Share news article

Share on facebook
Share on twitter
Share on linkedin
Share on email

Vulnerability Summary for the Week of June 20, 2022

Rails::Html::Sanitizer — Rails::Html::Sanitizer

  # Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer’s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:“`ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [“select”, “style”]“`see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:“`<%= sanitize @comment.body, tags: ["select", "style"] %>“`see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:“`ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [“select”, “style”]“`or“`ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [“select”, “style”])“`All users overriding the allowed tags by any of the above mechanisms to include both “select” and “style” should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user). 2022-06-24 not yet calculated CVE-2022-32209

MISC abb — multiple_products

  Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2, REX640 PCL3 allows an authenticated attacker to launch an attack against the user database file and try to take control of an affected system node. 2022-06-21 not yet calculated CVE-2022-1596

MISC adminer_login — adminer_login

  A vulnerability has been found in Adminer Login 1.4.4 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. 2022-06-20 not yet calculated CVE-2017-20066

N/A

N/A

N/A aio-libs — aiohttp

  ** DISPUTED ** AIOHTTP 3.8.1 can report a “ValueError: Invalid IPv6 URL” outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application. 2022-06-23 not yet calculated CVE-2022-33124

MISC algo_communication_products — 8373_ip_zone_paging_adapter_firmware

  Algo Communication Products Ltd. 8373 IP Zone Paging Adapter Firmware 1.7.6 allows attackers to perform a directory traversal via a web request sent to /fm-data.lua. 2022-06-23 not yet calculated CVE-2022-31395

MISC apache — multiple_products

  Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files. 2022-06-22 not yet calculated CVE-2022-32549

CONFIRM apache — tomcat

  In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. 2022-06-23 not yet calculated CVE-2022-34305

CONFIRM

MLIST apache — www-data

  The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash). 2022-06-24 not yet calculated CVE-2022-2104

MISC apple — iphone

  ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to execute commands remotely. Exploit details have been disclosed to the public. The existence and implications of this vulnerability are doubted by Apple even though multiple public videos demonstrating the attack exist. Upgrading to version 13.0 migt be able to address this issue. It is recommended to upgrade affected devices. 2022-06-25 not yet calculated CVE-2019-25071

N/A

N/A

N/A argoproj — argo-cd

  Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. The fix for this vulnerability is available in versions 2.3.5, 2.2.10, 2.1.16, and later. There are no known workarounds. Users are recommended to upgrade. 2022-06-25 not yet calculated CVE-2022-31016

CONFIRM atlasvpn

— atlasvpn

  AtlasVPN – Privilege Escalation Lack of proper security controls on named pipe messages can allow an attacker with low privileges to send a malicious payload and gain SYSTEM permissions on a windows computer where the AtlasVPN client is installed. 2022-06-21 not yet calculated CVE-2022-23171

MISC autodesk — autocad

  A maliciously crafted JT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. 2022-06-21 not yet calculated CVE-2022-27867

MISC autodesk — autocad

  Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27871

MISC autodesk — autocad

  A maliciously crafted TGA file in Autodesk AutoCAD 2023 may be used to write beyond the allocated buffer while parsing TGA file. This vulnerability may be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27870

MISC autodesk — autocad

  A maliciously crafted TIFF file in Autodesk AutoCAD 2023 can be forced to read and write beyond allocated boundaries when parsing the TIFF file. This vulnerability can be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27869

MISC autodesk — autocad

  A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. 2022-06-21 not yet calculated CVE-2022-27868

MISC autodesk — navisworks

  A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27872

MISC bosch — ethernet_switch_pra-es8p2s

  The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch. 2022-06-23 not yet calculated CVE-2022-32535

CONFIRM bosch — ethernet_switch_pra-es8p2s

  The user access rights validation in the web server of the Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 was insufficient. This would allow a non-administrator user to obtain administrator user access rights. 2022-06-23 not yet calculated CVE-2022-32536

CONFIRM bosch — ethernet_switch_pra-es8p2s

  The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 and earlier was found to be vulnerable to command injection through its diagnostics web interface. This allows execution of shell commands. 2022-06-23 not yet calculated CVE-2022-32534

CONFIRM c_rehash — multiple_products

  In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). 2022-06-21 not yet calculated CVE-2022-2068

CONFIRM

CONFIRM

CONFIRM

CONFIRM campcodes — simple_bakery_shop_management_system

  Multiple cross-site scripting (XSS) vulnerabilities in /bsms/?page=manage_account of Simple Bakery Shop Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username or Full Name fields. 2022-06-23 not yet calculated CVE-2022-32987

MISC

MISC cisco — adaptive_security_device_manager_(asdm)

  A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device. 2022-06-22 not yet calculated CVE-2022-20651

CISCO cisco — adaptive_security_device_manager_(asdm)

  A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability. 2022-06-24 not yet calculated CVE-2022-20829

CISCO cisco — catalyst_2940_series_switches

  ** Unsupported When Assigned ** Cisco Catalyst 2940 Series Switches provided by Cisco Systems, Inc. contain a reflected cross-site scripting vulnerability regarding error page generation. An arbitrary script may be executed on the web browser of the user who is using the product. The affected firmware is prior to 12.2(50)SY released in 2011, and Cisco Catalyst 2940 Series Switches have been retired since January 2015. 2022-06-20 not yet calculated CVE-2022-31734

MISC

MISC cisco — firepower_software_for_adptive_security_appliancew_(asa)_firepower_module

  A vulnerability in the CLI parser of Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected ASA FirePOWER module as the root user. This vulnerability is due to improper handling of undefined command parameters. An attacker could exploit this vulnerability by using a crafted command on the CLI or by submitting a crafted HTTPS request to the web-based management interface of the Cisco ASA that is hosting the ASA FirePOWER module. Note: To exploit this vulnerability, the attacker must have administrative access to the Cisco ASA. A user who has administrative access to a particular Cisco ASA is also expected to have administrative access to the ASA FirePOWER module that is hosted by that Cisco ASA. 2022-06-24 not yet calculated CVE-2022-20828

CISCO cloudflare — warp_for_windows

  Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0. 2022-06-23 not yet calculated CVE-2022-2147

CONFIRM codesys — gateway_server

  In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password. 2022-06-24 not yet calculated CVE-2022-31802

CONFIRM codesys — gateway_server

  The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition. 2022-06-24 not yet calculated CVE-2022-31804

CONFIRM codesys — gateway_server

  In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact. 2022-06-24 not yet calculated CVE-2022-31803

CONFIRM codesys — multiple_products Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32141

CONFIRM codesys — multiple_products

  In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32136

CONFIRM codesys — multiple_products

  In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller. 2022-06-24 not yet calculated CVE-2022-31806

CONFIRM codesys — multiple_products

  Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-1965

CONFIRM codesys — multiple_products

  In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32137

CONFIRM codesys — multiple_products

  In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. 2022-06-24 not yet calculated CVE-2022-31805

CONFIRM codesys — multiple_products

  Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required. 2022-06-24 not yet calculated CVE-2022-32140

CONFIRM codesys — multiple_products

  Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32142

CONFIRM codesys — multiple_products

  In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required 2022-06-24 not yet calculated CVE-2022-32143

CONFIRM codesys — multiple_products

  In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite. 2022-06-24 not yet calculated CVE-2022-32138

CONFIRM codesys — multiple_products

  In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required. 2022-06-24 not yet calculated CVE-2022-32139

CONFIRM comodo — antivirus

  Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder. 2022-06-21 not yet calculated CVE-2022-34008

MISC

MISC concretecms — concrete

  Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concrete doesn’t allow traversal and by changing isFullChunkFilePresent to have an early false return when input doesn’t match expectations.Concrete CMS Security team ranked this 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Credit to Siebene for reporting. 2022-06-24 not yet calculated CVE-2022-30117

MISC

MISC

MISC concretecms — concretecms

  Title for CVE: XSS in /dashboard/system/express/entities/forms/save_control/[GUID]: old browsers only.Description: When using Internet Explorer with the XSS protection disabled, editing a form control in an express entities form for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 can allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. 2022-06-24 not yet calculated CVE-2022-30118

MISC

MISC

MISC concretecms — concretecms

  XSS in /dashboard/reports/logs/view – old browsers only. When using Internet Explorer with the XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. 2022-06-24 not yet calculated CVE-2022-30119

