Vulnerability Summary for the Week of December 26, 2022

Released
Jan 04, 2023
Document ID
SB23-002

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 


 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
dlink -- dir-846_firmwareD-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the lan(0)_dhcps_staticlist parameter in the SetIpMacBindSettings function.2022-12-239.9CVE-2022-46641
MISC
MISC
dlink -- dir-846_firmwareD-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the auto_upgrade_hour parameter in the SetAutoUpgradeInfo function.2022-12-239.9CVE-2022-46642
MISC
MISC
usememos -- memosImproper Authentication in GitHub repository usememos/memos prior to 0.9.0.2022-12-239.8CVE-2022-4686
MISC
CONFIRM
linux -- linux_kernelAn issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT.2022-12-239.8CVE-2022-47939
MISC
MISC
MISC
MLIST
thinkphp -- thinkphpThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.2022-12-239.8CVE-2022-47945
MISC
MISC
MISC
activitywatch -- activitywatchActivity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file.2022-12-239.6CVE-2021-32692
CONFIRM
simmeth -- lieferantenmanagerAn issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can make various API calls without authentication because the password in a Credential Object is not checked.2022-12-259.1CVE-2022-44013
MISC
iofinnet -- tss-libIO FinNet tss-lib before 2.0.0 allows a collision of hash values.2022-12-239.1CVE-2022-47931
MISC
MISC
json5 -- json5JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later.2022-12-248.8CVE-2022-46175
MISC
MISC
MISC
ampache -- ampacheUnrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6.2022-12-238.8CVE-2022-4665
CONFIRM
MISC
usememos -- memosImproper Access Control in GitHub repository usememos/memos prior to 0.9.0.2022-12-238.8CVE-2022-4684
CONFIRM
MISC
usememos -- memosImproper Authorization in GitHub repository usememos/memos prior to 0.9.0.2022-12-238.8CVE-2022-4688
CONFIRM
MISC
usememos -- memosImproper Access Control in GitHub repository usememos/memos prior to 0.9.0.2022-12-238.8CVE-2022-4689
CONFIRM
MISC
linux -- linux_kernelAn issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.2022-12-238.8CVE-2022-47942
MISC
MISC
MISC
MLIST
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the rm_rlcache_file command to obtain root privileges. IBM X-Force ID: 236690.2022-12-238.4CVE-2022-41290
MISC
MISC
auth0 -- jsonwebtokenVersions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.2022-12-238.1CVE-2022-23539
MISC
MISC
usememos -- memosIncorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.2022-12-238.1CVE-2022-4687
CONFIRM
MISC
linux -- linux_kernelAn issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.2022-12-238.1CVE-2022-47940
MISC
MISC
MISC
MLIST
hcltech -- bigfix_server_automationBigFix deployments that have installed the Notification Service on Windows are susceptible to disclosing SMTP BigFix operator's sensitive data in clear text. Operators who use Notification Service related content from BES Support are at risk of leaving their SMTP sensitive data exposed.2022-12-247.5CVE-2022-38658
MISC
python -- setuptoolsPython Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.2022-12-237.5CVE-2022-40897
MISC
MISC
CONFIRM
MISC
MISC
wheel_project -- wheelAn issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.2022-12-237.5CVE-2022-40898
MISC
MISC
MISC
pythoncharmers -- python-futureAn issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.2022-12-237.5CVE-2022-40899
MISC
MISC
MISC
MISC
simmeth -- lieferantenmanagerAn issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '"ImagesPath":"C:\\"' value.2022-12-257.5CVE-2022-44016
MISC
linux -- linux_kernelAn issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.2022-12-237.5CVE-2022-47941
MISC
MISC
MISC
MLIST

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
simmeth -- lieferantenmanagerAn issue was discovered in Simmeth Lieferantenmanager before 5.6. In the design of the API, a user is inherently able to fetch arbitrary SQL tables. This leaks all user passwords and MSSQL hashes via /DS/LM_API/api/SelectionService/GetPaggedTab.2022-12-256.5CVE-2022-44014
MISC
nbnbk_project -- nbnbknbnbk commit 879858451d53261d10f77d4709aee2d01c72c301 was discovered to contain an arbitrary file read vulnerability via the component /api/Index/getFileBinary.2022-12-236.5CVE-2022-46492
MISC
usememos -- memosSensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository usememos/memos prior to 0.9.0.2022-12-236.5CVE-2022-4683
CONFIRM
MISC
brave -- braveBrave Browser before 1.43.34 allowed a remote attacker to cause a denial of service via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This vulnerability is caused by an incomplete fix for CVE-2022-47933.2022-12-246.5CVE-2022-47932
MISC
MISC
MISC
MISC
brave -- braveBrave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc.2022-12-246.5CVE-2022-47933
MISC
MISC
MISC
MISC
MISC
brave -- braveBrave Browser before 1.43.88 allowed a remote attacker to cause a denial of service in private and guest windows via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This is caused by an incomplete fix for CVE-2022-47932 and CVE-2022-47934.2022-12-246.5CVE-2022-47934
MISC
MISC
MISC
MISC
MISC
linux -- linux_kernelAn issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.2022-12-236.5CVE-2022-47938
MISC
MISC
MISC
MLIST
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 235181.2022-12-236.2CVE-2022-39164
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in CAA to cause a denial of service. IBM X-Force ID: 235183.2022-12-236.2CVE-2022-39165
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX TCP/IP kernel extension to cause a denial of service. IBM X-Force ID: 235599.2022-12-236.2CVE-2022-40233
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX NFS kernel extension to cause a denial of service. IBM X-Force ID: 238640.2022-12-236.2CVE-2022-43380
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 238639.2022-12-236.2CVE-2022-43381
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169.2022-12-236.2CVE-2022-43848
MISC
MISC
ibm -- aixIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX pfcdd kernel extension to cause a denial of service. IBM X-Force ID: 239170.2022-12-236.2CVE-2022-43849
MISC
MISC
typora -- typoraCross Site Scripting (XSS) vulnerability in typora through 1.38 allows remote attackers to run arbitrary code via export from editor.2022-12-236.1CVE-2022-40011
MISC
MISC
MISC
simmeth -- lieferantenmanagerAn issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted.2022-12-255.4CVE-2022-44012
MISC
snipeitapp -- snipe-itSnipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets.2022-12-255.4CVE-2022-44380
CONFIRM
usememos -- memosCross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.2022-12-235.4CVE-2022-4690
CONFIRM
MISC
usememos -- memosCross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.2022-12-235.4CVE-2022-4692
CONFIRM
MISC
f-secure -- safeF-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack.2022-12-235.4CVE-2022-47524
CONFIRM
ibm -- security_verify_governanceIBM Security Verify Governance, Identity Manager 10.01 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 224915.2022-12-245.3CVE-2022-22449
MISC
MISC
pi-hole -- adminltePi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.2022-12-235.3CVE-2022-23513
MISC
MISC
snipeitapp -- snipe-itSnipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request.2022-12-255.3CVE-2022-44381
CONFIRM
properfraction -- profilepressThe ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp_user_cover_default_image_url’ parameter in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.2022-12-234.8CVE-2022-4697
MISC
MISC
properfraction -- profilepressThe ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several form fields in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.2022-12-234.8CVE-2022-4698
MISC
MISC
ibm -- iIBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305.2022-12-244.3CVE-2022-43860
MISC
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
There were no low vulnerabilities recorded this week.

