C
CISA
Guest
Original release date: September 26, 2022 | Last revised: September 27, 2022
Back to top
Back to top
Back to top
[TD]
[TD]
[TD]CVE-2022-2566
MISC[/TD]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-0143
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37032
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37775
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39217
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-39190
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35914
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35957
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36062
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35252
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35248
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32219
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35251
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35250
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32211
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35249
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32220
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35247
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32217
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35246
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32229
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32227
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32226
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32218
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32228
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-30124
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-41803
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40716
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40186
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-27774
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39197
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-36604
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2333
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2332
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28637
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28638
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28639
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28640
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37395
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39003
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-40019
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-36600
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39002
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-40023
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-36601
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39001
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39000
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-46836
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39008
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-40017
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39010
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39009
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39007
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39006
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39005
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39004
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-40024
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38999
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-46834
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-36602
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-46835
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-33735
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36025
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22423
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35253
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40748
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35721
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40616
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40608
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40234
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-34348
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-34026
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3251
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3268
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3232
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3233
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3267
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3250
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3274
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3269
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3213
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2070
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2025
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36338
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35894
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35895
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35408
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35896
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35893
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38576
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23554
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23553
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23556
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23551
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23552
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23555
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23550
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23557
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23560
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23559
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2020-23558
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-30121
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40755
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38550
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41225
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41251
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41248
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41247
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41230
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41232
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41231
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41226
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41253
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41254
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41255
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41252
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41239
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41238
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41237
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41242
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41224
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41227
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41229
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41228
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41241
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41234
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41233
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41250
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41249
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41236
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41243
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41244
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41240
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41235
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41246
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41245
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40978
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40979
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40149
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40150
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37205
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37204
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37203
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23461
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2177
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23948
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-43310
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23950
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23949
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23952
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23951
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40359
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23766
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23768
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23767
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41322
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40188
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2995
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3231
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28981
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28977
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28982
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39975
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28980
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38512
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28979
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28978
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36402
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3239
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41222
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41218
MISC
MISC
MLIST
MLIST
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40768
MISC
MISC
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2785
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28321
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2017-20148
MISC
GENTOO[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3257
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39221
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3263
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28201
MISC
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28204
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28203
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-32167
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37972
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-29799
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-29800
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35257
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3242
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3245
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40766
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38532
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2973
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2971
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2970
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2972
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3218
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23464
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23463
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37232
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-31937
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37235
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37234
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38955
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38956
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39239
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39210
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39212
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39211
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23458
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40712
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40713
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40714
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40715
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2872
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3068
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2888
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40117
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40113
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40122
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40118
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40114
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40116
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40119
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40120
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40121
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40115
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40934
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40933
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40935
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39063
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38333
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40778
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35030
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35037
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35070
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35024
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35060
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35039
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35038
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35032
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35023
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35036
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35028
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35065
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35031
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35029
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35034
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35062
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35027
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35026
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35035
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35061
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35063
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35025
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35066
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35064
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35067
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35068
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35069
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35021
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35022
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39955
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39957
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39958
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39956
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38916
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-0495
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39242
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39231
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39225
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38936
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-34002
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3255
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38577
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40769
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-1941
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39227
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25708
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22094
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25686
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22095
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25688
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22093
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25706
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25696
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22091
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22092
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25656
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25690
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25693
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25653
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22089
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22074
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22081
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25654
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25670
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22105
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-22066
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25669
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25652
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2019-5641
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35951
CONFIRM
FEDORA[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39240
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38742
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39224
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38339
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38340
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38341
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40759
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40758
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40760
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40761
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40762
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40757
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36944
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2016-20015
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2017-20147
MISC
GENTOO[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3173
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-33076
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-33081
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-33079
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3236
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-41731
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40093
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40092
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40091
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40088
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40089
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40087
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40030
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40026
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40027
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40028
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40029
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-42597
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37259
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37265
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37258
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38351
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35090
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35085
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35091
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35094
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35093
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35092
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35097
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35098
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35089
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35099
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35088
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40008
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40009
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35096
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35087
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35095
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35086
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40630
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40628
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40629
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3217
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40865
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40864
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40862
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40860
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40851
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40861
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40854
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40071
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40067
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40068
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40070
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40075
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40072
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40069
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40074
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40076
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40073
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40103
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40104
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40102
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40106
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40105
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40100
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40101
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40107
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40869
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40868
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40855
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40867
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40866
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40853
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35959
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35965
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35964
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35963
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35935
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35941
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35939
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35938
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35937
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36027
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35934
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35967
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35972
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35968
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35969
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35970
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35971
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35966
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35973
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35974
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35979
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35940
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35960
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35983
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36018
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36000
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35982
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35952
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35981
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36026
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35995
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35999
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36012
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36011
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36017
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36003
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36015
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36016
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36014
MISC
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36013
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36019
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35998
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35987
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35984
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36005
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35985
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35986
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36001
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35988
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35989
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35990
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35991
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35992
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35993
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35994
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35996
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35997
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36002
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36004
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37709
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35194
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35196
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-30579
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-30577
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-30578
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40468
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40142
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40139
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40140
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40144
N/A
N/A
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40143
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40141
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38764
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40980
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-34893
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37348
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37347
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2347
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38527
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38545
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-45035
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41319
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41320
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3235
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3256
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3234
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3278
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-31679
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-25873
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-39974
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38611
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2021-3782
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38509
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-29835
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36934
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-27492
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28886
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38079
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38454
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38085
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38460
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38095
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-1580
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2958
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-29489
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2913
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38470
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40132
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2912
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38061
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2575
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-1591
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2887
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2567
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2654
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2655
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2669
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2709
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2710
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2753
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2799
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2635
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2754
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2840
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2863
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2351
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2798
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2877
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-1194
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38073
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36798
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37342
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38704
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37338
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36340
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36791
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37328
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40671
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36365
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36417
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40672
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36383
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36390
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36388
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3144
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38703
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37330
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38134
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3142
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3036
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40310
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37339
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40219
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40217
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-35238
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40215
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3021
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40193
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40213
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40195
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40194
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3141
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-36386
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2937
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-38928
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40154
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40155
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40156
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40151
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40153
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40152
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-2924
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3000
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3004
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3005
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40357
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28802
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-37700
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40300
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40932
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-28758
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-23144
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-41138
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-34746
CONFIRM[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40443
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40444
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40446
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-40447
MISC[/TD]
[/TR]
Back to top
This product is provided subject to this Notification and this Privacy & Use policy.
Continue reading...
High Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no high vulnerabilities recorded this week. |
Medium Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no medium vulnerabilities recorded this week. |
Low Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no low vulnerabilities recorded this week. |
Severity Not Yet Assigned
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
10-strike -- network_inventory_explorer | 10-Strike Network Inventory Explorer v9.3 was discovered to contain a buffer overflow via the Add Computers function. | 2022-09-23 | not yet calculated | CVE-2022-38573 MISC MISC |
acer -- multiple_products | There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow during UEFI DXE execution. This affects Altos T110 F3 firmware version <= P13 (latest) and AP130 F2 firmware version <= P04 (latest) and Aspire 1600X firmware version <= P11.A3L (latest) and Aspire 1602M firmware version <= P11.A3L (latest) and Aspire 7600U firmware version <= P11.A4 (latest) and Aspire MC605 firmware version <= P11.A4L (latest) and Aspire TC-105 firmware version <= P12.B0L (latest) and Aspire TC-120 firmware version <= P11-A4 (latest) and Aspire U5-620 firmware version <= P11.A1 (latest) and Aspire X1935 firmware version <= P11.A3L (latest) and Aspire X3475 firmware version <= P11.A3L (latest) and Aspire X3995 firmware version <= P11.A3L (latest) and Aspire XC100 firmware version <= P11.B3 (latest) and Aspire XC600 firmware version <= P11.A4 (latest) and Aspire Z3-615 firmware version <= P11.A2L (latest) and Veriton E430G firmware version <= P21.A1 (latest) and Veriton B630_49 firmware version <= AAP02SR (latest) and Veriton E430 firmware version <= P11.A4 (latest) and Veriton M2110G firmware version <= P21.A3 (latest) and Veriton M2120G fir. | 2022-09-23 | not yet calculated | CVE-2022-30426 MISC MISC MISC |
adobe -- animate | Adobe Animate version 21.0.11 (and earlier) and 22.0.7 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38411 MISC |
adobe -- animate | Adobe Animate version 21.0.11 (and earlier) and 22.0.7 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38412 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-38425 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35706 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35709 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35707 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35705 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35704 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35708 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35701 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35700 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35699 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35703 MISC |
adobe -- bridge | Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-19 | not yet calculated | CVE-2022-35702 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30681 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30680 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30677 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30678 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a Violation of Secure Design Principles vulnerability that could lead to bypass the security feature of the encryption mechanism in the backend . An attacker could leverage this vulnerability to decrypt secrets, however, this is a high-complexity attack as the threat actor needs to already possess those secrets. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30683 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30685 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30684 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-35664 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30686 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-34218 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-16 | not yet calculated | CVE-2022-30682 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-23 | not yet calculated | CVE-2022-38438 MISC |
adobe -- experience_manager | Adobe Experience Manager versions 6.5.13.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Exploitation of this issue requires low-privilege access to AEM. | 2022-09-23 | not yet calculated | CVE-2022-38439 MISC |
adobe -- illustrator | Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38408 MISC |
adobe -- illustrator | Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38410 MISC |
adobe -- illustrator | Adobe Illustrator versions 26.4 (and earlier) and 25.4.7 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38409 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38403 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38404 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38405 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38406 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38407 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38401 MISC |
adobe -- incopy | Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38402 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38416 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38413 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28853 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30674 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30676 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30675 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30673 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38415 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30671 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38414 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-30672 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28856 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28855 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28854 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28852 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38417 MISC |
adobe -- indesign | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-28857 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-35713 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38434 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.sue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38433 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38432 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38431 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38430 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38427 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38428 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38426 MISC |
adobe -- photoshop | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2022-09-16 | not yet calculated | CVE-2022-38429 MISC |
ahsay -- ahsaycbs | Ahsay AhsayCBS 9.1.4.0 allows an authenticated system user to inject arbitrary Java JVM options. Administrators that can modify the Runtime Options in the web interface can inject Java Runtime Options. These take effect after a restart. For example, an attacker can enable JMX services and consequently achieve remote code execution as the system user. | 2022-09-21 | not yet calculated | CVE-2022-37027 MISC MISC MISC CONFIRM MISC |
ajaxplorer -- ajaxplorer | An issue was discovered in AjaXplorer 4.2.3, allows attackers to cause cross site scripting vulnerabilities via a crafted svg file upload. | 2022-09-23 | not yet calculated | CVE-2022-40358 MISC MISC |
ami -- aptio | A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: S3Resume2Pei SHA256: 7bb29f05534a8a1e010443213451425098faebd45948a4642db969b19d0253fc Module GUID: 89E549B0-7CFE-449D-9BA3-10D8B2312D71 | 2022-09-20 | not yet calculated | CVE-2022-40262 MISC MISC |
ami -- aptio | An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: OverClockSmiHandler SHA256: a204699576e1a48ce915d9d9423380c8e4c197003baf9d17e6504f0265f3039c Module GUID: 4698C2BD-A903-410E-AD1F-5EEF3A1AE422 | 2022-09-20 | not yet calculated | CVE-2022-40261 MISC MISC |
ami -- aptio | An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: SmmSmbiosElog SHA256: 3a8acb4f9bddccb19ec3b22b22ad97963711550f76b27b606461cd5073a93b59 Module GUID: 8e61fd6b-7a8b-404f-b83f-aa90a47cabdf This issue affects: AMI Aptio 5.x. This issue affects: AMI Aptio 5.x. | 2022-09-20 | not yet calculated | CVE-2022-40250 MISC MISC MISC |
ami -- aptio | A potential attacker can write one byte by arbitrary address at the time of the PEI phase (only during S3 resume boot mode) and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: SbPei SHA256: d827182e5f9b7a9ff0b9d3e232f7cfac43b5237e2681e11f005be627a49283a9 Module GUID: c1fbd624-27ea-40d1-aa48-94c3dc5c7e0d | 2022-09-20 | not yet calculated | CVE-2022-40246 MISC MISC |
ami -- multiple_products | A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: PlatformInitAdvancedPreMem SHA256: 644044fdb8daea30a7820e0f5f88dbf5cd460af72fbf70418e9d2e47efed8d9b Module GUID: EEEE611D-F78F-4FB9-B868-55907F169280 This issue affects: AMI Aptio 5.x. | 2022-09-20 | not yet calculated | CVE-2022-26873 MISC MISC MISC |