MISC

MISC

MISC concretecms — concretecms

  XSS in /dashboard/blocks/stacks/view_details/ – old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting 2022-06-24 not yet calculated CVE-2022-30120

MISC

MISC

MISC concretecms — concretecms

  Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520. 2022-06-24 not yet calculated CVE-2022-21829

MISC

MISC

MISC deep-get-set — deep-get-set All versions of package deep-get-set are vulnerable to Prototype Pollution via the ‘deep’ function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666) 2022-06-24 not yet calculated CVE-2022-21231

CONFIRM dell — bios

  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26864

MISC dell — bios

  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26863

MISC dell — bios

  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26862

MISC dell — wms

  Dell WMS 3.6.1 and below contains a Path Traversal vulnerability in Device API. A remote attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application. 2022-06-24 not yet calculated CVE-2022-29097

CONFIRM dell — wyse_management_suite

  Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in saveGroupConfigurations page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user’s web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. 2022-06-24 not yet calculated CVE-2022-29096

CONFIRM devolutions — remote_desktop_manager

  A path traversal issue in entry attachments in Devolutions Remote Desktop Manager before 2022.2 allows attackers to create or overwrite files in an arbitrary location. 2022-06-21 not yet calculated CVE-2022-33995

MISC diffy — diffy

  The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string. 2022-06-23 not yet calculated CVE-2022-33127

MISC

MISC discourse — discourse_chat_plugin

  discourse-chat is a chat plugin for the Discourse application. Versions prior to 0.4 are vulnerable to an exposure of sensitive information, where an attacker who knows the message ID for a channel they do not have access to can view that message using the chat message lookup endpoint, primarily affecting direct message channels. There are no known workarounds for this issue, and users are advised to update the plugin. 2022-06-21 not yet calculated CVE-2022-31095

CONFIRM django-navbar-client — django-navbar-client The django-navbar-client package of v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32996

MISC

MISC

MISC dominion — dominion_voting_systems_imagecast_x The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media. 2022-06-24 not yet calculated CVE-2022-1739

MISC dominion — dominion_voting_systems_imagecast_x

  The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization. 2022-06-24 not yet calculated CVE-2022-1747

MISC dominion — dominion_voting_systems_imagecast_x

  The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1741

MISC dominion — dominion_voting_systems_imagecast_x

  The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device. 2022-06-24 not yet calculated CVE-2022-1740

MISC dominion — dominion_voting_systems_imagecast_x

  The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment. 2022-06-24 not yet calculated CVE-2022-1746

MISC dominion — dominion_voting_systems_imagecast_x

  The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS. 2022-06-24 not yet calculated CVE-2022-1743

MISC dominion — dominion_voting_systems_imagecast_x

  The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1742

MISC dominion — dominion_voting_systems_imagecast_x

  The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions. 2022-06-24 not yet calculated CVE-2022-1745

MISC dominion — dominion_voting_systems_imagecast_x

  Applications on the tested version of Dominion Voting Systems ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1744

MISC dradispro — dradis_professional_edition Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token. 2022-06-24 not yet calculated CVE-2022-30028

MISC eagleget — downloader

  A local privilege escalation vulnerability was identified within the “luminati_net_updater_win_eagleget_com” service in EagleGet Downloader version 2.1.5.20 Stable. This issue allows authenticated non-administrative user to escalate their privilege and conduct code execution as a SYSTEM privilege. 2022-06-24 not yet calculated CVE-2020-21046

MISC

MISC eg350_eg_rgos

  RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulnerability via the function get_alarmAction at /alarm_pi/alarmService.php. 2022-06-25 not yet calculated CVE-2022-33128

MISC elefantcms — elefantcms

  A vulnerability was found in Elefant CMS 1.3.12-RC. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /designer/add/layout. The manipulation leads to code injection. The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20064

MISC

MISC elefantcms — elefantcms

  A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20062

MISC

MISC elefantcms — elefantcms

  A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20061

MISC

MISC elefantcms — elefantcms

  A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20060

MISC

MISC elefantcms — elefantcms

  A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20059

MISC

MISC elefantcms — elefantcms

  A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20058

MISC

MISC elefantcms — elefantcms

  A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20057

MISC

MISC elefantcms — elefantcms

  A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20063

MISC

MISC erpnext — erpnext

  In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. 2022-06-22 not yet calculated CVE-2022-23056

MISC

MISC erpnext — erpnext

  ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. 2022-06-22 not yet calculated CVE-2022-23058

MISC

MISC erpnext — erpnext

  In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users. 2022-06-22 not yet calculated CVE-2022-23055

MISC

MISC erpnext — erpnext

  In ERPNext, versions v12.0.9–v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile. 2022-06-22 not yet calculated CVE-2022-23057

MISC

MISC espressif — bluetooth_meth_sdk

  ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware. 2022-06-25 not yet calculated CVE-2022-24893

CONFIRM ethereum — solidity Ethereum Solidity v0.8.14 contains an assertion failure via SMTEncoder::indexOrMemberAssignment() at SMTEncoder.cpp. 2022-06-23 not yet calculated CVE-2022-33069

MISC excellium — raytion Raytion 7.2.0 allows reflected Cross-site Scripting (XSS). 2022-06-25 not yet calculated CVE-2022-29931

MISC eyoucms — eyoucms

  A stored cross-site scripting (XSS) vulnerability in eyoucms v1.5.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL field under the login page. 2022-06-24 not yet calculated CVE-2022-33122

MISC ffmpeg — ffmpeg A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125015

MISC

MISC ffmpeg — ffmpeg A vulnerability, which was classified as problematic, has been found in FFmpeg 2.0. Affected by this issue is the function output_frame of the file libavcodec/h264.c. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125006

MISC

MISC ffmpeg — ffmpeg

  A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is an unknown functionality of the component HEVC Video Decoder. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125014

MISC

MISC ffmpeg — ffmpeg

  A vulnerability classified as critical was found in FFmpeg 2.0. This vulnerability affects the function rpza_decode_stream. The manipulation leads to memory corruption. The attack can be initiated remotely. The name of the patch is Fixes Invalid Writes. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125017

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been rated as problematic. This issue affects the function ff_init_buffer_info of the file utils.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125016

MISC

MISC ffmpeg — ffmpeg

  A vulnerability, which was classified as problematic, was found in FFmpeg 2.0. This affects the function decode_nal_unit of the component Slice Segment Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125019

N/A

N/A ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function msrle_decode_frame of the file libavcodec/msrle.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125013

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is an unknown function of the file libavcodec/dxtroy.c. The manipulation leads to integer coercion error. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125012

MISC

MISC ffmpeg — ffmpeg

  A vulnerability has been found in FFmpeg 2.0 and classified as critical. This vulnerability affects the function decode_update_thread_context. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125020

N/A

N/A ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function decode_frame of the file libavcodec/ansi.c. The manipulation leads to integer coercion error. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125011

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function cmv_process_header. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125021

N/A

N/A ffmpeg — ffmpeg

  A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function add_yblock of the file libavcodec/snow.h. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125009

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function decode_slice_header of the file libavcodec/h64.c. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125010

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is the function shorten_decode_frame of the component Bitstream Buffer. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125022

N/A

N/A ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function truemotion1_decode_header of the component Truemotion1 Handler. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125023

N/A

N/A ffmpeg — ffmpeg

  A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125008

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function lag_decode_frame. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125024

N/A

N/A ffmpeg — ffmpeg

  A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is the function intra_pred of the file libavcodec/hevcpred_template.c. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125007

MISC

MISC ffmpeg — ffmpeg

  A vulnerability, which was classified as problematic, was found in FFmpeg 2.0. This affects the function decode_vol_header of the file libavcodec/mpeg4videodec.c. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125005

MISC

MISC ffmpeg — ffmpeg

  A vulnerability has been found in FFmpeg 2.0 and classified as problematic. This vulnerability affects the function decode_hextile of the file libavcodec/vmnc.c. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125004

MISC

MISC ffmpeg — ffmpeg

  A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function decode_pulses. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125025

N/A

N/A ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function get_siz of the file libavcodec/jpeg2000dec.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125003

MISC

MISC ffmpeg — ffmpeg

  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is the function dnxhd_init_rc of the file libavcodec/dnxhdenc.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125002