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
go -- multiple_products
 
The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow.2022-12-27not yet calculatedCVE-2013-10005
MISC
MISC
lz4 -- lz4_bindings
 
LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input.2022-12-27not yet calculatedCVE-2014-125026
MISC
MISC
MISC
tbdev -- tbdev
.
A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The name of the patch is 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147.2022-12-31not yet calculatedCVE-2014-125027
MISC
MISC
MISC
MISC
valtech -- idp_test_client
 
A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148.2022-12-31not yet calculatedCVE-2014-125028
MISC
MISC
MISC
jwt -- jwt
 
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.2022-12-27not yet calculatedCVE-2015-10004
MISC
MISC
MISC
markdown-it -- markdown-it
 
A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852.2022-12-27not yet calculatedCVE-2015-10005
MISC
MISC
MISC
MISC
golf -- golf
 
CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests.2022-12-27not yet calculatedCVE-2016-15005
MISC
MISC
MISC
MISC
gorilla -- gorilla_handlers
 
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.2022-12-27not yet calculatedCVE-2017-20146
MISC
MISC
MISC
challenge_website --challenge_website 
 
A vulnerability was found in challenge website. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is f1644b1d3502e5aa5284f31ea80d2623817f4d42. It is recommended to apply a patch to fix this issue. The identifier VDB-216989 was assigned to this vulnerability.2022-12-28not yet calculatedCVE-2017-20150
MISC
MISC
MISC
itext -- rups
 
A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability.2022-12-30not yet calculatedCVE-2017-20151
MISC
MISC
MISC
aerouk -- imageserve
 
A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056.2022-12-30not yet calculatedCVE-2017-20152
MISC
MISC
MISC
MISC
aerouk -- imageserve
 
A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability.2022-12-30not yet calculatedCVE-2017-20153
MISC
MISC
MISC
MISC
phoenixcoin -- phoenixcoin
 
A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068.2022-12-30not yet calculatedCVE-2017-20154
MISC
MISC
MISC
MISC
sterc -- google_analytics_dashboard_modx
 
A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability.2022-12-30not yet calculatedCVE-2017-20155
MISC
MISC
MISC
MISC
MISC
MISC
exciting -- printer 
 
A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The name of the patch is 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139.2022-12-31not yet calculatedCVE-2017-20156
MISC
MISC
MISC
MISC
ariadne --component_libraryA vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140.2022-12-31not yet calculatedCVE-2017-20157
MISC
MISC
MISC
MISC
N/A -- N/A
 
A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability.2022-12-31not yet calculatedCVE-2017-20159
MISC
MISC
MISC
MISC
flitto --express_param
 
A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability.2022-12-31not yet calculatedCVE-2017-20160
MISC
MISC
MISC
MISC
MISC
opera --opera_mini_for_androidThe Opera Mini application 47.1.2249.129326 for Android allows remote attackers to spoof the Location Permission dialog via a crafted web site.2022-12-26not yet calculatedCVE-2018-16135
MISC
archiver -- archiver
 
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.2022-12-27not yet calculatedCVE-2018-25046
MISC
MISC
MISC
email_existence -- email_existence
 
A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2018-25049
MISC
MISC
MISC
MISC
harvest -- chosen
 
A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 is able to address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956.2022-12-28not yet calculatedCVE-2018-25050
MISC
MISC
MISC
MISC
MISC
pomash -- pomash 
 
A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability.2022-12-28not yet calculatedCVE-2018-25051
MISC
MISC
MISC
cpan --catalyst_plugin_session
 
A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID Handler. The manipulation of the argument sid leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.41 is able to address this issue. The name of the patch is 88d1b599e1163761c9bd53bec53ba078f13e09d4. It is recommended to upgrade the affected component. VDB-216958 is the identifier assigned to this vulnerability.2022-12-28not yet calculatedCVE-2018-25052
MISC
MISC
MISC
MISC
json2html -- json2html
 
A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959.2022-12-28not yet calculatedCVE-2018-25053
MISC
MISC
MISC
MISC
cilla -- cilla
 
A vulnerability was found in shred cilla. It has been classified as problematic. Affected is an unknown function of the file cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp of the component Search Handler. The manipulation of the argument details leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is d345e6bc7798bd717a583ec7f545ca387819d5c7. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216960.2022-12-28not yet calculatedCVE-2018-25054
MISC
MISC
MISC
farcry_solr_pro_plugin -- farcry_solr_pro_plugin
 
A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability.2022-12-28not yet calculatedCVE-2018-25055
MISC
MISC
MISC
MISC
MISC
yolapi -- yolapi
 
A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability.2022-12-28not yet calculatedCVE-2018-25056
MISC
MISC
MISC
simple_php_link_shortener -- simple_php_link_shortener
 
A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link["id"] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996.2022-12-28not yet calculatedCVE-2018-25057
MISC
MISC
MISC
twitter_post_fetcher -- twitter_post_fetcher
 
A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.2022-12-29not yet calculatedCVE-2018-25058
MISC
MISC
MISC
MISC
MISC
pastebinit -- pastebinit
 
A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040.2022-12-30not yet calculatedCVE-2018-25059
MISC
MISC
MISC
MISC
MISC
macaron -- csrf
 
A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability.2022-12-30not yet calculatedCVE-2018-25060
MISC
MISC
MISC
MISC
rgb2hex -- rgb2hex
 
A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151.2022-12-31not yet calculatedCVE-2018-25061
MISC
MISC
MISC
MISC
sierra_wireless -- aleos
 
The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.2022-12-26not yet calculatedCVE-2019-11851
CONFIRM
MISC
sierra_wireless -- mgos
 
Sierra Wireless MGOS before 3.15.2 and 4.x before 4.3 allows attackers to read log files via a Direct Request (aka Forced Browsing).2022-12-26not yet calculatedCVE-2019-13988
MISC
MISC
hashicorp -- nomad
 
HashiCorp Nomad 0.5.0 through 0.9.4 (fixed in 0.9.5) reveals unintended environment variables to the rendering task during template rendering, aka GHSA-6hv3-7c34-4hx8. This applies to nomad/client/allocrunner/taskrunner/template.2022-12-26not yet calculatedCVE-2019-14802
MISC
CONFIRM
citrix -- adc/gateway
 
In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update.2022-12-26not yet calculatedCVE-2019-18177
MISC
cloud_native_computing -- harbor
 
Cloud Native Computing Foundation Harbor before 1.10.3 and 2.x before 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists.2022-12-26not yet calculatedCVE-2019-19030
CONFIRM
realtek -- audio_drivers
 
Realtek Audio Drivers for Windows, as used on the Lenovo ThinkPad X1 Carbon 20A7, 20A8, 20BS, and 20BT before 6.0.8882.1 and 20KH and 20KG before 6.0.8907.1 (and on many other Lenovo and non-Lenovo products), mishandles DLL preloading.2022-12-26not yet calculatedCVE-2019-19705
MISC
tendermint  -- core
 
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.2022-12-27not yet calculatedCVE-2019-25072
MISC
MISC
MISC
goa -- goa
 
Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory.2022-12-27not yet calculatedCVE-2019-25073
MISC
MISC
MISC
hide_files -- hide_files
 
A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767.2022-12-25not yet calculatedCVE-2019-25084
MISC
MISC
MISC
MISC
MISC
gnome -- gvdb
 
A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability.2022-12-26not yet calculatedCVE-2019-25085
MISC
MISC
MISC
iet-ou -- open_media_player
 
A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2019-25086
MISC
MISC
MISC
MISC
MISC
MISC
httpserver -- httpserver
 
A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be initiated remotely. The name of the patch is 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216863.2022-12-27not yet calculatedCVE-2019-25087
MISC
MISC
MISC
oxidized_web -- oxidized_web
 
A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2019-25088
MISC
MISC
MISC
MISC
morgawr -- muon
 
A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2019-25089
MISC
MISC
MISC
MISC
freepbx -- arimanager
 
A vulnerability was found in FreePBX arimanager up to 13.0.5.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Views Handler. The manipulation of the argument dataurl leads to cross site scripting. The attack may be launched remotely. Upgrading to version 13.0.5.4 is able to address this issue. The name of the patch is 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. It is recommended to upgrade the affected component. VDB-216878 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2019-25090
MISC
MISC
MISC
MISC
nsupdate.info -- nsupdate.info
 
A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file src/nsupdate/settings/base.py of the component CSRF Cookie Handler. The manipulation of the argument CSRF_COOKIE_HTTPONLY leads to cookie without 'httponly' flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2019-25091
MISC
MISC
MISC
MISC
nakiami -- mellivora
 
A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry['ip'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955.2022-12-28not yet calculatedCVE-2019-25092
MISC
MISC
MISC
MISC
pilz -- pmc_programming_tool
 
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames.2022-12-26not yet calculatedCVE-2019-9011
MISC
nexenta -- nexenta_stor
 
An issue was discovered in Illumos in Nexenta NexentaStor 4.0.5 and 5.1.2, and other products. The SMB server allows an attacker to have unintended access, e.g., an attacker with WRITE_XATTR can change permissions. This occurs because of a combination of three factors: ZFS extended attributes are used to implement NT named streams, the SMB protocol requires implementations to have open handle semantics similar to those of NTFS, and the SMB server passes along certain attribute requests to the underlying object (i.e., they are not considered to be requests that pertain to the named stream).2022-12-26not yet calculatedCVE-2019-9579
MISC
MISC
jackson-databind -- jackson-databind
 