ami -- multiple_products | An attacker with physical access can exploit this vulnerability to execute arbitrary code during DXE phase. A malicious code installed as a result of vulnerability exploitation in DXE driver could survive across an operating system (OS) boot process and runtime This issue affects: Module name: AMITSE SHA256: 288769fcb374d9280735e259c579e2dc209491f4da43b085d6aabc2d6e6ee57d Module GUID: b1da0adf-4f77-4070-a88e-bffe1c60529a This issue affects: AMI Aptio 5.x. | 2022-09-20 | not yet calculated | CVE-2022-2154 MISC MISC MISC |
apache -- airflow | In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint. | 2022-09-21 | not yet calculated | CVE-2022-40754 MISC MISC |
apache -- airflow | In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction. | 2022-09-21 | not yet calculated | CVE-2022-40604 MISC MISC |
apache -- inlong | In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer. | 2022-09-20 | not yet calculated | CVE-2022-40955 MISC MLIST |
apache -- kafka | A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions. | 2022-09-20 | not yet calculated | CVE-2022-34917 MISC |
apache -- pinot | In 0.10.0 or older versions of Apache Pinot, Pinot query endpoint and realtime ingestion layer has a vulnerability in unprotected environments due to a groovy function support. In order to avoid this, we disabled the groovy function support by default from Pinot release 0.11.0. See https://docs.pinot.apache.org/basics/releases/0.11.0 | 2022-09-23 | not yet calculated | CVE-2022-26112 CONFIRM |
apache -- pulsar | Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy's IP address. When the Apache Pulsar Proxy component is used, it is possible to attempt to open TCP/IP connections to any IP address and port that the Pulsar Proxy can connect to. An attacker could use this as a way for DoS attacks that originate from the Pulsar Proxy's IP address. It hasn’t been detected that the Pulsar Proxy authentication can be bypassed. The attacker will have to have a valid token to a properly secured Pulsar Proxy. This issue affects Apache Pulsar Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.2; 2.9.0 to 2.9.1; 2.6.4 and earlier. | 2022-09-23 | not yet calculated | CVE-2022-24280 MISC |
apache -- pulsar_java_client | TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak credentials, configuration data, message data, and any other data sent by these clients. The vulnerability is for both the pulsar+ssl protocol and HTTPS. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. This issue affects Apache Pulsar Broker, Proxy, and WebSocket Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier. | 2022-09-23 | not yet calculated | CVE-2022-33682 MISC |
apache -- pulsar_java_client | Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could leak authentication data, configuration data, and any other data sent by these clients. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. This issue affects Apache Pulsar Broker and Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier. | 2022-09-23 | not yet calculated | CVE-2022-33683 MISC |
apache -- pulsar_java_client | Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before verifying the server’s TLS certificate matches the hostname, which means authentication data could be exposed to an attacker. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. Because the client sends authentication data before performing hostname verification, an attacker could gain access to the client’s authentication data. The client eventually closes the connection when it verifies the hostname and identifies the targeted hostname does not match a hostname on the certificate. Because the client eventually closes the connection, the value of the intercepted authentication data depends on the authentication method used by the client. Token based authentication and username/password authentication methods are vulnerable because the authentication data can be used to impersonate the client in a separate session. This issue affects Apache Pulsar Java Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier. | 2022-09-23 | not yet calculated | CVE-2022-33681 MISC |
apache -- xml_graphics | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14. | 2022-09-22 | not yet calculated | CVE-2022-38648 MISC |
apache -- xml_graphics | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14. | 2022-09-22 | not yet calculated | CVE-2022-40146 MISC |
apache -- xml_graphics | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14. | 2022-09-22 | not yet calculated | CVE-2022-38398 MISC |
apple -- macos_monterey | A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4. An app may gain unauthorized access to Bluetooth. | 2022-09-23 | not yet calculated | CVE-2022-32783 MISC |
apple -- macos_monterey | This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4. An app with root privileges may be able to access private information. | 2022-09-23 | not yet calculated | CVE-2022-32782 MISC |
apple -- macos_monterey | The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5. An app may be able to leak sensitive kernel state. | 2022-09-23 | not yet calculated | CVE-2022-32818 MISC |
apple -- macos_monterey | An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in macOS Monterey 12.4. A user may be able to view sensitive user information. | 2022-09-23 | not yet calculated | CVE-2022-26707 MISC |
apple -- macos_monterey | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5. An app may be able to gain root privileges. | 2022-09-23 | not yet calculated | CVE-2022-32801 MISC |
apple -- macos_monterey | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.5. An app may be able to gain elevated privileges. | 2022-09-23 | not yet calculated | CVE-2022-32798 MISC |
apple -- macos_monterey | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32852 MISC |
apple -- macos_monterey | A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5. An app may be able to bypass Privacy preferences. | 2022-09-23 | not yet calculated | CVE-2022-32789 MISC |
apple -- macos_monterey | This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.5. An app may be able to access user-sensitive data. | 2022-09-20 | not yet calculated | CVE-2022-32880 MISC |
apple -- macos_monterey | This issue was addressed with improved environment sanitization. This issue is fixed in macOS Monterey 12.4. A sandboxed process may be able to circumvent sandbox restrictions. | 2022-09-20 | not yet calculated | CVE-2022-26696 MISC |
apple -- macos_monterey | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32796 MISC |
apple -- multiple products | An out-of-bounds read was addressed with improved input validation. This issue is fixed in iCloud for Windows 11.4, iOS 14.0 and iPadOS 14.0, watchOS 7.0, tvOS 14.0, iCloud for Windows 7.21, iTunes for Windows 12.10.9. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents. | 2022-09-23 | not yet calculated | CVE-2020-36521 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to access sensitive user information. | 2022-09-23 | not yet calculated | CVE-2022-32849 MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved file handling. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to overwrite arbitrary files. | 2022-09-23 | not yet calculated | CVE-2022-32807 MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved state management. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. A website may be able to track users through Safari web extensions. | 2022-09-20 | not yet calculated | CVE-2022-32868 MISC MISC MISC |
apple -- multiple_products | An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. A user in a privileged network position may be able to leak sensitive information. | 2022-09-23 | not yet calculated | CVE-2022-32799 MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in iOS 16, iOS 15.7 and iPadOS 15.7. Visiting a malicious website may lead to address bar spoofing. | 2022-09-20 | not yet calculated | CVE-2022-32795 MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, macOS Big Sur 11.6.6, Security Update 2022-004 Catalina. A remote user may be able to cause a denial-of-service. | 2022-09-23 | not yet calculated | CVE-2022-32790 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32797 MISC MISC MISC |
apple -- multiple_products | An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system. | 2022-09-23 | not yet calculated | CVE-2022-32786 MISC MISC MISC |
apple -- multiple_products | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32851 MISC MISC MISC |
apple -- multiple_products | A null pointer dereference was addressed with improved validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing an image may lead to a denial-of-service. | 2022-09-23 | not yet calculated | CVE-2022-32785 MISC MISC MISC MISC |