MISC

MISC ffmpeg — ffmpeg

  A vulnerability, which was classified as problematic, has been found in FFmpeg 2.0. Affected by this issue is the function decode_slice_header. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125018

N/A

N/A flatpress — flatpress

  A stored cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content. 2022-06-23 not yet calculated CVE-2021-41432

MISC fujitsu — eternus_centricstor_cs8000

  An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands. 2022-06-20 not yet calculated CVE-2022-31794

MISC

MISC

MISC fujitsu — eternus_centricstor_cs8000

  An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands. 2022-06-20 not yet calculated CVE-2022-31795

MISC

MISC

MISC gitee — oneblog

  OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the parameter entryUrls. 2022-06-23 not yet calculated CVE-2022-34011

MISC gitee — oneblog

  OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Logo parameter under the Link module. 2022-06-23 not yet calculated CVE-2022-34013

MISC gitee — oneblog

  Insecure permissions in OneBlog v2.3.4 allows low-level administrators to reset the passwords of high-level administrators who hold greater privileges. 2022-06-23 not yet calculated CVE-2022-34012

MISC glpi — glp-inventory-plugin

  ### Impact A plugin public script can be used to read content of system files. ### Patches Upgrade to version 1.0.2. ### Workarounds `b/deploy/index.php` file can be deleted if deploy feature is not used. 2022-06-20 not yet calculated CVE-2022-31062

CONFIRM gmbh — multiple_products

  An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. 2022-06-21 not yet calculated CVE-2022-31800

CONFIRM gmbh — multiple_products

  An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. 2022-06-21 not yet calculated CVE-2022-31801

CONFIRM gnome — gimp

  An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30 allows attackers to trigger an unhandled exception via a crafted XCF file, causing a Denial of Service (DoS). 2022-06-24 not yet calculated CVE-2022-32990

MISC google — go

  Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. 2022-06-23 not yet calculated CVE-2022-29526

MISC

MISC

MISC got — got

  The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. 2022-06-18 not yet calculated CVE-2022-33987

MISC

MISC

MISC habitica — habitica

  In habitica versions v4.119.0 through v4.232.2 are vulnerable to DOM XSS via the login page. 2022-06-22 not yet calculated CVE-2022-23077

CONFIRM

MISC habitica — habitica

  In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page. 2022-06-22 not yet calculated CVE-2022-23078

CONFIRM

MISC harfbuzz — harfbuzz

  An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33068

MISC

MISC hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical has been found in Hindu Matrimonial Script. This affects an unknown part of the file /admin/countrymanagement.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20069

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability was found in Hindu Matrimonial Script. It has been classified as critical. This affects an unknown part of the file /admin/payment.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20075

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability, which was classified as critical, was found in Hindu Matrimonial Script. This affects an unknown part of the file /admin/reports.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20081

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical was found in Hindu Matrimonial Script. Affected by this vulnerability is an unknown functionality of the file /admin/photo.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20079

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical has been found in Hindu Matrimonial Script. Affected is an unknown function of the file /admin/featured.php. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20078

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability, which was classified as critical, has been found in Hindu Matrimonial Script. This issue affects some unknown processing of the file /admin/renewaldue.php. The manipulation leads to improper privilege management. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20071

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability was found in Hindu Matrimonial Script and classified as critical. Affected by this issue is some unknown functionality of the file /admin/newsletter1.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20074

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability was found in Hindu Matrimonial Script. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/. The manipulation of the argument username/password with the input ‘or”=’ leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20067

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/usermanagement.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20068

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability classified as critical was found in Hindu Matrimonial Script. This vulnerability affects unknown code of the file /admin/communitymanagement.php. The manipulation leads to improper privilege management. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20070

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability, which was classified as critical, has been found in Hindu Matrimonial Script. Affected by this issue is some unknown functionality of the file /admin/googleads.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20080

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability, which was classified as critical, was found in Hindu Matrimonial Script. Affected is an unknown function of the file /admin/generalsettings.php. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20072

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability has been found in Hindu Matrimonial Script and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/cms.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20073

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. This issue affects some unknown processing of the file /admin/success_story.php. The manipulation leads to improper privilege management. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20077

N/A

N/A hindu_matrimonial_script — hindu_matrimonial_script

  A vulnerability was found in Hindu Matrimonial Script. It has been declared as critical. This vulnerability affects unknown code of the file /admin/searchview.php. The manipulation leads to improper privilege management. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20076

N/A

N/A hpe — multiple_products

  A remote authentication bypass vulnerability was discovered in HPE Cray Legacy Shasta System Solutions; HPE Slingshot; and HPE Cray EX supercomputers versions: Prior to node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27; All Slingshot versions prior to 1.7.2; All versions of node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27. HPE has provided a software update to resolve this vulnerability in HPE Cray Legacy Shasta System Solutions, HPE Slingshot, and HPE Cray EX Supercomputers. 2022-06-24 not yet calculated CVE-2022-28620

MISC hpe — version_control_repository_manager

  A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE Version Control Repository Manager installer 7.6.14.0. 2022-06-24 not yet calculated CVE-2022-28619

MISC hyland — onbase_application_server

  The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are vulnerable to a username enumeration vulnerability. An attacker can obtain valid users based on the response returned for invalid and valid users by sending a POST login request to the /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory integrated systems. 2022-06-21 not yet calculated CVE-2022-23342

MISC

MISC ibm — cognos_analytics

  IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a low level user to obtain sensitive information from the details of the ‘Cloud Storage’ page for which they should not have access. IBM X-Force ID: 202682. 2022-06-24 not yet calculated CVE-2021-29768

CONFIRM

XF ibm — cognos_analytics

  IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238. 2022-06-24 not yet calculated CVE-2021-38945

CONFIRM

XF ibm — curam_social_program_management

  IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 218281. 2022-06-20 not yet calculated CVE-2022-22317

CONFIRM

XF ibm — curam_social_program_management

  IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. 2022-06-20 not yet calculated CVE-2022-22318

CONFIRM

XF ibm — jazz_team_server IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208345. 2022-06-24 not yet calculated CVE-2021-38871

XF

CONFIRM ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim’s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 206091. 2022-06-24 not yet calculated CVE-2021-29865

XF

CONFIRM ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891. 2022-06-24 not yet calculated CVE-2021-20355

XF

CONFIRM ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 209057. 2022-06-24 not yet calculated CVE-2021-38879

CONFIRM

XF ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 199149. 2022-06-24 not yet calculated CVE-2021-20551

CONFIRM

XF ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 198931. 2022-06-24 not yet calculated CVE-2021-20544

XF

CONFIRM ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim’s Web browser within the security context of the hosting site. IBM X-Force ID: 198929. 2022-06-24 not yet calculated CVE-2021-20543

XF

CONFIRM ibm — jazz_team_server

  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. 2022-06-24 not yet calculated CVE-2021-20421

CONFIRM

XF ibm — multiple_products IBM CICS TX Standard and Advanced 11.1 could allow a remote attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 227980. 2022-06-24 not yet calculated CVE-2022-31767

CONFIRM

CONFIRM

XF ibm — multiple_products IBM Planning Analytics 2.0 and IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214349. 2022-06-24 not yet calculated CVE-2021-39047

XF

CONFIRM

CONFIRM ibm — multiple_products

  IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may terminate abnormally when executing specially crafted SQL statements by an authenticated user. IBM X-Force ID: 2219740. 2022-06-24 not yet calculated CVE-2022-22389

XF

CONFIRM ibm — multiple_products

  IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an information disclosure caused by improper privilege management when table function is used. IBM X-Force ID: 221973. 2022-06-24 not yet calculated CVE-2022-22390

CONFIRM

XF ibm — qradar_wincollect_agent

  IBM QRadar WinCollect Agent 10.0 and 10.0.1 could allow an attacker to obtain sensitive information due to missing best practices. IBM X-Force ID: 213549. 2022-06-21 not yet calculated CVE-2021-39006

CONFIRM

XF ibm — robotic_process

  IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. IBM X-Force ID: 229198. 2022-06-24 not yet calculated CVE-2022-33953

CONFIRM

XF ibm — robotic_process_automation

  IBM Robotic Process Automation 21.0.2 could allow a local user to obtain sensitive web service configuration credentials from system memory. IBM X-Force ID: 223026. 2022-06-20 not yet calculated CVE-2022-22414