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.2022-12-26not yet calculatedCVE-2020-10650
MISC
CONFIRM
MISC
MISC
CONFIRM
MISC
sierra_wireless -- airlink_mobility_manager
 
Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges.2022-12-26not yet calculatedCVE-2020-11101
MISC
MISC
pilz -- pmc_programming_tool
 
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's password may be changed by an attacker without knowledge of the current password.2022-12-26not yet calculatedCVE-2020-12067
MISC
pilz -- pmc_programming_tool
 
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), the password-hashing feature requires insufficient computational effort.2022-12-26not yet calculatedCVE-2020-12069
MISC
shilpi -- cape_x_web
 
Shilpi CAPExWeb 1.1 allows SQL injection via a servlet/capexweb.cap_sendMail GET request.2022-12-26not yet calculatedCVE-2020-24600
MISC
togglz -- togglz
 
The console in Togglz before 2.9.4 allows CSRF.2022-12-26not yet calculatedCVE-2020-28191
CONFIRM
CONFIRM
CONFIRM
httpengine.handle -- httpengine.handle
 
Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.2022-12-27not yet calculatedCVE-2020-36559
MISC
MISC
MISC
MISC
go-unzip -- go-unzip
 
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.2022-12-27not yet calculatedCVE-2020-36560
MISC
MISC
MISC
MISC
unzip -- unzip
 
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.2022-12-27not yet calculatedCVE-2020-36561
MISC
MISC
MISC
MISC
dht -- dht
 
Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector.2022-12-28not yet calculatedCVE-2020-36562
MISC
MISC
go-saml -- go-saml
 
XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input.2022-12-28not yet calculatedCVE-2020-36563
MISC
MISC
nosurf -- nosurf
 
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.2022-12-27not yet calculatedCVE-2020-36564
MISC
MISC
MISC
tar-utils -- tar-utils
 
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.2022-12-27not yet calculatedCVE-2020-36566
MISC
MISC
MISC
gin -- gin
 
Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.2022-12-27not yet calculatedCVE-2020-36567
MISC
MISC
MISC
revel -- revel
 
Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.2022-12-27not yet calculatedCVE-2020-36568
MISC
MISC
MISC
MISC
golang-nanoauth -- golang-nanoauth
 
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.2022-12-27not yet calculatedCVE-2020-36569
MISC
MISC
MISC
panel-builder -- panel-builder
 
A vulnerability classified as critical has been found in Modern Tribe Panel Builder Plugin. Affected is the function add_post_content_filtered_to_search_sql of the file ModularContent/SearchFilter.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4528d4f855dbbf24e9fc12a162fda84ce3bedc2f. It is recommended to apply a patch to fix this issue. VDB-216738 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2020-36626
MISC
MISC
MISC
macaron -- i18n
 
A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.2022-12-25not yet calculatedCVE-2020-36627
MISC
MISC
MISC
calsign -- apde
 
A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747.2022-12-25not yet calculatedCVE-2020-36628
MISC
MISC
MISC
simbco -- httpster
 
A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748.2022-12-25not yet calculatedCVE-2020-36629
MISC
MISC
MISC
freepbx -- cdr
 
A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771.2022-12-25not yet calculatedCVE-2020-36630
MISC
MISC
MISC
MISC
barronwaffles -- dwc_network_server_emulator
 
A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772.2022-12-25not yet calculatedCVE-2020-36631
MISC
MISC
MISC
MISC
hughsk -- flat
 
A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.2022-12-25not yet calculatedCVE-2020-36632
MISC
MISC
MISC
MISC
MISC
MISC
moodle-block_sitenews -- moodle-block_sitenews
 
A vulnerability was found in moodle-block_sitenews 1.0. It has been classified as problematic. This affects the function get_content of the file block_sitenews.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.1 is able to address this issue. The name of the patch is cd18d8b1afe464ae6626832496f4e070bac4c58f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216879.2022-12-27not yet calculatedCVE-2020-36633
MISC
MISC
MISC
MISC
MISC
indeed_engineering -- util
 
A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2020-36634
MISC
MISC
MISC
MISC
openmrs -- appointment_scheduling_module
 
A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.13.0 is able to address this issue. The name of the patch is 34213c3f6ea22df427573076fb62744694f601d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216915.2022-12-27not yet calculatedCVE-2020-36635
MISC
MISC
MISC
MISC
MISC
openmrs -- admin_ui_module
 
A vulnerability classified as problematic has been found in OpenMRS Admin UI Module up to 1.4.x. Affected is the function sendErrorMessage of the file omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java of the component Account Setup Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 702fbfdac7c4418f23bb5f6452482b4a88020061. It is recommended to upgrade the affected component. VDB-216918 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2020-36636
MISC
MISC
MISC
MISC
MISC
wordpress -- wordpress
 
The Menu Item Visibility Control WordPress plugin through 0.5 doesn't sanitize and validate the "Visibility logic" option for WordPress menu items, which could allow highly privileged users to execute arbitrary PHP code even in a hardened environment.2022-12-26not yet calculatedCVE-2021-24942
MISC
wordpress -- wordpress
 
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php.2022-12-26not yet calculatedCVE-2021-30134
MISC
glob-parent -- glob-parent
 
The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.2022-12-26not yet calculatedCVE-2021-35065
CONFIRM
CONFIRM
MISC
fastrack -- reflex_2.0_activity_tracker
 
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows an Unauthenticated Remote attacker to send a malicious firmware update via BLE and brick the device.2022-12-26not yet calculatedCVE-2021-35951
MISC
MISC
fastrack -- reflex_2.0_activity_tracker
 
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to change the time, date, and month via Bluetooth LE Characteristics on handle 0x0017.2022-12-26not yet calculatedCVE-2021-35952
MISC
MISC
fastrack -- reflex_2.0_activity_tracker
 
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to cause a Denial of Service (device outage) via crafted choices of the last three bytes of a characteristic value.2022-12-26not yet calculatedCVE-2021-35953
MISC
MISC
fastrack -- reflex_2.0_activity_tracker
 
fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows physically proximate attackers to dump the firmware, flash custom malicious firmware, and brick the device via the Serial Wire Debug (SWD) feature.2022-12-26not yet calculatedCVE-2021-35954
MISC
MISC
go -- golang.org/x/text
 
golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.2022-12-26not yet calculatedCVE-2021-38561
MISC
MISC
CONFIRM
MISC
philips -- vue_pacs
 
In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.2022-12-26not yet calculatedCVE-2021-39369
MISC
MISC
MISC
go-yaml -- yaml
 
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.2022-12-27not yet calculatedCVE-2021-4235
MISC
MISC
MISC
web -- websockets
 
Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.2022-12-27not yet calculatedCVE-2021-4236
MISC
MISC
goutils -- goutils
 
Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions.2022-12-27not yet calculatedCVE-2021-4238
MISC
MISC
noise -- noise
 
The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.2022-12-27not yet calculatedCVE-2021-4239
MISC
MISC
dns-stats -- hedgehog
 
A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don’t believe this specific attack is possible without such a compromise of the Data Manager server.2022-12-25not yet calculatedCVE-2021-4276
MISC
MISC
MISC
fredsmith -- utils
 
A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability.2022-12-25not yet calculatedCVE-2021-4277
MISC
MISC
cronvel -- tree-kit
 
A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability.2022-12-25not yet calculatedCVE-2021-4278
MISC
MISC
MISC
MISC
json-patch -- json-patch
 
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.2022-12-25not yet calculatedCVE-2021-4279
MISC
MISC
MISC
MISC
MISC
stylerw -- styler_praat_scripts
 
A vulnerability was found in styler_praat_scripts. It has been classified as problematic. Affected is an unknown function of the file file_segmenter.praat of the component Slash Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The name of the patch is 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216780.2022-12-25not yet calculatedCVE-2021-4280
MISC
MISC
MISC
brave_ux -- for-the-badge
 
A vulnerability was found in Brave UX for-the-badge and classified as critical. Affected by this issue is some unknown functionality of the file .github/workflows/combine-prs.yml. The manipulation leads to os command injection. The name of the patch is 55b5a234c0fab935df5fb08365bc8fe9c37cf46b. It is recommended to apply a patch to fix this issue. VDB-216842 is the identifier assigned to this vulnerability.2022-12-26not yet calculatedCVE-2021-4281
MISC
MISC
MISC
MISC
freepbx -- voicemail
 