apple -- multiple_products | A buffer overflow was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. A remote user may be able to cause kernel code execution. | 2022-09-20 | not yet calculated | CVE-2022-32788 MISC MISC MISC MISC |
apple -- multiple_products | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-20 | not yet calculated | CVE-2022-32886 MISC MISC MISC FEDORA FEDORA |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An app may be able to bypass Privacy preferences. | 2022-09-20 | not yet calculated | CVE-2022-32882 MISC MISC |
apple -- multiple_products | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32853 MISC MISC MISC |
apple -- multiple_products | A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. A user may be able to elevate privileges. | 2022-09-20 | not yet calculated | CVE-2022-32908 MISC MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to read sensitive location information. | 2022-09-20 | not yet calculated | CVE-2022-32883 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-20 | not yet calculated | CVE-2022-32911 MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. A remote user may be able to cause unexpected system termination or corrupt kernel memory. | 2022-09-23 | not yet calculated | CVE-2022-32847 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to bypass Privacy preferences. | 2022-09-20 | not yet calculated | CVE-2022-32854 MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16, iOS 15.7 and iPadOS 15.7. A person with physical access to an iOS device may be able to access photos from the lock screen. | 2022-09-20 | not yet calculated | CVE-2022-32872 MISC MISC |
apple -- multiple_products | A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 15.6, macOS Monterey 12.5. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-20 | not yet calculated | CVE-2022-32863 MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved state management. This issue is fixed in Safari 15.6, macOS Monterey 12.5. A user may be tracked through their IP address. | 2022-09-20 | not yet calculated | CVE-2022-32861 MISC MISC |
apple -- multiple_products | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-23 | not yet calculated | CVE-2022-32792 MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI spoofing. | 2022-09-23 | not yet calculated | CVE-2022-32816 MISC MISC MISC MISC |
apple -- multiple_products | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-20 | not yet calculated | CVE-2022-32912 MISC MISC MISC |
apple -- multiple_products | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted Postscript file may result in unexpected app termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32843 MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory. | 2022-09-23 | not yet calculated | CVE-2022-32825 MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to break out of its sandbox. | 2022-09-23 | not yet calculated | CVE-2022-32845 MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted file may lead to arbitrary code execution. | 2022-09-20 | not yet calculated | CVE-2022-32802 MISC MISC MISC |
apple -- multiple_products | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to leak sensitive user information. | 2022-09-23 | not yet calculated | CVE-2022-32823 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved handling of caches. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to access sensitive user information. | 2022-09-23 | not yet calculated | CVE-2022-32805 MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. | 2022-09-20 | not yet calculated | CVE-2022-32917 MISC MISC MISC MISC |
apple -- multiple_products | An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory. | 2022-09-23 | not yet calculated | CVE-2022-32817 MISC MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges. | 2022-09-23 | not yet calculated | CVE-2022-32819 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A memory corruption issue was addressed with improved validation. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32821 MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32829 MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app with root privileges may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32815 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges. | 2022-09-23 | not yet calculated | CVE-2022-32826 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32820 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to capture a user’s screen. | 2022-09-23 | not yet calculated | CVE-2022-32848 MISC MISC |
apple -- multiple_products | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-23 | not yet calculated | CVE-2022-22628 MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory. | 2022-09-23 | not yet calculated | CVE-2022-32828 MISC MISC MISC |
apple -- multiple_products | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-23 | not yet calculated | CVE-2022-22629 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information. | 2022-09-23 | not yet calculated | CVE-2022-32781 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to disclose kernel memory. | 2022-09-20 | not yet calculated | CVE-2022-32864 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted image may result in disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32841 MISC MISC MISC MISC |
apple -- multiple_products | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. An app may be able to gain elevated privileges. | 2022-09-23 | not yet calculated | CVE-2022-32842 MISC MISC |
apple -- multiple_products | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | 2022-09-23 | not yet calculated | CVE-2022-32831 MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app with root privileges may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32832 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to code execution. | 2022-09-23 | not yet calculated | CVE-2022-22610 MISC MISC MISC MISC MISC |
apple -- multiple_products | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-23 | not yet calculated | CVE-2022-32787 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A type confusion issue was addressed with improved state handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. | 2022-09-23 | not yet calculated | CVE-2022-32814 MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system. | 2022-09-23 | not yet calculated | CVE-2022-32800 MISC MISC MISC |
apple -- multiple_products | A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior. | 2022-09-23 | not yet calculated | CVE-2022-22637 MISC MISC MISC MISC MISC |
apple -- multiple_products | A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to code execution. | 2022-09-23 | not yet calculated | CVE-2022-26700 MISC MISC MISC MISC MISC |
apple -- multiple_products | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. | 2022-09-23 | not yet calculated | CVE-2022-22624 MISC MISC MISC MISC |
apple -- swiftnio_extras | Improper detection of complete HTTP body decompression SwiftNIO Extras provides a pair of helpers for transparently decompressing received HTTP request or response bodies. These two objects (HTTPRequestDecompressor and HTTPResponseDecompressor) both failed to detect when the decompressed body was considered complete. If trailing junk data was appended to the HTTP message body, the code would repeatedly attempt to decompress this data and fail. This would lead to an infinite loop making no forward progress, leading to livelock of the system and denial-of-service. This issue can be triggered by any attacker capable of sending a compressed HTTP message. Most commonly this is HTTP servers, as compressed HTTP messages cannot be negotiated for HTTP requests, but it is possible that users have configured decompression for HTTP requests as well. The attack is low effort, and likely to be reached without requiring any privilege or system access. The impact on availability is high: the process immediately becomes unavailable but does not immediately crash, meaning that it is possible for the process to remain in this state until an administrator intervenes or an automated circuit breaker fires. If left unchecked this issue will very slowly exhaust memory resources due to repeated buffer allocation, but the buffers are not written to and so it is possible that the processes will not terminate for quite some time. This risk can be mitigated by removing transparent HTTP message decompression. The issue is fixed by correctly detecting the termination of the compressed body as reported by zlib and refusing to decompress further data. The issue was found by Vojtech Rylko (https://github.com/vojtarylko) and reported publicly on GitHub. | 2022-09-21 | not yet calculated | CVE-2022-3252 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-23696 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-23693 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-23694 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-23695 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-23692 MISC |