XF

CONFIRM ibm — robotic_process_automation

  IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227124. 2022-06-24 not yet calculated CVE-2022-22502

XF

CONFIRM ideaco — idealms IdeaLMS 2022 allows reflected Cross Site Scripting (XSS) via the IdeaLMS/Class/Assessment/ PATH_INFO. 2022-06-21 not yet calculated CVE-2022-31786

MISC ideaco — ideatms

  IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO 2022-06-23 not yet calculated CVE-2022-31787

MISC

MISC illumina — lrm  LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network. 2022-06-24 not yet calculated CVE-2022-1517

MISC illumina — lrm 

  LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit. 2022-06-24 not yet calculated CVE-2022-1519

MISC illumina — lrm 

  LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data. 2022-06-24 not yet calculated CVE-2022-1521

MISC illumina — lrm 

  LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials. 2022-06-24 not yet calculated CVE-2022-1524

MISC illumina — lrm 

  LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure. 2022-06-24 not yet calculated CVE-2022-1518

MISC instagram — alpine_phototile_for_instagram_plugin

  A vulnerability, which was classified as problematic, has been found in Alpine PhotoTile for Instagram Plugin 1.2.7.7. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. 2022-06-23 not yet calculated CVE-2017-20087

N/A

N/A inventree — inventree

  Denial of Service in GitHub repository inventree/inventree prior to 0.8.0. 2022-06-20 not yet calculated CVE-2022-2134

CONFIRM

MISC jenkins — agent_server_parameter_plugin

  Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34183

CONFIRM jenkins — beaker_builder_plugin

  A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34207

CONFIRM jenkins — beaker_builder_plugin

  A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34208

CONFIRM jenkins — convertigo_mobile_platform_plugin

  A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34201

CONFIRM jenkins — convertigo_mobile_platform_plugin

  A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34200

CONFIRM jenkins — convertigo_mobile_platform_plugin

  Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34199

CONFIRM jenkins — crx_content_package_deployer_plugin Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34184

CONFIRM jenkins — date_parameter_lugin Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34185

CONFIRM jenkins — dynamic_extended_choice_parameter_plugin Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34186

CONFIRM jenkins — eadonly_parameter_plugin Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34194

CONFIRM jenkins — easyqa_plugin Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34202

CONFIRM jenkins — easyqa_plugin A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server. 2022-06-23 not yet calculated CVE-2022-34203

CONFIRM jenkins — easyqa_plugin

  A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server. 2022-06-23 not yet calculated CVE-2022-34204

CONFIRM jenkins — embeddable_build_status_plugin Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a ‘link’ query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34178

CONFIRM jenkins — embeddable_build_status_plugin

  Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34179

CONFIRM jenkins — embeddable_build_status_plugin

  Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for “unprotected” status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build. 2022-06-23 not yet calculated CVE-2022-34180

CONFIRM jenkins — filesystem_list_paraeter_plugin

  Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34187

CONFIRM jenkins — hidden_parameter_plugin Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34188

CONFIRM jenkins — image_tag_parameter_plugin

  Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34189

CONFIRM jenkins — jenkins Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view. 2022-06-23 not yet calculated CVE-2022-34175

CONFIRM jenkins — jenkins

  In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of ‘tooltip’ parameters, resulting in a cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34172

CONFIRM jenkins — jenkins

  In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2022-06-23 not yet calculated CVE-2022-34173

CONFIRM jenkins — jianliao_notification_plugin A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34206

CONFIRM jenkins — jianliao_notification_plugin

  A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34205

CONFIRM jenkins — junit_plugin

  Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. 2022-06-23 not yet calculated CVE-2022-34176

CONFIRM jenkins — maven_metadata_plugin_for_jenkins_ci_server_plugin

  Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34190

CONFIRM jenkins — multiple_products In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2022-06-23 not yet calculated CVE-2022-34170

CONFIRM jenkins — multiple_products In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. 2022-06-23 not yet calculated CVE-2022-34174

CONFIRM jenkins — multiple_products

  In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the ‘title’ attribute of ‘l:ionicon’ (until Jenkins 2.334) and ‘alt’ attribute of ‘l:icon’ (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34171

CONFIRM jenkins — nested_view_plugin

  Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34182

CONFIRM jenkins — ns-nd_integration_performance_publisher_plugin

  Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34191

CONFIRM jenkins — ontrack_jenkins_plugin Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34192

CONFIRM jenkins — package_version_plugin Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34193

CONFIRM jenkins — pipeline_input_step_plugin

  Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content. 2022-06-23 not yet calculated CVE-2022-34177

CONFIRM jenkins — repository_connector_plugin

  Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34195

CONFIRM jenkins — rest_list_parameter_plugin Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34196

CONFIRM jenkins — sauce_ondemand_plugin

  Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34197

CONFIRM jenkins — stash_branch_parameter_plugin

  Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34198

CONFIRM jenkins — threadfix_plugin A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34209

CONFIRM jenkins — threadfix_plugin A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34210

CONFIRM jenkins — vrealize_orchestrator_plugin

  A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34211

CONFIRM jenkins — vrealize_orchestrator_plugin

  A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34212

CONFIRM jenkins — xunit_plugin

  Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn’t exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory. 2022-06-23 not yet calculated CVE-2022-34181

CONFIRM jenkins — squash_tm_publisher_(squash4jenkins)_plugin

  Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34213

CONFIRM jerryscript — jerryscript

  There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0 2022-06-20 not yet calculated CVE-2021-41683

MISC jerryscript — jerryscript

  There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0 2022-06-20 not yet calculated CVE-2021-41682

MISC jflyfox — jfinal_cms

  Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module. 2022-06-23 not yet calculated CVE-2022-33113

MISC jflyfox — jfinal_cms

  Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list. 2022-06-23 not yet calculated CVE-2022-33114

MISC jung — smart_visu_server

  A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20082

N/A

N/A jung — smart_visu_server

  A vulnerability, which was classified as critical, was found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. Affected is an unknown function of the component SSH Server. The manipulation leads to backdoor. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20083

N/A

N/A jung — smart_visu_server

  A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20084

N/A

N/A knot_resolver — knot_resolver Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters. 2022-06-20 not yet calculated CVE-2022-32983

MISC

MISC krcert/cc — maxboard

  Stored XSS and SQL injection vulnerability in MaxBoard could lead to occur Remote Code Execution, which could lead to information exposure and privilege escalation. 2022-06-23 not yet calculated CVE-2021-26636

MISC laiketui — laiketui

  Laiketui 3.5.0 is affected by an arbitrary file upload vulnerability that can allow an attacker to execute arbitrary code. 2022-06-23 not yet calculated CVE-2021-40954

MISC laiketui — laiketui

  LaiKetui v3.5.0 has SQL injection in the background through the menu management function, and sensitive data can be obtained. 2022-06-23 not yet calculated CVE-2021-40956

MISC laiketui — laiketui

  SQL injection exists in LaiKetui v3.5.0 the background administrator list. 2022-06-23 not yet calculated CVE-2021-40955

MISC libdwarf — libdwarf

  There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b. 2022-06-23 not yet calculated CVE-2022-34299

MISC

MISC libjpeg-turbo — libjpeg-turbo

  The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c. 2022-06-18 not yet calculated CVE-2021-46822

MISC

MISC libjxl — libjxl

  libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc. 2022-06-19 not yet calculated CVE-2022-34000

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c. 2022-06-23 not yet calculated CVE-2022-33034

MISC libredwg — libredwg

  There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *’ failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608. 2022-06-23 not yet calculated CVE-2022-33024

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c. 2022-06-23 not yet calculated CVE-2022-33025

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c. 2022-06-23 not yet calculated CVE-2022-33033

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c. 2022-06-23 not yet calculated CVE-2022-33032

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c. 2022-06-23 not yet calculated CVE-2022-33028

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c. 2022-06-23 not yet calculated CVE-2022-33027

MISC libredwg — libredwg

  LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. 2022-06-23 not yet calculated CVE-2022-33026

MISC linux — kernel

  drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. 2022-06-18 not yet calculated CVE-2022-33981