A vulnerability was found in FreePBX voicemail. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file page.voicemail.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is 12e1469ef9208eda9d8955206e78345949236ee6. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216871.2022-12-27not yet calculatedCVE-2021-4282
MISC
MISC
MISC
MISC
freepbx -- voicemail
 
A vulnerability was found in FreeBPX voicemail. It has been rated as problematic. Affected by this issue is some unknown functionality of the file views/ssettings.php of the component Settings Handler. The manipulation of the argument key leads to cross site scripting. The attack may be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is ffce4882016076acd16fe0f676246905aa3cb2f3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216872.2022-12-27not yet calculatedCVE-2021-4283
MISC
MISC
MISC
MISC
openmrs -- html_form_entry_ui_framework_integration_module
 
A vulnerability classified as problematic has been found in OpenMRS HTML Form Entry UI Framework Integration Module up to 1.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 811990972ea07649ae33c4b56c61c3b520895f07. It is recommended to upgrade the affected component. The identifier VDB-216873 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2021-4284
MISC
MISC
MISC
MISC
MISC
MISC
nagiosenterprises -- ncpa
 
A vulnerability classified as problematic was found in Nagios NCPA. This vulnerability affects unknown code of the file agent/listener/templates/tail.html. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.4.0 is able to address this issue. The name of the patch is 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. It is recommended to upgrade the affected component. VDB-216874 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2021-4285
MISC
MISC
MISC
MISC
MISC
cocagne -- pysrp
 
A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875.2022-12-27not yet calculatedCVE-2021-4286
MISC
MISC
MISC
MISC
MISC
refirm_labs -- binwalk
 
A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 is able to address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876.2022-12-27not yet calculatedCVE-2021-4287
MISC
MISC
MISC
MISC
MISC
openmrs -- module-referenceapplication
 
A vulnerability was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/userApp.gsp. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 35f81901a4cb925747a9615b8706f5079d2196a1. It is recommended to upgrade the affected component. The identifier VDB-216881 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2021-4288
MISC
MISC
MISC
MISC
MISC
openmrs -- module-referenceapplication
 
A vulnerability classified as problematic was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. Affected by this vulnerability is the function post of the file omod/src/main/java/org/openmrs/module/referenceapplication/page/controller/UserAppPageController.java of the component User App Page. The manipulation of the argument AppId leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 0410c091d46eed3c132fe0fcafe5964182659f74. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216883.2022-12-27not yet calculatedCVE-2021-4289
MISC
MISC
MISC
MISC
MISC
MISC
dhbw -- fallstudie
 
A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907.2022-12-27not yet calculatedCVE-2021-4290
MISC
MISC
MISC
openmrs -- admin_ui_module
 
A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.2022-12-27not yet calculatedCVE-2021-4291
MISC
MISC
MISC
MISC
MISC
openmrs -- admin_ui_module
 
A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2021-4292
MISC
MISC
MISC
MISC
MISC
openshift -- osin
 
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.2022-12-28not yet calculatedCVE-2021-4294
MISC
MISC
MISC
MISC
onc_code-validator-api -- onc_code-validator-api
 
A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.2022-12-29not yet calculatedCVE-2021-4295
MISC
MISC
MISC
MISC
MISC
w3c_unicorn --w3c_unicorn
 
A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019.2022-12-29not yet calculatedCVE-2021-4296
MISC
MISC
MISC
MISC
multiple_products -- multiple_products
 
An issue was discovered in illumos before f859e7171bb5db34321e45585839c6c3200ebb90, OmniOS Community Edition r151038, OpenIndiana Hipster 2021.04, and SmartOS 20210923. A local unprivileged user can cause a deadlock and kernel panic via crafted rename and rmdir calls on tmpfs filesystems. Oracle Solaris 10 and 11 is also affected.2022-12-26not yet calculatedCVE-2021-43395
CONFIRM
CONFIRM
CONFIRM
MISC
MISC
MISC
MISC
CONFIRM
CONFIRM
heimdal -- heimdal
 
Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.2022-12-26not yet calculatedCVE-2021-44758
MISC
CONFIRM
mediawiki -- mediawiki
 
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis.2022-12-26not yet calculatedCVE-2021-44854
MISC
mediawiki -- mediawiki
 
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature.2022-12-26not yet calculatedCVE-2021-44855
MISC
mediawiki -- mediawiki
 
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value.2022-12-26not yet calculatedCVE-2021-44856
MISC
control_web_panel/control_web_panel -- control_web_panel/control_web_panel
 
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, attackers can make a crafted request to api/?api=add_server&DHCP= to add an authorized_keys text file in the /resources/ folder.2022-12-26not yet calculatedCVE-2021-45466
MISC
MISC
control_web_panel/control_web_panel -- control_web_panel/control_web_panel
 
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.2022-12-26not yet calculatedCVE-2021-45467
MISC
MISC
metersphere -- metersphere
 
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.2022-12-28not yet calculatedCVE-2022-23544
MISC
MISC
alpine -- alpine
 
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows URL access filter bypass. This issue has been fixed in version 1.10.4. There are no known workarounds.2022-12-28not yet calculatedCVE-2022-23553
MISC
MISC
MISC
alpine -- alpine
 
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows Authentication Filter bypass. The AuthenticationFilter relies on the request URI to evaluate if the user is accessing the swagger endpoint. By accessing a URL with a path such as /api/foo;%2fapi%2fswagger the contains condition will hold and will return from the authentication filter without aborting the request. Note that the principal object will not be assigned and therefore the issue wont allow user impersonation. This issue has been fixed in version 1.10.4. There are no known workarounds.2022-12-28not yet calculatedCVE-2022-23554
MISC
MISC
MISC
authentik -- authentik
 
authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provided. The vulnerability allows an attacker that knows different invitation flows names (e.g. `enrollment-invitation-test` and `enrollment-invitation-admin`) via either different invite links or via brute forcing to signup via a single invitation url for any valid invite link received (it can even be a url for a third flow as long as it's a valid invite) as the token used in the `Invitations` section of the Admin interface does NOT change when a different `enrollment flow` is selected via the interface and it is NOT bound to the selected flow, so it will be valid for any flow when used. This issue is patched in authentik 2022.11.4,2022.10.4 and 2022.12.0. Only configurations that use invitations and have multiple enrollment flows with invitation stages that grant different permissions are affected. The default configuration is not vulnerable, and neither are configurations with a single enrollment flow. As a workaround, fixed data can be added to invitations which can be checked in the flow to deny requests. Alternatively, an identifier with high entropy (like a UUID) can be used as flow slug, mitigating the attack vector by exponentially decreasing the possibility of discovering other flows.2022-12-28not yet calculatedCVE-2022-23555
MISC
general_electric -- inet/inet_ii
 
Certain General Electric Renewable Energy products have inadequate encryption strength. This affects iNET and iNET II before 8.3.0.2022-12-26not yet calculatedCVE-2022-24116
MISC
general_electric -- inet/inet_ii
 
Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.2022-12-26not yet calculatedCVE-2022-24117
MISC
general_electric -- inet/inet_ii
 
Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.2022-12-26not yet calculatedCVE-2022-24118
MISC
general_electric -- inet/inet_ii
 
Certain General Electric Renewable Energy products have a hidden feature for unauthenticated remote access to the device configuration shell. This affects iNET and iNET II before 8.3.0.2022-12-26not yet calculatedCVE-2022-24119
MISC
general_electric -- inet/inet_ii
 
Certain General Electric Renewable Energy products store cleartext credentials in flash memory. This affects iNET and iNET II before 8.3.0.2022-12-26not yet calculatedCVE-2022-24120
MISC
aws -- sdk
 
The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it.2022-12-27not yet calculatedCVE-2022-2582
MISC
MISC
golang -- golang
 
A race condition can cause incorrect HTTP request routing.2022-12-27not yet calculatedCVE-2022-2583
MISC
MISC
golang -- dagpb
 
The dag-pb codec can panic when decoding invalid blocks.2022-12-27not yet calculatedCVE-2022-2584
MISC
MISC
devolutions --remote_desktop_manager
 