aruba_networks -- clearpass_policy_manager | A Server-Side Request Forgery (SSRF) in fetch_net_file_upload function of baijiacmsV4 v4.1.4 allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the url parameter. | 2022-09-20 | not yet calculated | CVE-2022-38931 MISC |
aruba_networks -- clearpass_policy_manager | A vulnerability in the ClearPass Policy Manager web-based management interface exists which exposes some endpoints to a lack of Cross-Site Request Forgery (CSRF) protection. This could allow a remote unauthenticated attacker to execute arbitrary input against these endpoints if the attacker can convince an authenticated user of the interface to interact with a specially crafted URL in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability. | 2022-09-20 | not yet calculated | CVE-2022-23685 MISC |
aruba_networks -- clearpass_policy_manager | A vulnerability exists in the ClearPass Policy Manager Guest User Interface that can allow an unauthenticated attacker to send specific operations which result in a Denial-of-Service condition. A successful exploitation of this vulnerability results in the unavailability of the guest interface in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability. | 2022-09-20 | not yet calculated | CVE-2022-37884 MISC |
aruba_networks -- clearpass_policy_manager | A vulnerability in the ClearPass OnGuard macOS agent could allow malicious users on a macOS instance to elevate their user privileges. A successful exploit could allow these users to execute arbitrary code with root level privileges on the macOS instance in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address this security vulnerability. | 2022-09-20 | not yet calculated | CVE-2022-37877 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37878 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37879 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37880 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37881 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37882 MISC |
aruba_networks -- clearpass_policy_manager | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): 6.10.x: 6.10.6 and below; 6.9.x: 6.9.11 and below. Aruba has released upgrades for Aruba ClearPass Policy Manager that address these security vulnerabilities. | 2022-09-20 | not yet calculated | CVE-2022-37883 MISC |
arvados -- arvados | Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired password), it would still be accepted for access to Arvados. Other authentication methods (LDAP, OpenID Connect) supported by Arvados are not affected by this flaw. This issue is patched in version 2.4.3. Workaround for this issue is to migrate to a different authentication method supported by Arvados, such as LDAP. | 2022-09-23 | not yet calculated | CVE-2022-39238 CONFIRM |
aspire_software -- open_aviation_strategic_engineering_system | OASES (aka Open Aviation Strategic Engineering System) 8.8.0.2 allows attackers to execute arbitrary code via the Open Print Folder menu. | 2022-09-16 | not yet calculated | CVE-2022-40337 MISC MISC MISC |
assura -- global_northstar_club_management | There are two full (read/write) Blind/Time-based SQL injection vulnerabilities in the Northstar Club Management version 6.3 application. The vulnerabilities exist in the userName parameter of the processlogin.jsp page in the /northstar/Portal/ directory and the userID parameter of the login.jsp page in the /northstar/iphone/ directory. Exploitation of the SQL injection vulnerabilities allows full access to the database which contains critical data for organization’s that make full use of the software suite. | 2022-09-16 | not yet calculated | CVE-2022-26959 MISC MISC |
atlassian -- jira | The Netic Group Export add-on before 1.0.3 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI. | 2022-09-17 | not yet calculated | CVE-2022-39960 MISC CONFIRM |
awslabs -- fhir-works-on-aws-authz-smart | fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue. | 2022-09-23 | not yet calculated | CVE-2022-39230 CONFIRM |
axiosys -- bento4 | An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields. | 2022-09-18 | not yet calculated | CVE-2022-40775 MISC |
axiosys -- bento4 | An issue was discovered in Bento4 through 1.6.0-639. There is a NULL pointer dereference in AP4_StszAtom::GetSampleSize. | 2022-09-18 | not yet calculated | CVE-2022-40774 MISC |
bilgi_teknolojileri -- identity_and_directory_management_system | The Identity and Directory Management System developed by Çekino Bilgi Teknolojileri before version 2.1.25 has an unauthenticated Path traversal vulnerability. This has been fixed in the version 2.1.25 | 2022-09-21 | not yet calculated | CVE-2022-2265 CONFIRM |
bilgi_teknolojileri -- university_library_automation_system | University Library Automation System developed by Yordam Bilgi Teknolojileri before version 19.2 has an unauthenticated Reflected XSS vulnerability. This has been fixed in the version 19.2 | 2022-09-22 | not yet calculated | CVE-2022-2266 CONFIRM |
bind -- bind | By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. | 2022-09-21 | not yet calculated | CVE-2022-38177 CONFIRM MLIST DEBIAN FEDORA |
bind -- bind | By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. | 2022-09-21 | not yet calculated | CVE-2022-2795 CONFIRM MLIST DEBIAN FEDORA |
bind -- bind | By sending specific queries to the resolver, an attacker can cause named to crash. | 2022-09-21 | not yet calculated | CVE-2022-3080 CONFIRM MLIST DEBIAN FEDORA |
bind -- bind | The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process. | 2022-09-21 | not yet calculated | CVE-2022-2881 CONFIRM MLIST |
bind -- bind | An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service. | 2022-09-21 | not yet calculated | CVE-2022-2906 CONFIRM MLIST |
bind -- bind | By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. | 2022-09-21 | not yet calculated | CVE-2022-38178 CONFIRM MLIST DEBIAN FEDORA |
bolt -- bolt_cms | Bolt CMS contains a vulnerability in version 5.1.12 and below that allows an authenticated user with the ROLE_EDITOR privileges to upload and rename a malicious file to achieve remote code execution. | 2022-09-16 | not yet calculated | CVE-2022-36532 MISC MISC |
bpcbt -- smartvista_svfe2 | SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /SVFE2/pages/feegroups/mcc_group.jsf. | 2022-09-21 | not yet calculated | CVE-2022-38619 MISC MISC MISC |
bpcbt -- smartvista_svfe2 | SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the voiceAudit:j_id97 parameter at /SVFE2/pages/audit/voiceaudit.jsf. | 2022-09-19 | not yet calculated | CVE-2022-38617 MISC MISC MISC |
bpcbt -- smartvista_svfe2 | SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id88, UserForm:j_id90, and UserForm:j_id92 parameters at /SVFE2/pages/feegroups/country_group.jsf. | 2022-09-19 | not yet calculated | CVE-2022-38618 MISC MISC MISC |
budibase -- budibase | Improper Access Control in GitHub repository budibase/budibase prior to 1.3.20. | 2022-09-16 | not yet calculated | CVE-2022-3225 MISC CONFIRM |
craft_cms -- craft_cms | Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page. | 2022-09-16 | not yet calculated | CVE-2022-37247 MISC MISC |
craft_cms -- craft_cms | Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via Drafts. | 2022-09-16 | not yet calculated | CVE-2022-37251 MISC MISC |
craft_cms -- craft_cms | Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line label: elementInfo.label. | 2022-09-21 | not yet calculated | CVE-2022-37246 MISC MISC |
crestron -- airmedia | Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell. | 2022-09-23 | not yet calculated | CVE-2022-40298 MISC MISC |
databank -- database_software_accreditation_tracking/presentation_module | Database Software Accreditation Tracking/Presentation Module product before version 2 has an unauthenticated SQL Injection vulnerability. This is fixed in version 2. | 2022-09-21 | not yet calculated | CVE-2022-2315 CONFIRM |
delta_industrial_automation -- diaenergie | Delta Industrial Automation's DIAEnergy, an industrial energy management system, is vulnerable to CWE-798, Use of Hard-coded Credentials. Version 1.8.0 and prior have this vulnerability. Executable files could be uploaded to certain directories using hard-coded bearer authorization, allowing remote code execution. | 2022-09-16 | not yet calculated | CVE-2022-3214 MISC |
democritus -- democritus | The d8s-asns for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40426 MISC MISC |
democritus -- democritus | The d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40427 MISC MISC |
democritus -- democritus | The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38880 MISC MISC |
democritus -- democritus | The d8s-archives for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38881 MISC MISC MISC |
democritus -- democritus | The d8s-json for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38882 MISC MISC MISC |
democritus -- democritus | The d8s-math for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38883 MISC MISC MISC |