MISC

MISC

MISC

MISC lrzip — lrzip Lrzip v0.651 was discovered to contain multiple invalid arithmetic shifts via the functions get_magic in lrzip.c and Predictor::init in libzpaq/libzpaq.cpp. These vulnerabilities allow attackers to cause a Denial of Service via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33067

MISC maccmspro — maccms10

  maccms10 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field. 2022-06-21 not yet calculated CVE-2022-31303

MISC maccmspro — maccms8 maccms8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field. 2022-06-21 not yet calculated CVE-2022-31302

MISC mahara — mahara In Mahara 21.04 before 21.04.6, 21.10 before 21.10.4, and 22.04.2, files can sometimes be downloaded through thumb.php with no permission check. 2022-06-20 not yet calculated CVE-2022-33913

CONFIRM mantisbt — mantisbt

  An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute. 2022-06-24 not yet calculated CVE-2022-33910

CONFIRM

MISC

MISC mautic — mautic

  A cross-site scripting (XSS) vulnerability in the web tracking component of Mautic before 4.3.0 allows remote attackers to inject executable javascript 2022-06-20 not yet calculated CVE-2022-25772

MISC mcafee — consumer_product_removal_tool

  Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file. 2022-06-20 not yet calculated CVE-2022-1823

CONFIRM mcafee — consumer_product_removal_tool

  An uncontrolled search path vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local attacker to perform a sideloading attack by using a specific file name. This could result in the user gaining elevated permissions and being able to execute arbitrary code as there were insufficient checks on the executable being signed by McAfee. 2022-06-20 not yet calculated CVE-2022-1824

CONFIRM melag{_ftp_server — melag_ftp_server

  MELAG FTP Server 2.2.0.4 allows an attacker to use the CWD command to break out of the FTP servers root directory and operate on the entire operating system, while the access restrictions of the user running the FTP server apply. 2022-06-24 not yet calculated CVE-2021-41636

MISC melag{_ftp_server — melag_ftp_server

  A user enumeration vulnerability in MELAG FTP Server 2.2.0.4 allows an attacker to identify valid FTP usernames. 2022-06-24 not yet calculated CVE-2021-41634

MISC melag{_ftp_server — melag_ftp_server

  When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system. 2022-06-24 not yet calculated CVE-2021-41635

MISC melag{_ftp_server — melag_ftp_server

  MELAG FTP Server 2.2.0.4 stores unencrpyted passwords of FTP users in a local configuration file. 2022-06-24 not yet calculated CVE-2021-41639

MISC melag{_ftp_server — melag_ftp_server

  Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the “Everyone” group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users. 2022-06-24 not yet calculated CVE-2021-41637

MISC melag{_ftp_server — melag_ftp_server

  The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username. 2022-06-24 not yet calculated CVE-2021-41638

MISC mend – mend

  In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Stored XSS. 2022-06-22 not yet calculated CVE-2022-32159

MISC

CONFIRM mend — directus

  In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans. 2022-06-22 not yet calculated CVE-2022-23080

MISC

CONFIRM mend — openlibrary

  In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Reflected XSS. 2022-06-22 not yet calculated CVE-2022-23081

MISC

CONFIRM mend — recipes

  In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23073

MISC

MISC mend — recipes

  In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23074

MISC

MISC mend — recipes

  In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in “Add to Cart” functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the Add to Shopping Cart icon, an XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23072

MISC

CONFIRM mend — recipes

  In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the “Import Recipe” functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information. 2022-06-19 not yet calculated CVE-2022-23071

MISC

MISC meridian_cooperative — utility_software

  Meridian Cooperative Utility Software versions 22.02 and 22.03 allows remote attackers to obtain sensitive information such as name, address, and daily energy usage. 2022-06-24 not yet calculated CVE-2022-29578

MISC mgm — bigbluebutton

  BigBlueButton version 2.4.7 (or earlier) is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality. A threat actor could inject JavaScript payload in his/her username. The payload gets executed in the browser of the victim each time the attacker sends a private message to the victim or when notification about the attacker leaving room is displayed. 2022-06-24 not yet calculated CVE-2022-27238

MISC microweber — microweber

  Cross-site Scripting (XSS) – Reflected in GitHub repository microweber/microweber prior to 1.2.18. 2022-06-22 not yet calculated CVE-2022-2174

CONFIRM

MISC microweber — microweber

  Cross-site Scripting (XSS) – Reflected in GitHub repository microweber/microweber prior to 1.2.17. 2022-06-20 not yet calculated CVE-2022-2130

MISC

CONFIRM minicms — minicms

  A Cross-Site Request Forgery (CSRF) in MiniCMS v1.11 allows attackers to arbitrarily delete local .dat files via clicking on a malicious link. 2022-06-24 not yet calculated CVE-2022-33121

MISC motor-admin — motor-admin

  In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim. 2022-06-22 not yet calculated CVE-2022-23079

MISC

CONFIRM nginx — njs Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c. 2022-06-21 not yet calculated CVE-2022-31306

MISC

MISC nginx — njs

  Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c. 2022-06-21 not yet calculated CVE-2022-31307

MISC

MISC nginx — njs 

  Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c. 2022-06-21 not yet calculated CVE-2022-32414

MISC

MISC nukeviet — nukeviet

  There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02. 2022-06-21 not yet calculated CVE-2022-30874

MISC nuuo — network_video_recorder_nvrsolo NUUO Network Video Recorder NVRsolo v03.06.02 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via login.php. 2022-06-21 not yet calculated CVE-2022-33119

MISC obda_systems — mastro

  XML eXternal Entity (XXE) in OBDA systems’ Mastro 1.0 allows remote attackers to read system files via custom DTDs. 2022-06-21 not yet calculated CVE-2021-40510

MISC

MISC obda_systems — mastro

  OBDA systems’ Mastro 1.0 is vulnerable to XML Entity Expansion (aka “billion laughs”) attack allowing denial of service. 2022-06-21 not yet calculated CVE-2021-40511

MISC

MISC offis — dcmtk

  OFFIS DCMTK’s (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. 2022-06-24 not yet calculated CVE-2022-2120

MISC offis — dcmtk

  OFFIS DCMTK’s (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition. 2022-06-24 not yet calculated CVE-2022-2121

MISC offis — dcmtk

  OFFIS DCMTK’s (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. 2022-06-24 not yet calculated CVE-2022-2119

MISC online_student_rate_system — online_student_rate_system

  Cross Site Scripting (XSS) vulnerability exists in Online Student Rate System 1.0 via the page parameter on the index.php file 2022-06-24 not yet calculated CVE-2021-39408

MISC online_student_rate_system — online_student_rate_system

  A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated. 2022-06-24 not yet calculated CVE-2021-39409

MISC open_identity_platfor — openam

  The NT auth module in OpenAM before 14.6.6 allows a “replace Samba username attack.” 2022-06-23 not yet calculated CVE-2022-34298

MISC

MISC

MISC opencart

— opencart

  In OpenCart 1.4.7 to 1.5.5.1, implemented anti-traversal code in filemanager.php is ineffective and can be bypassed. 2022-06-24 not yet calculated CVE-2013-1891

MISC

MISC

MISC pain_clown — 74cmsse 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/index. 2022-06-23 not yet calculated CVE-2022-33092

MISC pain_clown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the key parameter at /freelance/resume_list. 2022-06-23 not yet calculated CVE-2022-33093

MISC pain_clown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/campus/campus_job. 2022-06-23 not yet calculated CVE-2022-33097

MISC pain_clown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/resume/index. 2022-06-23 not yet calculated CVE-2022-33096

MISC pain_clown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/jobfairol/resumelist. 2022-06-23 not yet calculated CVE-2022-33095

MISC pain_clown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/map. 2022-06-23 not yet calculated CVE-2022-33094

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /job. 2022-06-23 not yet calculated CVE-2022-32125

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company. 2022-06-23 not yet calculated CVE-2022-32126

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/view_be_browsed/total. 2022-06-23 not yet calculated CVE-2022-32127

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/service/increment/add/im. 2022-06-23 not yet calculated CVE-2022-32128

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade. 2022-06-23 not yet calculated CVE-2022-32129

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/down_resume/total/nature. 2022-06-23 not yet calculated CVE-2022-32130

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /index/notice/show. 2022-06-23 not yet calculated CVE-2022-32131