Weak password derivation for export in Devolutions Remote Desktop Manager before 2022.1 allows information disclosure via a password brute-force attack. An error caused base64 to be decoded.2022-12-26not yet calculatedCVE-2022-26964
CONFIRM
directus -- directus
 
In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true.2022-12-26not yet calculatedCVE-2022-26969
MISC
CONFIRM
MISC
MISC
MISC
open-xchange -- app_suite
 
OX App Suite through 8.2 allows XSS because BMFreehand10 and image/x-freehand are not blocked.2022-12-26not yet calculatedCVE-2022-29852
MISC
CONFIRM
open-xchange -- app_suite
 
OX App Suite through 8.2 allows XSS via a certain complex hierarchy that forces use of Show Entire Message for a huge HTML e-mail message.2022-12-26not yet calculatedCVE-2022-29853
MISC
CONFIRM
emerson -- deltav_distributed_control_system
 
Emerson DeltaV Distributed Control System (DCS) has insufficient verification of firmware integrity (an inadequate checksum approach, and no signature). This affects versions before 14.3 of DeltaV M-series, DeltaV S-series, DeltaV P-series, DeltaV SIS, and DeltaV CIOC/EIOC/WIOC IO cards.2022-12-26not yet calculatedCVE-2022-30260
MISC
MISC
reprise_software -- rlm_license_administration
 
XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field.2022-12-29not yet calculatedCVE-2022-30519
MISC
go-yaml -- go-yaml
 
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.2022-12-27not yet calculatedCVE-2022-3064
MISC
MISC
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class="deep-link-app" for a /#!!&app=%2e./ URI.2022-12-26not yet calculatedCVE-2022-31469
CONFIRM
MISC
rockwell_automation -- studio_5000_logix_emulate_software
 
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.2022-12-27not yet calculatedCVE-2022-3156
MISC
golang -- golang
 
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.2022-12-28not yet calculatedCVE-2022-3346
MISC
MISC
golang -- golang
 
DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.2022-12-28not yet calculatedCVE-2022-3347
MISC
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can access or modify system files or other files that are critical to the application, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-34669
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure.2022-12-30not yet calculatedCVE-2022-34670
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-34671
MISC
nvidia -- control_panel
 
NVIDIA Control Panel for Windows contains a vulnerability where an unauthorized user or an unprivileged regular user can compromise the security of the software by gaining privileges, reading sensitive information, or executing commands.2022-12-30not yet calculatedCVE-2022-34672
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-34673
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak.2022-12-30not yet calculatedCVE-2022-34674
MISC
nvidia -- gpu_display_driver
 
NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34675
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-34676
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering.2022-12-30not yet calculatedCVE-2022-34677
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause a null-pointer dereference, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34678
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34679
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34680
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler, where improper input validation of a display-related data structure may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34681
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34682
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service.2022-12-30not yet calculatedCVE-2022-34683
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an off-by-one error may lead to data tampering or information disclosure.2022-12-30not yet calculatedCVE-2022-34684
MISC
hazelcast -- hazelcast/hazelcast_jet
 
The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3.2022-12-29not yet calculatedCVE-2022-36437
MISC
password_manager -- password_manager
 
Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter.2022-12-26not yet calculatedCVE-2022-36664
MISC
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature.2022-12-26not yet calculatedCVE-2022-37307
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages.2022-12-26not yet calculatedCVE-2022-37308
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name.2022-12-26not yet calculatedCVE-2022-37309
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI.2022-12-26not yet calculatedCVE-2022-37310
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large location request parameter to the redirect servlet.2022-12-26not yet calculatedCVE-2022-37311
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet.2022-12-26not yet calculatedCVE-2022-37312
CONFIRM
MISC
open-xchange -- app_suite
 
OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record.2022-12-26not yet calculatedCVE-2022-37313
CONFIRM
MISC
enlightenment --enlightenment_sys
 
enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.2022-12-25not yet calculatedCVE-2022-37706
MISC
MISC
MISC
esri -- arcgis
 
There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets).2022-12-28not yet calculatedCVE-2022-38202
CONFIRM
esri -- arcgis
 
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212.2022-12-29not yet calculatedCVE-2022-38203
MISC
esri -- arcgis
 
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.2022-12-29not yet calculatedCVE-2022-38204
MISC
esri -- arcgis
 
In some non-default installations of Esri Portal for ArcGIS versions 10.9.1 and below, a directory traversal issue may allow a remote, unauthenticated attacker to traverse the file system and lead to the disclosure of sensitive data (not customer-published content).2022-12-29not yet calculatedCVE-2022-38205
MISC
esri -- arcgis
 
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser.2022-12-29not yet calculatedCVE-2022-38206
MISC
esri -- arcgis
 
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked which could execute arbitrary JavaScript code in the victim’s browser.2022-12-29not yet calculatedCVE-2022-38207
MISC
esri -- arcgis
 
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.2022-12-29not yet calculatedCVE-2022-38208
MISC
esri -- arcgis
 
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser.2022-12-29not yet calculatedCVE-2022-38209
MISC
esri -- arcgis
 
There is a reflected HTML injection vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser.2022-12-29not yet calculatedCVE-2022-38210
CONFIRM
esri -- arcgis
 
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.9.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212.2022-12-29not yet calculatedCVE-2022-38211
CONFIRM
esri -- arcgis
 
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38203.2022-12-29not yet calculatedCVE-2022-38212
MISC
wordpress -- wordpress
 
The Kwayy HTML Sitemap WordPress plugin before 4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-3835
MISC
wordpress -- wordpress
 
The Login for Google Apps WordPress plugin before 3.4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-3840
MISC
huawei -- aslan_childrens_watch
 
Huawei Aslan Children's Watch has an improper input validation vulnerability. Successful exploitation may cause the watch's application service abnormal.2022-12-28not yet calculatedCVE-2022-39012
MISC
wordpress -- wordpress
 
The Broken Link Checker WordPress plugin before 1.11.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)2022-12-28not yet calculatedCVE-2022-3922
MISC
intelbras -- wifiber_120ac_inmesh
 
Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute.2022-12-25not yet calculatedCVE-2022-40005
MISC
MISC
wordpress -- wordpress
 
The Paytium: Mollie payment forms & donations WordPress plugin through 4.3.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4042
MISC
wordpress -- wordpress
 
The Return Refund and Exchange For WooCommerce WordPress plugin before 4.0.9 does not validate attachment files to be uploaded via an AJAX action available to unauthenticated users, which could allow them to upload arbitrary files such as PHP and lead to RCE2022-12-26not yet calculatedCVE-2022-4047
MISC
wordpress -- wordpress
 
The Eventify™ WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4110
MISC
wordpress -- wordpress
 
The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection.2022-12-26not yet calculatedCVE-2022-4117
MISC
wordpress -- wordpress
 
The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain2022-12-26not yet calculatedCVE-2022-4120
MISC
squid -- squid
 
An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7.2022-12-25not yet calculatedCVE-2022-41317
MISC
MISC
CONFIRM
MISC
squid -- squid
 
A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.2022-12-25not yet calculatedCVE-2022-41318
MISC
MISC
MISC
CONFIRM
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4150
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id GET parameter before concatenating it to an SQL query in export-images-data.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4151
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5, Contest Gallery Pro WordPress plugin before 19.1.5 do not escape the option_id POST parameter before concatenating it to an SQL query in edit-options.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4152
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the upload[] POST parameter before concatenating it to an SQL query in get-data-create-upload-v10.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4153
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4154
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4155
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4156
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4157
MISC
MISC
huawei -- multiple_products
 
There is an insufficient authentication vulnerability in some Huawei band products. Successful exploit could allow the attacker to spoof then connect to the band.2022-12-28not yet calculatedCVE-2022-41579
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4158
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4159
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4160
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_start POST parameter before concatenating it to an SQL query in copy-gallery-images.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4161
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4162
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_deactivate and cg_activate POST parameters before concatenating it to an SQL query in 2_deactivate.php and 4_activate.php, respectively. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4163
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_multiple_files_for_post POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4164
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4165
MISC
MISC
wordpress -- wordpress
 
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the addCountS POST parameter before concatenating it to an SQL query in 4_activate.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.2022-12-26not yet calculatedCVE-2022-4166
MISC
MISC
mediawiki -- mediawiki
 
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users.2022-12-26not yet calculatedCVE-2022-41765
MISC
mediawiki -- mediawiki
 
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup.2022-12-26not yet calculatedCVE-2022-41767
MISC
xstream -- xstream
 
XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.2022-12-28not yet calculatedCVE-2022-41966
MISC
MISC
hyperadev -- dragonfly
 
Dragonfly is a Java runtime dependency management library. Dragonfly v0.3.0-SNAPSHOT does not configure DocumentBuilderFactory to prevent XML external entity (XXE) attacks. This issue is patched in 0.3.1-SNAPSHOT. As a workaround, since Dragonfly only parses XML `SNAPSHOT` versions are being resolved, this vulnerability may be avoided by not trying to resolve `SNAPSHOT` versions.2022-12-28not yet calculatedCVE-2022-41967
MISC
MISC
wordpress -- wordpress
 
The Sliderby10Web WordPress plugin before 1.2.53 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4197
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure.2022-12-30not yet calculatedCVE-2022-42254
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-42255
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-42256
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service.2022-12-30not yet calculatedCVE-2022-42257
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure.2022-12-30not yet calculatedCVE-2022-42258
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service.2022-12-30not yet calculatedCVE-2022-42259
MISC
wordpress -- wordpress
 
The Simple Basic Contact Form WordPress plugin before 20221201 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4226
MISC
nvidia -- gpu_display_driver
 
NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-42260
MISC
nvidia -- vgpu_manager
 
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.2022-12-30not yet calculatedCVE-2022-42261
MISC
nvidia -- vgpu_manager
 
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.2022-12-30not yet calculatedCVE-2022-42262
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure.2022-12-30not yet calculatedCVE-2022-42263
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service.2022-12-30not yet calculatedCVE-2022-42264
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure or data tampering.2022-12-30not yet calculatedCVE-2022-42265
MISC
nvidia -- gpu_display_driver
 
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can cause exposure of sensitive information to an actor that is not explicitly authorized to have access to that information, which may lead to limited information disclosure.2022-12-30not yet calculatedCVE-2022-42266
MISC
nvidia -- gpu_display_driverNVIDIA GPU Display Driver for Windows contains a vulnerability where a regular user can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.2022-12-30not yet calculatedCVE-2022-42267
MISC
nvidia -- trusted_os
 
NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components.2022-12-30not yet calculatedCVE-2022-42269
MISC
wordpress -- wordpress
 
The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting2022-12-26not yet calculatedCVE-2022-4227
MISC
nvidia -- multiple_products
 
NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service.2022-12-30not yet calculatedCVE-2022-42270
MISC
wordpress -- wordpress
 
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id.2022-12-26not yet calculatedCVE-2022-4239
MISC
wordpress -- wordpress
 
The WP Google Review Slider WordPress plugin before 11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4242
MISC
wordpress -- wordpress
 
The ImageInject WordPress plugin through TODO does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).2022-12-26not yet calculatedCVE-2022-4243
MISC
wordpress -- wordpress
 
The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack2022-12-26not yet calculatedCVE-2022-4266
MISC
wordpress -- wordpress
 
The Bulk Delete Users by Email WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting2022-12-26not yet calculatedCVE-2022-4267
MISC
wordpress -- wordpress
 
The Plugin Logic WordPress plugin through 1.0.7 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin2022-12-26not yet calculatedCVE-2022-4268
MISC
MISC

samba -- kerberos/ad_dc

heimdal -- heimdal

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."2022-12-25not yet calculatedCVE-2022-42898
CONFIRM
MISC
MISC
CONFIRM
CONFIRM
CONFIRM
CONFIRM
zkteco -- multiple_products
 
Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210).2022-12-25not yet calculatedCVE-2022-42953
MISC
MISC
apache -- kylin
 
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.2022-12-30not yet calculatedCVE-2022-43396
MISC
curl -- curl
 
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.2022-12-23not yet calculatedCVE-2022-43551
MISC
MISC
simmeth -- lieferantenmanager
 
An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure.2022-12-25not yet calculatedCVE-2022-44015
MISC
simmeth -- lieferantenmanager
 
An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout.2022-12-25not yet calculatedCVE-2022-44017
MISC
sourcecodester -- sanitization_management_system
 
SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection.2022-12-30not yet calculatedCVE-2022-44137
MISC
huawei -- aslan_children_watch
 
Huawei Aslan Children's Watch has a path traversal vulnerability. Successful exploitation may allow attackers to access or modify protected system resources.2022-12-28not yet calculatedCVE-2022-44564
MISC
apache -- kylin
 
Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request.2022-12-30not yet calculatedCVE-2022-44621
MISC
heimdal -- heimdalHeimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).2022-12-25not yet calculatedCVE-2022-44640
CONFIRM
slixmpp -- slixmpp
 
Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp.2022-12-25not yet calculatedCVE-2022-45197
MISC
MISC
MISC
CONFIRM
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated request of MQTT credentials. An attacker can obtain encrypted MQTT credentials by sending a specific crafted packet to the vulnerable interface (the credentials cannot be directly exploited).2022-12-27not yet calculatedCVE-2022-45423
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated request of AES crypto key. An attacker can obtain the AES crypto key by sending a specific crafted packet to the vulnerable interface.2022-12-27not yet calculatedCVE-2022-45424
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability.2022-12-27not yet calculatedCVE-2022-45425
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unrestricted download of file. After obtaining the permissions of ordinary users, by sending a specific crafted packet to the vulnerable interface, an attacker can download arbitrary files.2022-12-27not yet calculatedCVE-2022-45426
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files.2022-12-27not yet calculatedCVE-2022-45427
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of sensitive information leakage. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can obtain the debugging information.2022-12-27not yet calculatedCVE-2022-45428
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules.2022-12-27not yet calculatedCVE-2022-45429
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service.2022-12-27not yet calculatedCVE-2022-45430
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server.2022-12-27not yet calculatedCVE-2022-45431
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server.2022-12-27not yet calculatedCVE-2022-45432
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.2022-12-27not yet calculatedCVE-2022-45433
MISC
dahua -- multiple_products
 
Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host.2022-12-27not yet calculatedCVE-2022-45434
MISC
hillstone -- firewall
 
https://www.hillstonenet.com.cn/ Hillstone Firewall SG-6000 <= 5.0.4.0 is vulnerable to Incorrect Access Control. There is a permission bypass vulnerability in the Hillstone WEB application firewall. An attacker can enter the background of the firewall with super administrator privileges through a configuration error in report.m.2022-12-27not yet calculatedCVE-2022-45778
MISC
huawei -- aslan_children_watch
 
Huawei Aslan Children's Watch has an improper authorization vulnerability. Successful exploit could allow the attacker to access certain file.2022-12-28not yet calculatedCVE-2022-45874
MISC
planet_estream -- planet_estream
 
Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter).2022-12-25not yet calculatedCVE-2022-45889
MISC
planet_estream -- planet_estream
 
In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter).2022-12-25not yet calculatedCVE-2022-45890
MISC
planet_estream -- planet_estream
 
Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList).2022-12-25not yet calculatedCVE-2022-45891
MISC
planet_estream -- planet_estream
 
In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username.2022-12-25not yet calculatedCVE-2022-45892
MISC
planet_estream -- planet_estream
 
Planet eStream before 6.72.10.07 allows a low-privileged user to gain access to administrative and high-privileged user accounts by changing the value of the ON cookie. A brute-force attack can calculate a value that provides permanent access.2022-12-25not yet calculatedCVE-2022-45893
MISC
planet_estream -- planet_estream
 
GetFile.aspx in Planet eStream before 6.72.10.07 allows ..\ directory traversal to read arbitrary local files.2022-12-25not yet calculatedCVE-2022-45894
MISC
planet_estream -- planet_estream
 
Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure).2022-12-25not yet calculatedCVE-2022-45895
MISC
planet_estream -- planet_estream
 
Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution.2022-12-25not yet calculatedCVE-2022-45896
MISC
h3c_firewall -- h3c_firewall
 
h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability.2022-12-27not yet calculatedCVE-2022-45963
MISC
authentik -- authentik
 
authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4.2022-12-28not yet calculatedCVE-2022-46172
MISC
elrondnetwork -- elrond-go
 
Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn't found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50.2022-12-28not yet calculatedCVE-2022-46173
MISC
MISC
MISC
amazon -- elastic_file_system
 
efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later.2022-12-28not yet calculatedCVE-2022-46174
MISC
MISC
MISC
metersphere -- metersphere
 