democritus -- democritus | The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40811 MISC MISC |
democritus -- democritus | The d8s-netstrings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38885 MISC MISC MISC |
democritus -- democritus | The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38886 MISC MISC MISC |
democritus -- democritus | The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38887 MISC MISC MISC |
democritus -- democritus | The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40812 MISC MISC |
democritus -- democritus | The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40428 MISC MISC |
democritus -- democritus | The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40432 MISC MISC MISC |
democritus -- democritus | The d8s-grammars for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-38884 MISC MISC MISC |
democritus -- democritus | The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40429 MISC MISC |
democritus -- democritus | The d8s-utility for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40430 MISC MISC |
democritus -- democritus | The d8s-html for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40425 MISC MISC |
democritus -- democritus | The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40810 MISC MISC |
democritus -- democritus | The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1.0. | 2022-09-19 | not yet calculated | CVE-2022-40431 MISC MISC |
democritus -- democritus | The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-networking package. The affected version of d8s-urls is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40424 MISC MISC |
democritus -- democritus | The d8s-uuids for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40806 MISC MISC |
democritus -- democritus | The d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40807 MISC MISC |
democritus -- democritus | The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40808 MISC MISC |
democritus -- democritus | The d8s-dicts for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 | 2022-09-19 | not yet calculated | CVE-2022-40809 MISC MISC |
democritus -- democritus | The d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-hypothesis package. | 2022-09-19 | not yet calculated | CVE-2022-40805 MISC MISC |
doufox -- doufox | Doufox v0.0.4 was discovered to contain a remote code execution (RCE) vulnerability via the edit file page. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | 2022-09-16 | not yet calculated | CVE-2022-38621 MISC |
drakkan -- sftpgo | SFTPGo is an SFTP server written in Go. Versions prior to 2.3.5 are subject to Cross-site scripting (XSS) vulnerabilities in the SFTPGo WebClient, allowing remote attackers to inject malicious code. This issue is patched in version 2.3.5. No known workarounds exist. | 2022-09-20 | not yet calculated | CVE-2022-39220 CONFIRM |
drawio -- drawio | Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.3.1. | 2022-09-16 | not yet calculated | CVE-2022-3223 MISC CONFIRM |
emakin -- 6kare_emakin | 6Kare Emakin 5.0.341.0 is affected by Cross Site Scripting (XSS) via the /rpc/membership/setProfile DisplayName field, which is mishandled when rendering the Activity Stream page. | 2022-09-16 | not yet calculated | CVE-2020-25491 MISC |
enumatech -- secp256kl-js | The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery. | 2022-09-24 | not yet calculated | CVE-2022-41340 MISC MISC MISC MISC |
erlang -- erlang_otp | In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS. | 2022-09-21 | not yet calculated | CVE-2022-37026 MISC MISC CONFIRM |
evoh -- claimable | Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers. | 2022-09-21 | not yet calculated | CVE-2022-35621 MISC |
fabasoft -- fabasoft_cloud_enterprise_client | The folioupdate service in Fabasoft Cloud Enterprise Client 22.4.0043 allows Local Privilege Escalation. | 2022-09-19 | not yet calculated | CVE-2022-29908 MISC MISC |
fastly -- js-compute-runtime | The JS Compute Runtime for Fastly's Compute@Edge platform provides the environment JavaScript is executed in when using the Compute@Edge JavaScript SDK. In versions prior to 0.5.3, the `Math.random` and `crypto.getRandomValues` methods fail to use sufficiently random values. The initial value to seed the PRNG (pseudorandom number generator) is baked-in to the final WebAssembly module, making the sequence of random values for that specific WebAssembly module predictable. An attacker can use the fixed seed to predict random numbers generated by these functions and bypass cryptographic security controls, for example to disclose sensitive data encrypted by functions that use these generators. The problem has been patched in version 0.5.3. No known workarounds exist. | 2022-09-20 | not yet calculated | CVE-2022-39218 CONFIRM |
festo -- multiple_products | Festo control block CPX-CEC-C1 and CPX-CMXX in multiple versions allow unauthenticated, remote access to critical webpage functions which may cause a denial of service. | 2022-09-20 | not yet calculated | CVE-2022-3079 CONFIRM |
ffmpeg -- ffmpeg | A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data.count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc(). An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05 |
[TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2566
MISC[/TD]
[TR]
[TD]
forgerock -- ldap_connector
[/TD][TD]
When the LDAP connector is started with StartTLS configured, unauthenticated access is granted. This issue affects: all versions of the LDAP connector prior to 1.5.20.9. The LDAP connector is bundled with Identity Management (IDM) and Remote Connector Server (RCS)
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-0143
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
frrouting -- frrouting
[/TD][TD]
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37032
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
genesys -- pureconnect
[/TD][TD]
Genesys PureConnect Interaction Web Tools Chat Service (up to at least 26- September- 2019) allows XSS within the Printable Chat History via the participant -> name JSON POST parameter.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37775
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
ghas-to-csv -- ghas-to-csv
[/TD][TD]
some-natalie/ghas-to-csv (GitHub Advanced Security to CSV) is a GitHub action which scrapes the GitHub Advanced Security API and shoves it into a CSV. In affected versions this GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. This issue has been addressed in version `v1`. Users are advised to use `v1` or later. There are no known workarounds for this issue.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39217
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD]
[TD]
The SCCM plugin for GLPI is a plugin to synchronize computers from SCCM (version 1802) to GLPI. In versions prior to 2.3.0, the Configuration page is publicly accessible in read-only mode. This issue is patched in version 2.3.0. No known workarounds exist.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-39190
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35914
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
grafana -- grafana
[/TD][TD]
Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/la...security/configure-authentication/auth-proxy/
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35957
CONFIRM[/TD]
[/TR]
[TR]
[TD]
grafana -- grafana
[/TD]
[TD]
Grafana is an open-source platform for monitoring and observability. In versions prior to 8.5.13, 9.0.9, and 9.1.6, Grafana is subject to Improper Preservation of Permissions resulting in privilege escalation on some folders where Admin is the only used permission. The vulnerability impacts Grafana instances where RBAC was disabled and enabled afterwards, as the migrations which are translating legacy folder permissions to RBAC permissions do not account for the scenario where the only user permission in the folder is Admin, as a result RBAC adds permissions for Editors and Viewers which allow them to edit and view folders accordingly. This issue has been patched in versions 8.5.13, 9.0.9, and 9.1.6. A workaround when the impacted folder/dashboard is known is to remove the additional permissions manually.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36062
CONFIRM[/TD]
[/TR]
[TR]
[TD]
hackerone -- curl
[/TD][TD]
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35252
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A improper authentication vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 that allowed two factor authentication can be bypassed when telling the server to use CAS during login.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35248
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