MISC painclown — 74cmsse

  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /index/jobfairol/show/. 2022-06-23 not yet calculated CVE-2022-32124

MISC phabricator — mediawiki

  In the RSS extension for MediaWiki through 1.38.1, when the $wgRSSAllowLinkTag config variable was set to true, and a new RSS feed was created with certain XSS payloads within its description tags and added to the $wgRSSUrlWhitelist config variable, stored XSS could occur via MediaWiki’s template system whenever that feed was loaded via the rss document tag. 2022-06-25 not yet calculated CVE-2022-34491

MISC

MISC pmb — pmb

  PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see request to index.php. 2022-06-23 not yet calculated CVE-2022-34328

MISC polonel — trudesk

  Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4. 2022-06-20 not yet calculated CVE-2022-2128

MISC

CONFIRM polonel — trudesk

  Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4. 2022-06-20 not yet calculated CVE-2022-2023

CONFIRM

MISC protobuf — protobuf Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33070

MISC

MISC pure_storage — multiple_products Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to a privilege escalation via the manipulation of environment variables which can be exploited by a logged-in user to escape a restricted shell to an unrestricted shell with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32553

MISC pure_storage — multiple_products

  Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32554

MISC pure_storage — multiple_products

  Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to a privilege escalation via the manipulation of Python environment variables which can be exploited by a logged-in user to escape a restricted shell to an unrestricted shell with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32552

MISC pypi — pypi The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34060

MISC

MISC

MISC pypi — pypi The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33004

MISC

MISC

MISC pypi — pypi The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34057

MISC

MISC pypi — pypi The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32999

MISC

MISC

MISC pypi — pypi The Texercise package in PyPI v0.0.1 to v0.0.12 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34066

MISC

MISC

MISC pypi — pypi The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32997

MISC

MISC

MISC pypi — pypi The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34055

MISC

MISC

MISC pypi — pypi

  The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33003

MISC

MISC

MISC pypi — pypi

  The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33002

MISC

MISC

MISC pypi — pypi

  The ML-Scanner package in PyPI v0.1.0 to v0.1.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33000

MISC

MISC

MISC pypi — pypi

  The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32998

MISC

MISC

MISC pypi — pypi

  The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34053

MISC

MISC

MISC pypi — pypi

  The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33001

MISC

MISC

MISC pypi — pypi

  The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34054

MISC

MISC

MISC pypi — pypi

  The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34064

MISC

MISC pypi — pypi

  The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34056

MISC

MISC

MISC pypi — pypi

  The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34059

MISC

MISC

MISC pypi — pypi

  The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34061

MISC

MISC

MISC pypi — pypi

  The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34065

MISC

MISC

MISC pypl — pypl

  ** Reserved ** The pyesasky for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.0-1.4.2. 2022-06-24 not yet calculated CVE-2022-30885

MISC

MISC

MISC python-ldap — python-ldap python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition. 2022-06-18 not yet calculated CVE-2021-46823

MISC

MISC qlik — qlik The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows SSRF. 2022-06-21 not yet calculated CVE-2021-36761

MISC quectel — rg502q-ea_modem

  The Quectel RG502Q-EA modem before 2022-02-23 allow OS Command Injection. 2022-06-21 not yet calculated CVE-2022-26147

MISC realtek — usb_driver

  Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services. 2022-06-20 not yet calculated CVE-2022-21742

MISC red_hat — amq_broker_operator

  A flaw was found in AMQ Broker Operator 7.9.4 installed via UI using OperatorHub where a low-privilege user that has access to the namespace where the AMQ Operator is deployed has access to clusterwide edit rights by checking the secrets. The service account used for building the Operator gives more permission than expected and an attacker could benefit from it. This requires at least an already compromised low-privilege account or insider attack. 2022-06-21 not yet calculated CVE-2022-1833

MISC red_hat — enterprise linux_for_ibm

  A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn’t. These kernel builds don’t have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code. 2022-06-21 not yet calculated CVE-2022-1665

MISC redis — redis Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. 2022-06-23 not yet calculated CVE-2022-33105

MISC

MISC

MISC

MISC salt — saltstack_salt

  An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth. 2022-06-23 not yet calculated CVE-2022-22967

MISC

MISC schneider_electric — geo_scada_mobile

  A CWE-668 Exposure of Resource to Wrong Sphere vulnerability exists that could cause users to be misled, hiding alarms, showing the wrong server connection option or the wrong control request when a mobile device has been compromised by a malicious application. Affected Product: Geo SCADA Mobile (Build 222 and prior) 2022-06-24 not yet calculated CVE-2022-32530

CONFIRM secheron — SEPCOS Control and Protection Relay Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed. 2022-06-24 not yet calculated CVE-2022-2102

MISC secheron — SEPCOS Control and Protection Relay

  The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool. 2022-06-24 not yet calculated CVE-2022-1666

MISC secheron — SEPCOS Control and Protection Relay

  An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories. 2022-06-24 not yet calculated CVE-2022-2103

MISC secheron — SEPCOS Control and Protection Relay

  Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters. 2022-06-24 not yet calculated CVE-2022-2105

MISC secheron — SEPCOS Control and Protection Relay

  Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script 2022-06-24 not yet calculated CVE-2022-1667

MISC secheron — SEPCOS Control and Protection Relay

  Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH. 2022-06-24 not yet calculated CVE-2022-1668

MISC securylight — ispyconnet_ispy

  iSpyConnect iSpy v7.2.2.0 is vulnerable to path traversal. 2022-06-21 not yet calculated CVE-2022-29774

MISC

MISC securylight — ispyconnet_ispy

  iSpyConnect iSpy v7.2.2.0 allows attackers to bypass authentication via a crafted URL. 2022-06-21 not yet calculated CVE-2022-29775

MISC

MISC shina_systems — sihas_sgw-300

  There is no account authentication and permission check logic in the firmware and existing apps of SiHAS’s SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device. 2022-06-23 not yet calculated CVE-2021-26637

MISC siemens — simatic_wincc_oa

  A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. 2022-06-21 not yet calculated CVE-2022-33139

MISC solarview_compact — solarview An arbitrary file upload vulnerability /images/background/1.php in of SolarView Compact 6.0 allows attackers to execute arbitrary code via a crafted php file. 2022-06-21 not yet calculated CVE-2022-31374

MISC solarview_compact — solarview

  SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Solar_AiConf.php. 2022-06-21 not yet calculated CVE-2022-31373

MISC sourcecodester — online_railway_reseration_system

  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/reservations/view_details.php. 2022-06-21 not yet calculated CVE-2022-33048

MISC sourcecodester — online_railway_reseration_system

  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/?page=user/manage_user. 2022-06-21 not yet calculated CVE-2022-33049

MISC sourcecodester — online_railway_reseration_system

  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/trains/manage_train.php. 2022-06-21 not yet calculated CVE-2022-33055

MISC sourcecodester — online_railway_reseration_system

  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/schedules/manage_schedule.php. 2022-06-21 not yet calculated CVE-2022-33056

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/prisons/view_prison.php:4 2022-06-24 not yet calculated CVE-2022-32405

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/prisons/manage_prison.php:4 2022-06-24 not yet calculated CVE-2022-32402

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_record.php:4 2022-06-24 not yet calculated CVE-2022-32403

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_inmate.php:3 2022-06-24 not yet calculated CVE-2022-32404

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/crimes/view_crime.php:4 2022-06-24 not yet calculated CVE-2022-32399

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/cells/manage_cell.php:4 2022-06-24 not yet calculated CVE-2022-32398

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/visits/view_visit.php:4 2022-06-24 not yet calculated CVE-2022-32397

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_privilege.php:4 2022-06-24 not yet calculated CVE-2022-32401

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/visits/manage_visit.php:4 2022-06-24 not yet calculated CVE-2022-32396

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/user/manage_user.php:4. 2022-06-24 not yet calculated CVE-2022-32400

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/crimes/manage_crime.php:4 2022-06-24 not yet calculated CVE-2022-32395

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/view_inmate.php:3 2022-06-24 not yet calculated CVE-2022-32394

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/cells/view_cell.php:4 2022-06-24 not yet calculated CVE-2022-32393

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/actions/manage_action.php:4 2022-06-24 not yet calculated CVE-2022-32392

MISC

MISC sourcecodester — prison_management_system

  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/actions/view_action.php:4 2022-06-24 not yet calculated CVE-2022-32391

