONFIRM
CONFIRM
wordpress — wordpress Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Max Foundry MaxButtons plugin <= 9.2 at WordPress. 2022-08-22 not yet calculated CVE-2022-36346
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (subscriber+) plugin settings change leading to Stored Cross-Site Scripting (XSS) vulnerability in Akash soni’s AS – Create Pinterest Pinboard Pages plugin <= 1.0 at WordPress. 2022-08-23 not yet calculated CVE-2022-36341
CONFIRM
CONFIRM
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerabilities in WPChill Gallery PhotoBlocks plugin <= 1.2.6 at WordPress. 2022-08-23 not yet calculated CVE-2022-36292
CONFIRM
CONFIRM
wordpress — wordpress Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in W3 Eden Download Manager plugin <= 3.2.48 at WordPress. 2022-08-23 not yet calculated CVE-2022-36288
CONFIRM
CONFIRM
wordpress — wordpress Authenticated Arbitrary File Upload vulnerability in dmitrylitvinov Uploading SVG, WEBP and ICO files plugin <= 1.0.1 at WordPress. 2022-08-23 not yet calculated CVE-2022-36285
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Roman Pronskiy’s Search Exclude plugin <= 1.2.6 at WordPress. 2022-08-23 not yet calculated CVE-2022-36282
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (editor+) Stored Cross-Site Scripting (XSS) vulnerability in wpshopmart Testimonial Builder plugin <= 1.6.1 at WordPress. 2022-08-22 not yet calculated CVE-2021-36857
CONFIRM
CONFIRM
wordpress — wordpress The Coming Soon – Under Construction WordPress plugin through 1.1.9 does not sanitize and escape some of its settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed 2022-08-22 not yet calculated CVE-2022-1322
MISC
wordpress — wordpress Broken Authentication vulnerability in yotuwp Video Gallery plugin <= 1.3.4.5 at WordPress. 2022-08-23 not yet calculated CVE-2022-35726
CONFIRM
CONFIRM
wordpress — wordpress Unauthenticated plugin settings change vulnerability in 59sec THE Leads Management System: 59sec LITE plugin <= 3.4.1 at WordPress. 2022-08-23 not yet calculated CVE-2022-35242
CONFIRM
CONFIRM
wordpress — wordpress Authenticated (admin+) Arbitrary File Read vulnerability in XplodedThemes WPide plugin <= 2.6 at WordPress. 2022-08-23 not yet calculated CVE-2022-35235
CONFIRM
CONFIRM
wordpress — wordpress The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue 2022-08-22 not yet calculated CVE-2021-24910
MISC
wordpress — wordpress Authenticated Arbitrary Settings Update vulnerability in YooMoney ?Kassa ??? WooCommerce plugin <= 2.3.0 at WordPress. 2022-08-23 not yet calculated CVE-2022-34868
CONFIRM
CONFIRM
wordpress — wordpress Authentication Bypass vulnerability in miniOrange OAuth 2.0 client for SSO plugin <= 1.11.3 at WordPress. 2022-08-22 not yet calculated CVE-2022-34858
CONFIRM
CONFIRM
wordpress — wordpress Reflected Cross-Site Scripting (XSS) vulnerability in smartypants SP Project & Document Manager plugin <= 4.59 at WordPress 2022-08-22 not yet calculated CVE-2022-34857
CONFIRM
CONFIRM
wordpress — wordpress Multiple Authenticated (contributor+) Persistent Cross-Site Scripting (XSS) vulnerabilities in W3 Eden Download Manager plugin <= 3.2.48 at WordPress. 2022-08-23 not yet calculated CVE-2022-34658
CONFIRM
CONFIRM
wordpress — wordpress The Simple Banner WordPress plugin before 2.12.0 does not properly sanitize its “Simple Banner Text” Settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. 2022-08-22 not yet calculated CVE-2022-0446
MISC
wordpress — wordpress Authenticated (author+) Stored Cross-Site Scripting (XSS) vulnerability in dmitrylitvinov Uploading SVG, WEBP and ICO files plugin <= 1.0.1 at WordPress. 2022-08-23 not yet calculated CVE-2022-34648
CONFIRM
CONFIRM
wordpress — wordpress Cross-Site Request Forgery (CSRF) vulnerability in W3 Eden Download Manager plugin <= 3.2.48 at WordPress. 2022-08-22 not yet calculated CVE-2022-34347
CONFIRM
CONFIRM
wordpress — wordpress Authentication Bypass vulnerability in miniOrange WP OAuth Server plugin <= 3.0.4 at WordPress. 2022-08-22 not yet calculated CVE-2022-34149
CONFIRM
CONFIRM
wordpress — wordpress The Ask me WordPress theme before 6.8.4 does not perform nonce checks when processing POST requests to the Edit Profile page, allowing an attacker to trick a user to change their profile information by sending a crafted request. 2022-08-22 not yet calculated CVE-2022-1251
MISC
wordpress — wordpress The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user 2022-08-22 not yet calculated CVE-2022-2557
MISC
wuzhicms — wuzhicms A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php: 2022-08-26 not yet calculated CVE-2022-36168
MISC
MISC
wwbn — avideo A cross-site request forgery (CSRF) vulnerability exists in WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-29468
MISC
CONFIRM
wwbn — avideo A reflected cross-site scripting (xss) vulnerability exists in the charts tab selection functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-26842
CONFIRM
MISC
wwbn — avideo Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user’s streams. 2022-08-22 not yet calculated CVE-2022-32768
CONFIRM
MISC
wwbn — avideo A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the description parameter. 2022-08-22 not yet calculated CVE-2022-34652
MISC
CONFIRM
wwbn — avideo A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the CloneSite plugin, allowing an attacker to inject SQL by manipulating the url parameter. 2022-08-22 not yet calculated CVE-2022-33149
MISC
CONFIRM
wwbn — avideo A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the title parameter. 2022-08-22 not yet calculated CVE-2022-33148
MISC
CONFIRM