An information disclosure vulnerability exists in Rocket.Chat <v4.7.5 which allowed the "users.list" REST endpoint gets a query parameter from JSON and runs Users.find(queryFromClientSide). This means virtually any authenticated user can access any data (except password hashes) of any user authenticated.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32219
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A cross-site scripting vulnerability exists in Rocket.chat <v5 due to style injection in the complete chat window, an adversary is able to manipulate not only the style of it, but will also be able to block functionality as well as hijacking the content of targeted users. Hence the payloads are stored in messages, it is a persistent attack vector, which will trigger as soon as the message gets viewed.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35251
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A privilege escalation vulnerability exists in Rocket.chat <v5 which made it possible to elevate privileges for any authenticated user to view Direct messages without appropriate permissions.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35250
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A SQL injection vulnerability exists in Rocket.Chat <v3.18.6, <v4.4.4 and <v4.7.3 which can allow an attacker to retrieve a reset password token through or a 2fa secret.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32211
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A information disclosure vulnerability exists in Rocket.Chat <v5 where the getUserMentionsByChannel meteor server method discloses messages from private channels and direct messages regardless of the users access permission to the room.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35249
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
An information disclosure vulnerability exists in Rocket.Chat <v5 due to the getUserMentionsByChannel meteor server method discloses messages from private channels and direct messages regardless of the users access permission to the room.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32220
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A information disclosure vulnerability exists in Rocket.chat <v5, <v4.8.2 and <v4.7.5 where the lack of ACL checks in the getRoomRoles Meteor method leak channel members with special roles to unauthorized clients.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35247
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A cleartext storage of sensitive information exists in Rocket.Chat <v4.6.4 due to Oauth token being leaked in plaintext in Rocket.chat logs.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32217
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A NoSQL-Injection information disclosure vulnerability vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 in the getS3FileUrl Meteor server method that can disclose arbitrary file upload URLs to users that should not be able to access.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35246
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A information disclosure vulnerability exists in Rockert.Chat <v5 due to /api/v1/chat.getThreadsList lack of sanitization of user inputs and can therefore leak private thread messages to unauthorized users via Mongo DB injection.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32229
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
A cleartext transmission of sensitive information exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 relating to Oauth tokens by having the permission "view-full-other-user-info", this could cause an oauth token leak in the product.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32227
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
An improper access control vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to input data in the getUsersOfRoom Meteor server method is not type validated, so that MongoDB query operator objects are accepted by the server, so that instead of a matching rid String a$regex query can be executed, bypassing the room access permission check for every but the first matching room.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32226
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD][TD]
An information disclosure vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 due to the actionLinkHandler method was found to allow Message ID Enumeration with Regex MongoDB queries.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32218
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat
[/TD]
[TD]
An information disclosure vulnerability exists in Rocket.Chat <v5, <v4.8.2 and <v4.7.5 since the getReadReceipts Meteor server method does not properly filter user inputs that are passed to MongoDB queries, allowing $regex queries to enumerate arbitrary Message IDs.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32228
MISC[/TD]
[/TR]
[TR]
[TD]
hackerone -- rocket.chat_mobile_app
[/TD][TD]
An improper authentication vulnerability exists in Rocket.Chat Mobile App <4.14.1.22788 that allowed an attacker with physical access to a mobile device to bypass local authentication (PIN code).
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-30124
MISC[/TD]
[/TR]
[TR]
[TD]
hashicorp -- consul
[/TD][TD]
HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-41803
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
hashicorp -- multiple_products
[/TD]
[TD]
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40716
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
hashicorp -- vault
[/TD][TD]
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40186
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
hcltech -- hcl_digital_experience
[/TD][TD]
User input included in error response, which could be used in a phishing attack.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-27774
MISC[/TD]
[/TR]
[TR]
[TD]
helpsystems -- cobalt_strike
[/TD][TD]
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39197
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
hoek -- hoek
[/TD][TD]
hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisoning in the clone function.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-36604
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
honeywell -- softmaster
[/TD][TD]
If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2333
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
honeywell -- softmaster
[/TD][TD]
A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster version 4.51, due to insecure permission assignment.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2332
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
hpe -- integrated_lights-out_5
[/TD][TD]
A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28637
MISC[/TD]
[/TR]
[TR]
[TD]
hpe -- integrated_lights-out_5
[/TD][TD]
An isolated local disclosure of information and potential isolated local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28638
MISC[/TD]
[/TR]
[TR]
[TD]
hpe -- integrated_lights-out_5
[/TD][TD]
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28639
MISC[/TD]
[/TR]
[TR]
[TD]
hpe -- integrated_lights-out_5
[/TD][TD]
A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28640
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- cv81-wdm_fw
[/TD][TD]
A Huawei device has an input verification vulnerability. Successful exploitation of this vulnerability may lead to DoS attacks.Affected product versions include:CV81-WDM FW versions 01.70.49.29.46.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37395
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39003
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-40019
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-36600
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39002
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-40023
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui/magic_ui
[/TD][TD]
Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-36601
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39001
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39000
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-46836
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39008
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-40017
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39010
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39009
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39007
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39006
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39005
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39004
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-40024
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38999
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- jad-al50
[/TD][TD]
A permission bypass vulnerability in Huawei cross device task management could allow an attacker to access certain resource in the attacked devices. Affected product versions include:JAD-AL50 versions 102.0.0.225(C00E220R3P4).