MISC

MISC sourcecodester — school_file_management_system

  Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Firtstname parameter to the Update Account form in student_profile.php. 2022-06-23 not yet calculated CVE-2021-29055

MISC

MISC sourcecodester — school_file_management_system

  Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Lastname parameter to the Update Account form in student_profile.php. 2022-06-23 not yet calculated CVE-2021-46824

MISC

MISC

MISC srsolutions — usertakeover_plugin

  The UserTakeOver plugin before 4.0.1 for ILIAS allows an attacker to list all users via the search function. 2022-06-21 not yet calculated CVE-2022-31478

MISC

MISC suse — manager_server

  An Uncontrolled Resource Consumption vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37. 2022-06-22 not yet calculated CVE-2022-21952

CONFIRM suse — multiple_products

  A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37-1. 2022-06-22 not yet calculated CVE-2022-31248

CONFIRM swascan — docebo_community_edition

  ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain an arbitrary file upload vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2022-06-23 not yet calculated CVE-2022-31362

MISC

MISC swascan — docebo_community_edition

  ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain a SQL injection vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2022-06-23 not yet calculated CVE-2022-31361

MISC

MISC symantec_corporation — smg

  A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. 2022-06-24 not yet calculated CVE-2021-30651

MISC sysaid — okta_sso

  SysAid – Okta SSO integration – was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter’s value and searching for the AssertionConsumerServiceURL parameter’s value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks. 2022-06-24 not yet calculated CVE-2022-23170

MISC telesoft — vitalpbx

  Missing access control in the backup system of Telesoft VitalPBX before 3.2.1 allows attackers to access the PJSIP and SIP extension credentials, cryptographic keys and voicemails files via unspecified vectors. 2022-06-24 not yet calculated CVE-2022-29330

MISC

MISC tenable — tns An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges. 2022-06-21 not yet calculated CVE-2022-32973

MISC tenable — tns

  An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials. 2022-06-21 not yet calculated CVE-2022-32974

MISC thales — multiple_products

  Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command execution with high privileges. 2022-06-24 not yet calculated CVE-2021-42056

MISC tinyexr — tinyexr

  In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData. 2022-06-23 not yet calculated CVE-2022-34300

MISC titanftp — nextgen

  An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation. 2022-06-19 not yet calculated CVE-2022-34005

MISC titanftp — nextgen

  An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTINUsers as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITYSYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation. 2022-06-19 not yet calculated CVE-2022-34006

MISC totd — totd

  totd before 1.5.3 does not properly randomize mesg IDs. 2022-06-23 not yet calculated CVE-2022-34295

MISC

MISC

MISC

MISC twcert/cc — asus_control_center

  ASUS Control Center is vulnerable to SQL injection. An authenticated remote attacker with general user privilege can inject SQL command to specific API parameters to acquire database schema or access data. 2022-06-20 not yet calculated CVE-2022-26669

MISC twcert/cc — asus_control_center_api

  ASUS Control Center API has a broken access control vulnerability. An unauthenticated remote attacker can call privileged API functions to perform partial system operations or cause partial disrupt of service. 2022-06-20 not yet calculated CVE-2022-26668

MISC twcert/cc — twcert/cc

  NHI’s health insurance web service component has insufficient validation for input string length, which can result in heap-based buffer overflow attack. A remote attacker can exploit this vulnerability to flood the memory space reserved for the program, in order to terminate service without authentication, which requires a system restart to recover service. 2022-06-20 not yet calculated CVE-2021-45918

MISC underscore-99xp — underscore-99xp

  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in underscore-99xp v1.7.2 when the deepValueSearch function is called. 2022-06-24 not yet calculated CVE-2021-40894

MISC union-home — unioncms

  Unioncms v1.0.13 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Default settings. 2022-06-21 not yet calculated CVE-2022-25585

MISC

MISC validate-color — validate-color

  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-color v2.1.0 when handling crafted invalid rgb(a) strings. 2022-06-24 not yet calculated CVE-2021-40892

MISC validate-color — validate-color

  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-data v0.1.1 when validating crafted invalid emails. 2022-06-24 not yet calculated CVE-2021-40893

MISC vim — vim

  Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2126

MISC

CONFIRM

MLIST vim — vim

  Buffer Over-read in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2124

MISC

CONFIRM

MLIST vim — vim

  Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2183

MISC

CONFIRM vim — vim

  Buffer Over-read in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2175

MISC

CONFIRM vim — vim

  Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. 2022-06-20 not yet calculated CVE-2022-1720

MISC

CONFIRM

MLIST vim — vim

  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2125

CONFIRM

MISC vim — vim 

  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2182

MISC

CONFIRM vim — vim 

  Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2129

CONFIRM

MISC vmware — spring_cloud_function

  In Spring Cloud Function versions prior to 3.2.6, it is possible for a user who directly interacts with framework provided lookup functionality to cause a denial-of-service condition due to the caching issue in the Function Catalog component of the framework. 2022-06-21 not yet calculated CVE-2022-22979

MISC vmware — spring_data_mongodb

  A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized. 2022-06-23 not yet calculated CVE-2022-22980

MISC webkul — krayin_crm

  Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS). 2022-06-21 not yet calculated CVE-2021-41924

MISC wireapp — wire-ios wire-ios is an iOS client for the Wire secure messaging application. Invalid accent colors of Wire communication partners may render the iOS Wire Client partially unusable by causing it to crash multiple times on launch. These invalid accent colors can be used by and sent between Wire users. The root cause was an unnecessary assert statement when converting an integer value into the corresponding enum value, causing an exception instead of a fallback to a default value. This issue is fixed in [wire-ios](https://github.com/wireapp/wire-ios/commit/caa0e27dbe51f9edfda8c7a9f017d93b8cfddefb) and in Wire for iOS 3.100. There is no workaround available, but users may use other Wire clients (such as the [web app](https://app.wire.com)) to continue using Wire, or upgrade their client. 2022-06-23 not yet calculated CVE-2022-31009

MISC

CONFIRM wireapp — wire-webapp

  Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering `@mentions` in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and executed in the context of the victim allowing the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-05-04-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-05-04-production.0-v0.29.7-0-a6f2ded or wire-server 2022-05-04 (chart/4.11.0) or later. No known workarounds exist. 2022-06-25 not yet calculated CVE-2022-29168

CONFIRM worddpress — inline_google-maps_wordpress_plugin

  The Inline Google Maps WordPress plugin through 5.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping 2022-06-20 not yet calculated CVE-2022-1829

MISC wordpress — allow_svg_files_wordpress_plugin

  The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to 2022-06-20 not yet calculated CVE-2022-1939

MISC wordpress — better_find_and_replace_wordpress_plugin

  The Better Find and Replace WordPress plugin before 1.3.6 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection 2022-06-20 not yet calculated CVE-2022-1472

MISC wordpress — capa_protect_wordpress_plugin

  The CaPa Protect WordPress plugin through 0.5.8.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable the applied protection. 2022-06-20 not yet calculated CVE-2022-1832

MISC wordpress — coming_soon_&_maintenance_mode_by_colorlib_wordpress_plugin

  The Coming Soon & Maintenance Mode by Colorlib WordPress plugin before 1.0.99 does not sanitize and escape some settings, allowing high privilege users such as admin to perform Stored Cross-Site Scripting when unfiltered_html is disallowed (for example in multisite setup) 2022-06-20 not yet calculated CVE-2022-1945

MISC wordpress — cross-linker_wordpress_plugin The Cross-Linker WordPress plugin through 3.0.1.9 does not have CSRF check in place when creating Cross-Links, which could allow attackers to make a logged in admin perform such action via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1826

MISC wordpress — custom_share_buttons_with_floating_sidear_wordpress_plugin

  The Custom Share Buttons with Floating Sidebar WordPress plugin before 4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed 2022-06-20 not yet calculated CVE-2022-1717

MISC wordpress — download_manager_plugin

  A vulnerability, which was classified as problematic, was found in Download Manager Plugin 2.8.99. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. 2022-06-24 not yet calculated CVE-2017-20093

MISC

MISC wordpress — events_made_easy_wordpress_plugin

  The Events Made Easy WordPress plugin before 2.2.81 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection 2022-06-20 not yet calculated CVE-2022-1905