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds.2022-12-29not yet calculatedCVE-2022-46178
MISC
liuos -- liuos
 
LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to "" (no quotes) to null the variable and force credential checks.2022-12-28not yet calculatedCVE-2022-46179
MISC
MISC
gotify -- gotify
 
Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory.2022-12-29not yet calculatedCVE-2022-46181
MISC
MISC
MISC
dedecms -- dedecms
 
dedecms <=V5.7.102 is vulnerable to SQL Injection. In sys_ sql_ n query.php there are no restrictions on the sql query.2022-12-27not yet calculatedCVE-2022-46442
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the user_edit_page parameter in the wifi_captive_portal function.2022-12-30not yet calculatedCVE-2022-46580
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.nslookup_target parameter in the tools_nslookup function.2022-12-30not yet calculatedCVE-2022-46581
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the login_name parameter in the do_graph_auth (sub_4061E0) function.2022-12-30not yet calculatedCVE-2022-46582
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reboot_type parameter in the wizard_ipv6 (sub_41C380) function.2022-12-30not yet calculatedCVE-2022-46583
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_deny (sub_415D7C) function.2022-12-30not yet calculatedCVE-2022-46584
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the REMOTE_USER parameter in the get_access (sub_45AC2C) function.2022-12-30not yet calculatedCVE-2022-46585
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow (sub_415B00) function.2022-12-30not yet calculatedCVE-2022-46586
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function.2022-12-30not yet calculatedCVE-2022-46588
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_option parameter in the tools_netstat (sub_41E730) function.2022-12-30not yet calculatedCVE-2022-46589
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_rsname parameter in the tools_netstat (sub_41E730) function.2022-12-30not yet calculatedCVE-2022-46590
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reject_url parameter in the reject (sub_41BD60) function.2022-12-30not yet calculatedCVE-2022-46591
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the set_sta_enrollee_pin_5g function.2022-12-30not yet calculatedCVE-2022-46592
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the do_sta_enrollee_wifi function.2022-12-30not yet calculatedCVE-2022-46593
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the update_file_name parameter in the auto_up_fw (sub_420A04) function.2022-12-30not yet calculatedCVE-2022-46594
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the del_num parameter in the icp_delete_img (sub_41DEDC) function.2022-12-30not yet calculatedCVE-2022-46596
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function.2022-12-30not yet calculatedCVE-2022-46597
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_5g function.2022-12-30not yet calculatedCVE-2022-46598
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setlogo_num parameter in the icp_setlogo_img (sub_41DBF4) function.2022-12-30not yet calculatedCVE-2022-46599
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_24g function.2022-12-30not yet calculatedCVE-2022-46600
MISC
trendnet -- tew755AP_1.13B01
 
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setbg_num parameter in the icp_setbg_img (sub_41DD68) function.2022-12-30not yet calculatedCVE-2022-46601
MISC
huawei -- ws7100-20
 
There is a denial of service vulnerability in the Wi-Fi module of the HUAWEI WS7100-20 Smart WiFi Router.Successful exploit could cause a denial of service (DoS) condition.2022-12-28not yet calculatedCVE-2022-46740
MISC
trueconf_server -- trueconf_server
 
A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 allows a low-privileged database user to execute arbitrary SQL commands as the database administrator, resulting in execution of arbitrary code.2022-12-27not yet calculatedCVE-2022-46763
MISC
MISC
trueconf_server -- trueconf_server
 
A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution.2022-12-27not yet calculatedCVE-2022-46764
MISC
MISC
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.2022-12-27not yet calculatedCVE-2022-4691
MISC
CONFIRM
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.2022-12-27not yet calculatedCVE-2022-4694
CONFIRM
MISC
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.2022-12-27not yet calculatedCVE-2022-4695
CONFIRM
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47115
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the SYSPS parameter at /goform/SysToolChangePwd.2022-12-30not yet calculatedCVE-2022-47116
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47117
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47118
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the ssid parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47119
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47120
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47121
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd_5g parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47122
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47123
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47124
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47125
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47126
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47127
MISC
tenda -- a15
 
Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet.2022-12-30not yet calculatedCVE-2022-47128
MISC
ikus060 -- rdiffweb
 
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4719
MISC
CONFIRM
ikus060 -- rdiffweb
 
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4720
CONFIRM
MISC
ikus060 -- rdiffweb
 
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4721
CONFIRM
MISC
ikus060 -- rdiffweb
 
Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4722
MISC
CONFIRM
ikus060 -- rdiffweb
 
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4723
MISC
CONFIRM
ikus060 -- rdiffweb
 
Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5.2022-12-27not yet calculatedCVE-2022-4724
MISC
CONFIRM
aws -- sdk
 
A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4725
MISC
MISC
MISC
MISC
sourcecodester -- sanitization_management_systemA vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739.2022-12-27not yet calculatedCVE-2022-4726
MISC
openmrs -- appointment_scheduling_module
 
A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4727
MISC
MISC
MISC
MISC
graphite -- web
 
A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4728
MISC
MISC
MISC
MISC
graphite -- web
 
A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743.2022-12-27not yet calculatedCVE-2022-4729
MISC
MISC
MISC
MISC
graphite -- web
 
A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744.2022-12-27not yet calculatedCVE-2022-4730
MISC
MISC
MISC
MISC
myapnea -- myapnea
 
A vulnerability, which was classified as problematic, was found in myapnea up to 29.0.x. Affected is an unknown function of the component Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 29.1.0 is able to address this issue. The name of the patch is 99934258530d761bd5d09809bfa6c14b598f8d18. It is recommended to upgrade the affected component. VDB-216750 is the identifier assigned to this vulnerability.2022-12-25not yet calculatedCVE-2022-4731
MISC
MISC
MISC
MISC
microweber -- microweber
 
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2.2022-12-27not yet calculatedCVE-2022-4732
CONFIRM
MISC
openemr -- openemr
 
Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.2.2022-12-27not yet calculatedCVE-2022-4733
MISC
CONFIRM
usememos -- memos
 
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository usememos/memos prior to 0.9.1.2022-12-27not yet calculatedCVE-2022-4734
CONFIRM
MISC
asrashley -- dash-live
 
A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. It is recommended to apply a patch to fix this issue. VDB-216766 is the identifier assigned to this vulnerability.2022-12-25not yet calculatedCVE-2022-4735
MISC
MISC
MISC
MISC
venganzas_del_pasado -- venganzas_del_pasado
 
A vulnerability was found in Venganzas del Pasado and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument the_title leads to cross site scripting. The attack may be launched remotely. The name of the patch is 62339b2ec445692c710b804bdf07aef4bd247ff7. It is recommended to apply a patch to fix this issue. VDB-216770 is the identifier assigned to this vulnerability.2022-12-25not yet calculatedCVE-2022-4736
MISC
MISC
MISC
MISC
sourcecodester -- blood_management_system
 
A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability.2022-12-25not yet calculatedCVE-2022-4737
MISC
MISC
sourcecodester -- blood_management_system
 
A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability.2022-12-25not yet calculatedCVE-2022-4738
MISC
MISC
sourcecodester -- blood_management_system
 
A vulnerability classified as critical was found in SourceCodester School Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216775.2022-12-25not yet calculatedCVE-2022-4739
MISC
MISC
kkfileview -- kkfileview
 
A vulnerability, which was classified as problematic, has been found in kkFileView. Affected by this issue is the function setWatermarkAttribute of the file /picturesPreview. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216776.2022-12-25not yet calculatedCVE-2022-4740
MISC
MISC
MISC
docconv -- docconv
 
A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779.2022-12-25not yet calculatedCVE-2022-4741
MISC
MISC
MISC
MISC
MISC
json-pointer -- json-pointer
 
A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability.2022-12-26not yet calculatedCVE-2022-4742
MISC
MISC
MISC
MISC
flatpress -- flatpress
 
A vulnerability was found in FlatPress. It has been classified as critical. This affects the function doItemActions of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component File Delete Handler. The manipulation of the argument deletefile leads to path traversal. The name of the patch is 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. It is recommended to apply a patch to fix this issue. The identifier VDB-216861 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4748
MISC
MISC
MISC
MISC
flatpress -- flatpress
 