wwbn — avideo A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the aVideoEncoder functionality which can be used to add new videos, allowing an attacker to inject SQL by manipulating the videoDownloadedLink or duration parameter. 2022-08-22 not yet calculated CVE-2022-33147
MISC
CONFIRM
wwbn — avideo An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerability is for the pass cookie, which contains the hashed password and can be leaked via JavaScript. 2022-08-22 not yet calculated CVE-2022-32778
MISC
CONFIRM
wwbn — avideo An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript. 2022-08-22 not yet calculated CVE-2022-32777
MISC
CONFIRM
wwbn — avideo A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the “msg” parameter which is inserted into the document with insufficient sanitization. 2022-08-22 not yet calculated CVE-2022-32772
CONFIRM
MISC
wwbn — avideo A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the “success” parameter which is inserted into the document with insufficient sanitization. 2022-08-22 not yet calculated CVE-2022-32771
CONFIRM
MISC
wwbn — avideo Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Playlists plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user’s playlists. 2022-08-22 not yet calculated CVE-2022-32769
CONFIRM
MISC
wwbn — avideo A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the “toast” parameter which is inserted into the document with insufficient sanitization. 2022-08-22 not yet calculated CVE-2022-32770
CONFIRM
MISC
wwbn — avideo An information disclosure vulnerability exists in the aVideoEncoderReceiveImage functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-32761
CONFIRM
MISC
wwbn — avideo An os command injection vulnerability exists in the aVideoEncoder wget functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-32572
CONFIRM
MISC
wwbn — avideo An improper password check exists in the login functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. An attacker that owns a users’ password hash will be able to use it to directly login into the account, leading to increased privileges. 2022-08-22 not yet calculated CVE-2022-32282
MISC
CONFIRM
wwbn — avideo A cross-site scripting (xss) vulnerability exists in the image403 functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-30690
CONFIRM
MISC
wwbn — avideo A privilege escalation vulnerability exists in the session id functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-30605
CONFIRM
MISC
wwbn — avideo A directory traversal vulnerability exists in the unzipDirectory functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-30547
CONFIRM
MISC
wwbn — avideo A cross-site scripting (xss) vulnerability exists in the videoAddNew functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-28712
MISC
CONFIRM
wwbn — avideo An information disclosure vulnerability exists in the chunkFile functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-28710
MISC
CONFIRM
wwbn — avideo An OS command injection vulnerability exists in the aVideoEncoder chunkfile functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability. 2022-08-22 not yet calculated CVE-2022-30534
CONFIRM
MISC
xpdfreader — xpdf Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics). 2022-08-22 not yet calculated CVE-2022-38171
MISC
MISC
CONFIRM
MISC
CONFIRM
CONFIRM
MISC
xunruicms — xunruicms XunRuiCMS V4.5.6 is vulnerable to Cross Site Request Forgery (CSRF). 2022-08-19 not yet calculated CVE-2022-36224
MISC
xuxueli — xxl-job XXL-JOB all versions as of 11 July 2022 are vulnerable to Insecure Permissions resulting in the ability to execute admin function with low Privilege account. 2022-08-19 not yet calculated CVE-2022-36157
MISC
yetiforce — yetiforcecompany/yetiforcecrm Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. 2022-08-22 not yet calculated CVE-2022-2890
CONFIRM
MISC
yetiforce — yetiforcecompany/yetiforcecrm Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. 2022-08-22 not yet calculated CVE-2022-1340
MISC
CONFIRM
yetiforce — yetiforcecompany/yetiforcecrm Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. 2022-08-21 not yet calculated CVE-2022-2885
CONFIRM
MISC
yetiforce — yetiforcecompany/yetiforcecrm  Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. 2022-08-23 not yet calculated CVE-2022-2829
MISC
CONFIRM
yimihome — yimioa Ywoa before v6.1 was discovered to contain a SQL injection vulnerability via /oa/setup/checkPool?database. 2022-08-19 not yet calculated CVE-2022-36606
MISC
yimihome — yimioa Yimioa v6.1 was discovered to contain a SQL injection vulnerability via the orderbyGET parameter. 2022-08-19 not yet calculated CVE-2022-36605
MISC
zaver — zaver
 
Zaver through 2020-12-15 allows directory traversal via the GET /.. substring. 2022-08-27 not yet calculated CVE-2022-38794
MISC
zengenti — contensis The file upload wizard in Zengenti Contensis Classic before 15.2.1.79 does not correctly check that a user has authenticated. By uploading a crafted aspx file, it is possible to execute arbitrary commands. 2022-08-23 not yet calculated CVE-2022-34919
MISC
MISC

Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

CISA Releases 12 Industrial Control Systems Advisories

Original release date: August 29, 2022 | Last revised: August 30, 2022

CISA has released 12 Industrial Control Systems (ICS) advisories on August 30, 2022. These advisories provides timely information about current security issues, vulnerabilities, and exploits surrounding ICS.  

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations:  

This product is provided subject to this Notification and this Privacy & Use policy.

Categories
alerts

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Categories
alerts

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

For Emergency Cyber Security Incident Response please email RedTeam@DefendEdge.com