MISC wordpress — file_manager_plugin

  A vulnerability was found in File Manager Plugin 3.0.1. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. 2022-06-23 not yet calculated CVE-2017-20091

N/A

N/A wordpress — global_content_blocks_plugin

  A vulnerability was found in Global Content Blocks Plugin 2.1.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. 2022-06-23 not yet calculated CVE-2017-20090

N/A

N/A wordpress — google_analytics_dashboard_plugin

  A vulnerability classified as problematic was found in Google Analytics Dashboard Plugin 2.1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely. 2022-06-24 not yet calculated CVE-2017-20092

MISC

MISC wordpress — gwolle_guestbook_plugin

  A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. 2022-06-23 not yet calculated CVE-2017-20089

N/A

N/A wordpress — mail_subscribe_list_wordpress_plugin

  The Mail Subscribe List WordPress plugin before 2.1.4 does not have CSRF check in place when deleting subscribed users, which could allow attackers to make a logged in admin perform such action and delete arbitrary users from the subscribed list 2022-06-20 not yet calculated CVE-2022-1603

MISC wordpress — multi-page_toolkit_wordpress_plugin

  The Multi-page Toolkit WordPress plugin through 2.6 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well 2022-06-20 not yet calculated CVE-2022-1818

MISC wordpress — newsletter_wordpress_plugin

  The Newsletter WordPress plugin before 7.4.6 does not escape and sanitise the preheader_text setting, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfilteredhtml is disallowed 2022-06-20 not yet calculated CVE-2022-1889

MISC wordpress — newstatpress_plugin

  A vulnerability, which was classified as problematic, has been found in NewStatPress Plugin 1.2.4. This issue affects some unknown processing. The manipulation leads to basic cross site scripting (Persistent). The attack may be initiated remotely. Upgrading to version 1.2.5 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-24 not yet calculated CVE-2017-20094

MISC

MISC wordpress — ocean_extra_wordpress_plugin

  The Ocean Extra WordPress plugin before 1.9.5 does not escape generated links which are then used when the OceanWP is active, leading to a Reflected Cross-Site Scripting issue 2022-06-20 not yet calculated CVE-2021-25104

MISC wordpress — pdf24_article_to_pdf_wordpress_plugin

  The PDF24 Article To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1827

MISC wordpress — pdf24_article_to_pdf_wordpress_plugin

  The PDF24 Articles To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1828

MISC wordpress — post_grid,_slider_&_carousel_ultimate_wordpress_plugin The Post Grid, Slider & Carousel Ultimate WordPress plugin before 1.5.0 does not sanitise and escape the Header Title, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. 2022-06-20 not yet calculated CVE-2022-1266

MISC wordpress — print,_pdf,_email_by_printfriendly_wordpress_plugin

  The Print, PDF, Email by PrintFriendly WordPress plugin before 5.2.3 does not sanitise and escape the Custom Button Text settings, which could allow high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed 2022-06-20 not yet calculated CVE-2022-0663

MISC wordpress — rating_by_bestwebsoft_wordpress_plugin

  The Rating by BestWebSoft WordPress plugin through 1.5 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating 2022-06-20 not yet calculated CVE-2021-25121

MISC wordpress — seamless_donations_wordpress_plugin

  The Seamless Donations WordPress plugin before 5.1.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1610

MISC wordpress — siple_ads_manager_plugin

  A vulnerability classified as critical was found in Simple Ads Manager Plugin. This vulnerability affects unknown code. The manipulation leads to code injection. The attack can be initiated remotely. 2022-06-24 not yet calculated CVE-2017-20095

MISC

MISC wordpress — supsystic_popup_plugin A vulnerability was found in Supsystic Popup Plugin 1.7.6 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-20 not yet calculated CVE-2017-20065

N/A

N/A

N/A

N/A wordpress — underconstruction_wordpress_plugin

  The underConstruction WordPress plugin before 1.20 does not have CSRF check in place when deactivating the construction mode, which could allow attackers to make a logged in admin perform such action via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1895

MISC wordpress — underconstructrion_wordpress_plugin

  The underConstruction WordPress plugin before 1.21 does not sanitise or escape the “Display a custom page using your own HTML” setting before outputting it, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiletred_html capability is disallowed. 2022-06-20 not yet calculated CVE-2022-1896

MISC wordpress — vaultpress_plugin

  A vulnerability, which was classified as critical, was found in VaultPress Plugin 1.8.4. This affects an unknown part. The manipulation leads to code injection. It is possible to initiate the attack remotely. 2022-06-23 not yet calculated CVE-2017-20086

N/A

N/A wordpress — very_simple_contact_form_wordpress_plugin

  The Very Simple Contact Form WordPress plugin before 11.6 exposes the solution to the captcha in the rendered contact form, both as hidden input fields and as plain text in the page, making it very easy for bots to bypass the captcha check, rendering the page a likely target for spam bots. 2022-06-20 not yet calculated CVE-2022-1801

MISC wordpress — wordpress_plugin_user_photo In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved. 2022-06-24 not yet calculated CVE-2013-1916

MISC

MISC

MISC wordpress — wp-emial_wordpress_plugin

  The WP-EMail WordPress plugin before 2.69.0 does not protect its log deletion functionality with nonce checks, allowing attacker to make a logged in admin delete logs via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1630

MISC wordpress — wp-filebase_download_manager_plugin

  A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. 2022-06-24 not yet calculated CVE-2017-20097

MISC

MISC wordpress — wp-spamfree_anti-spam_plugin

  A vulnerability classified as problematic has been found in WP-SpamFree Anti-Spam Plugin 2.1.1.4. This affects an unknown part. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. 2022-06-24 not yet calculated CVE-2017-20096

MISC

MISC wordpress — wp-zillow_review_slider_wordpress_plugin

  The WP Zillow Review Slider WordPress plugin before 2.4 does not escape a settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite) 2022-06-20 not yet calculated CVE-2022-1915

MISC wordpress — wplite_wordpress_plugin

  The WPlite WordPress plugin through 1.3.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1831

MISC wordpress — xml_sitemaps_wordpress_plugin

  The XML Sitemaps WordPress plugin before 4.1.3 does not sanitise and escape a settings before outputting it in the Debug page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-06-20 not yet calculated CVE-2021-25088

MISC wordpress — athahualpa_theme_wordress_plugin

  A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. 2022-06-23 not yet calculated CVE-2017-20088

N/A

N/A wordpress — athahualpa_theme_wordress_plugin

  A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely. 2022-06-23 not yet calculated CVE-2017-20085

N/A

N/A wordprss — amazon_einzeltitlelinks_wordpress_plugin

  The Amazon Einzeltitellinks WordPress plugin through 1.3.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping 2022-06-20 not yet calculated CVE-2022-1830

MISC wp-emial_wordpress_plugin

  The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visitor’s IP from certain HTTP headers over PHP’s REMOTE_ADDR, which makes it possible to bypass IP-based anti-spamming restrictions. 2022-06-20 not yet calculated CVE-2022-1614

MISC xi_s&d — smarthomes(smartcare)

  Improper Authentication vulnerability in S&D smarthome(smartcare) application can cause authentication bypass and information exposure. Remote attackers can use this vulerability to take control of the home environment including indoor control. 2022-06-23 not yet calculated CVE-2021-26638

MISC zalando — skipper

  In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. 2022-06-23 not yet calculated CVE-2022-34296

MISC zulip — zulip

  Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds. 2022-06-25 not yet calculated CVE-2022-31017

CONFIRM

Related News

Hackers using USB drives to spread malware in ongoing attack

Hackers using USB drives to spread malware in ongoing attack

According to a recent post by the cybersecurity firm Mandiant, USB drives are being used to hack targets in Southeast…
AI-Powered Smart Glasses Give Deaf People the Power of Speech

AI-Powered Smart Glasses Give Deaf People the Power of Speech

In a recent example of innovative technology making a positive difference, there is now new artificial intelligence (AI) powered smart…
16,000+ Scam Domains Aimed at FIFA World Cup Fans in Qatar

16,000+ Scam Domains Aimed at FIFA World Cup Fans in Qatar

Seeing as scammers readily jump to capitalize on events with huge global interest, it comes as no surprise that Group-IB…