A vulnerability was found in FlatPress and classified as problematic. This issue affects the function main of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component Media Manager Plugin. The manipulation of the argument mm-newgallery-name leads to cross site scripting. The attack may be initiated remotely. The name of the patch is d3f329496536dc99f9707f2f295d571d65a496f5. It is recommended to apply a patch to fix this issue. The identifier VDB-216869 was assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4755
MISC
MISC
MISC
MISC
dolibarr_project_timesheet -- dolibarr_project_timesheet
 
A vulnerability was found in dolibarr_project_timesheet up to 4.5.5. It has been declared as problematic. This vulnerability affects unknown code of the component Form Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. Upgrading to version 4.5.6.a is able to address this issue. The name of the patch is 082282e9dab43963e6c8f03cfaddd7921de377f4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216880.2022-12-27not yet calculatedCVE-2022-4766
MISC
MISC
MISC
MISC
MISC
usememos -- memos
 
Denial of Service in GitHub repository usememos/memos prior to 0.9.1.2022-12-27not yet calculatedCVE-2022-4767
CONFIRM
MISC
dropbox -- merou
 
A vulnerability was found in Dropbox merou. It has been classified as critical. Affected is the function add_public_key of the file grouper/public_key.py of the component SSH Public Key Handler. The manipulation of the argument public_key_str leads to injection. It is possible to launch the attack remotely. The name of the patch is d93087973afa26bc0a2d0a5eb5c0fde748bdd107. It is recommended to apply a patch to fix this issue. VDB-216906 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4768
MISC
MISC
MISC
MISC
widoco -- widoco
 
A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability.2022-12-27not yet calculatedCVE-2022-4772
MISC
MISC
MISC
MISC
elvexys -- streamx
 
StreamX applications from versions 6.02.01 to 6.04.34 are affected by a path traversal vulnerability that allows authenticated users to get unauthorized access to files on the server's filesystem. StreamX applications using StreamView HTML component with the public web server feature activated are affected.2022-12-29not yet calculatedCVE-2022-4778
MISC
elvexys -- streamx
 
StreamX applications from versions 6.02.01 to 6.04.34 are affected by a logic bug that allows to bypass the implemented authentication scheme. StreamX applications using StreamView HTML component with the public web server feature activated are affected.2022-12-29not yet calculatedCVE-2022-4779
MISC
elvexys -- streamx
 
ISOS firmwares from versions 1.81 to 2.00 contain hardcoded credentials from embedded StreamX installer that integrators are not forced to change.2022-12-29not yet calculatedCVE-2022-4780
MISC
linux -- kernel
 
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.2022-12-23not yet calculatedCVE-2022-47943
MISC
MISC
MISC
MLIST
linux -- kernel
 
An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.2022-12-23not yet calculatedCVE-2022-47946
MISC
MISC
MLIST
usememos -- memos
 
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4796
MISC
CONFIRM
heimdall -- application_dashboard
 
Heimdall Application Dashboard through 2.5.4 allows reflected and stored XSS via "Application name" to the "Add application" page. The stored XSS will be triggered in the "Application list" page.2022-12-27not yet calculatedCVE-2022-47968
MISC
MISC
usememos -- memos
 
Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4797
MISC
CONFIRM
usememos -- memos
 
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4798
MISC
CONFIRM
usememos -- memos
 
Improper Authentication in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4799
MISC
CONFIRM
usememos -- memos
 
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4800
MISC
CONFIRM
usememos -- memos
 
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4801
MISC
CONFIRM
usememos -- memos
 
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4802
MISC
CONFIRM
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4803
MISC
CONFIRM
usememos -- memos
 
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4804
MISC
CONFIRM
usememos -- memos
 
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4805
CONFIRM
MISC
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4806
MISC
CONFIRM
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4807
MISC
CONFIRM
usememos -- memos
 
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4808
MISC
CONFIRM
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4809
MISC
CONFIRM
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4810
MISC
CONFIRM
usememos -- memos
 
Improper Authorization in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4811
MISC
CONFIRM
usememos -- memos
 
Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4812
MISC
CONFIRM
usememos -- memos
 
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4813
MISC
CONFIRM
usememos -- memos
 
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.2022-12-28not yet calculatedCVE-2022-4814
MISC
CONFIRM
centic9 -- jgit-cookbook
 
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988.2022-12-28not yet calculatedCVE-2022-4817
MISC
MISC
MISC
MISC
talend -- open studio for mdm
 
A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability.2022-12-28not yet calculatedCVE-2022-4818
MISC
MISC
MISC
MISC
MISC
hotcrp -- hotcrp
 
A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability.2022-12-28not yet calculatedCVE-2022-4819
MISC
MISC
MISC
tp-link -- tl-wr902ac
 
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.2022-12-30not yet calculatedCVE-2022-48194
MISC
mellium -- mellium.im/sasl
 
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.2022-12-31not yet calculatedCVE-2022-48195
MISC
N/A -- N/A
 
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94.2022-12-30not yet calculatedCVE-2022-48196
MISC
MISC
netgear -- multiple_products
 
A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999.2022-12-28not yet calculatedCVE-2022-4820
MISC
MISC
MISC
MISC
flatpress -- flatpress
 
A vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000.2022-12-28not yet calculatedCVE-2022-4821
MISC
MISC
MISC
MISC
flatpress -- flatpress
 
A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability.2022-12-28not yet calculatedCVE-2022-4822
MISC
MISC
MISC
MISC
flatpress -- flatpress
 
A vulnerability, which was classified as problematic, was found in InSTEDD Nuntium. Affected is an unknown function of the file app/controllers/geopoll_controller.rb. The manipulation of the argument signature leads to observable timing discrepancy. It is possible to launch the attack remotely. The name of the patch is 77236f7fd71a0e2eefeea07f9866b069d612cf0d. It is recommended to apply a patch to fix this issue. VDB-217002 is the identifier assigned to this vulnerability.2022-12-28not yet calculatedCVE-2022-4823
MISC
MISC
MISC
instedd -- nuntium
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4839
CONFIRM
MISC
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4840
MISC
CONFIRM
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4841
MISC
CONFIRM
radareorg -- radare2
 
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.2022-12-29not yet calculatedCVE-2022-4843
CONFIRM
MISC
usememos -- memos
 
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4844
CONFIRM
MISC
usememos -- memos
 
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4845
MISC
CONFIRM
usememos -- memos
 
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4846
MISC
CONFIRM
usememos -- memos
 
Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4847
MISC
CONFIRM
usememos -- memos
 
Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4848
MISC
CONFIRM
usememos -- memos
 
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4849
CONFIRM
MISC
usememos -- memos
 
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4850
MISC
CONFIRM
usememos -- memos
 
Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1.2022-12-29not yet calculatedCVE-2022-4851
MISC
CONFIRM
sourcecodester -- lead_management_systemA vulnerability, which was classified as critical, was found in SourceCodester Lead Management System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-217020.2022-12-30not yet calculatedCVE-2022-4855
MISC
MISC
MISC
modbus_tools -- modbus_slave
 
A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability.2022-12-30not yet calculatedCVE-2022-4856
MISC
MISC
MISC
MISC
modbus_tools -- modbus_slave
 
A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability.2022-12-30not yet calculatedCVE-2022-4857
MISC
MISC
MISC
MISC
m-files -- server
 
Insertion of Sensitive Information into Log Files in M-Files Server before 22.10.11846.0 could allow to obtain sensitive tokens from logs, if specific configurations were set.2022-12-30not yet calculatedCVE-2022-4858
MISC
joget -- joget
 
A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The name of the patch is 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055.2022-12-30not yet calculatedCVE-2022-4859
MISC
MISC
MISC
MISC
kbase -- metrics
 
A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The name of the patch is 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059.2022-12-30not yet calculatedCVE-2022-4860
MISC
MISC
MISC
MISC
m-files -- client
 
Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource.2022-12-30not yet calculatedCVE-2022-4861
MISC
usememos -- memos
 
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.2022-12-30not yet calculatedCVE-2022-4863
MISC
CONFIRM
froxlor -- froxlor
 
Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.2022-12-30not yet calculatedCVE-2022-4864
MISC
CONFIRM
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.2022-12-31not yet calculatedCVE-2022-4865
CONFIRM
MISC
usememos -- memos
 
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.2022-12-31not yet calculatedCVE-2022-4866
CONFIRM
MISC
froxlor -- froxlor
 
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.2022-12-31not yet calculatedCVE-2022-4867
MISC
CONFIRM
froxlor -- froxlor
 
Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.2022-12-31not yet calculatedCVE-2022-4868
CONFIRM
MISC

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.