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-46834
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- multiple_products
[/TD][TD]
There is an out-of-bounds read and write vulnerability in some headset products. An unauthenticated attacker gets the device physically and crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause out-of-bounds read and write.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-36602
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- ws7200-10
[/TD][TD]
There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-46835
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- ws7200-10
[/TD][TD]
There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the LAN may use brute force cracking to obtain passwords, which may cause sensitive system information to be disclosed.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-33735
MISC[/TD]
[/TR]
[TR]
[TD]
hyperledger -- besu
[/TD][TD]
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36025
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ibm -- common_cryptographic_architecture
[/TD][TD]
IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769) could allow a local user to cause a denial of service due to improper input validation. IBM X-Force ID: 223596.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22423
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ibm -- hyperledger_fabric
[/TD][TD]
A vulnerability exists in Hyperledger Fabric <2.4 could allow an attacker to construct a non-validated request that could cause a denial of service attack.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35253
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
ibm -- infosphere
[/TD][TD]
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236586.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40748
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ibm -- jazz
[/TD][TD]
IBM Jazz for Service Management 1.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 231380.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35721
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
ibm -- maximo_asset_management
[/TD][TD]
IBM Maximo Asset Management 7.6.1.1, 7.6.1.2, and 7.6.1.3 could allow a user to bypass authentication and obtain sensitive information or perform tasks they should not have access to. IBM X-Force ID: 236311.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40616
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
ibm -- spectrum_protect_plus
[/TD][TD]
IBM Spectrum Protect Plus 10.1.6 through 10.1.11 Microsoft File Systems restore operation can download any file on the target machine by manipulating the URL with a directory traversal attack. This results in the restore operation gaining access to files which the operator should not have access to. IBM X-Force ID: 235873.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40608
XF
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ibm -- spectrum_protect_plus
[/TD][TD]
Versions of IBM Spectrum Protect Plus prior to 10.1.12 (excluding 10.1.12) include the private key information for a certificate inside the generated .crt file when uploading a TLS certificate to IBM Spectrum Protect Plus. If this generated .crt file is shared, an attacker can obtain the private key information for the uploaded certificate. IBM X-Force ID: 235718.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40234
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
ibm – sterling_partner_engagement_manager
[/TD]
[TD]
IBM Sterling Partner Engagement Manager 6.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 230017.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-34348
CONFIRM
XF[/TD]
[/TR]
[TR]
[TD]
icecoder -- icecoder
[/TD][TD]
ICEcoder v8.1 allows attackers to execute a directory traversal.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-34026
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- minarca
[/TD][TD]
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/minarca prior to 4.2.2.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3251
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- minarca
[/TD][TD]
Weak Password Requirements in GitHub repository ikus060/minarca prior to 4.2.2.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3268
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- rdiffweb
[/TD][TD]
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.5.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3232
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- rdiffweb
[/TD][TD]
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3233
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- rdiffweb
[/TD][TD]
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3267
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
ikus-soft -- rdiffweb
[/TD][TD]
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.6.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3250
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
ikus060 -- rdiffweb
[/TD][TD]
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.7.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3274
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
ikus060 -- rdiffweb
[/TD][TD]
Session Fixation in GitHub repository ikus060/rdiffweb prior to 2.4.7.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3269
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
imagemagick -- imagemagick
[/TD][TD]
A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3213
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
incibe -- grandstream_gsd3710
[/TD][TD]
In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IPort by opening a shell and getting full access to the system. The exploit affects daemons dbmng and logsrv that are running on ports 8000 and 8001 by default.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2070
CONFIRM[/TD]
[/TR]
[TR]
[TD]
incibe -- grandstream_gsd3710
[/TD][TD]
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2025
CONFIRM[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh20
[/TD][TD]
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver FwBlockServiceSmm, creating SMM, leads to arbitrary code execution. An attacker can replace the pointer to the UEFI boot service GetVariable with a pointer to malware, and then generate a software SMI.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36338
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh2o
[/TD][TD]
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The SMI handler for the FwBlockServiceSmm driver uses an untrusted pointer as the location to copy data to an attacker-specified buffer, leading to information disclosure.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35894
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh2o
[/TD][TD]
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. The FwBlockSericceSmm driver does not properly validate input parameters for a software SMI routine, leading to memory corruption of arbitrary addresses including SMRAM, and possible arbitrary code execution.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35895
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh2o
[/TD][TD]
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM callout vulnerability in the SMM driver in UsbLegacyControlSmm leads to possible arbitrary code execution in SMM and escalation of privileges. An attacker could overwrite the function pointers in the EFI_BOOT_SERVICES table before the USB SMI handler triggers. (This is not exploitable from code running in the operating system.)
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35408
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh2o
[/TD][TD]
An issue SMM memory leak vulnerability in SMM driver (SMRAM was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An attacker can dump SMRAM contents via the software SMI provided by the FvbServicesRuntimeDxe driver to read the contents of SMRAM, leading to information disclosure.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35896
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
insyde -- insydeh2o
[/TD][TD]
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM memory corruption vulnerability in the FvbServicesRuntimeDxe driver allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35893
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
interview_management_system -- interview_management_system
[/TD][TD]
Interview Management System v1.0 was discovered to contain a SQL injection vulnerability via the component /interview/delete.php?action=deletecand&id=.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38576
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e20.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23554
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007d33.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23553
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e28.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23556
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e30.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23551
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e62.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23552
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e6e.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23555
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e82.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23550
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000755d.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23557
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000001bcab.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23560
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000007d7f.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23559
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
irfanview -- irfanview
[/TD][TD]
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x0000000000007f4b.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2020-23558
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
ivanty -- endpoint_manager_client
[/TD][TD]
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-30121
MISC[/TD]
[/TR]
[TR]
[TD]
jasper -- jasper
[/TD][TD]
JasPer 3.0.6 allows denial of service via a reachable assertion in the function inttobits in libjasper/base/jas_image.c.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40755
MISC[/TD]
[/TR]
[TR]
[TD]
jeesns -- jeesns
[/TD][TD]
A stored cross-site scripting (XSS) vulnerability in the /weibo/list component of Jeesns v2.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38550
MISC[/TD]
[/TR]
[TR]
[TD]
jenkins -- anchore_container_image_scanner
[/TD][TD]
Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41225
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- apprenda
[/TD][TD]
A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41251
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- bigpanda_notifier
[/TD][TD]
Jenkins BigPanda Notifier Plugin 1.4.0 and earlier does not mask the BigPanda API key on the global configuration form, increasing the potential for attackers to observe and capture it.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41248
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- bigpanda_notifier
[/TD][TD]
Jenkins BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41247
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- build-publisher
[/TD][TD]
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41230
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- build-publisher
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any config.xml file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41232
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- build-publisher
[/TD][TD]
Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any config.xml file on the Jenkins controller file system by providing a crafted file name to an API endpoint.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41231
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- compuware_common_configuration
[/TD][TD]
Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41226
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- cons3rt
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins CONS3RT Plugin 1.0.0 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41253
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- cons3rt
[/TD][TD]
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41254
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- cons3rt
[/TD][TD]
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41255
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- cons3rt
[/TD][TD]
Missing permission checks in Jenkins CONS3RT Plugin 1.0.0 and earlier allows users with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41252
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- dotci
[/TD][TD]
Jenkins DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause, resulting in a stored cross-site scripting (XSS) vulnerability.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41239
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- dotci
[/TD][TD]
A missing permission check in Jenkins DotCi Plugin 2.40.00 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository for attacker-specified commits.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41238
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- dotci
[/TD][TD]
Jenkins DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41237
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- extreme-feedback
[/TD][TD]
A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41242
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- jenkins
[/TD][TD]
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41224
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- ns-nd_integration_performance_publisher
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41227
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- ns-nd_integration_performance_publisher
[/TD][TD]
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.134 and earlier does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41229
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- ns-nd_integration_performance_publisher
[/TD][TD]
A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41228
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- rqm
[/TD][TD]
Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41241
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- rundeck
[/TD][TD]
Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the /plugin/rundeck/webhook/ endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41234
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- rundeck
[/TD][TD]
Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41233
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- scm_httpclient
[/TD][TD]
A missing permission check in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41250
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- scm_httpclient
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41249
CONFIRM
MLIST[/TD]
[/TR]
[TR]
[TD]
jenkins -- security_inspector
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins Security Inspector Plugin 117.v6eecc36919c2 and earlier allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the .../report URL with a report based on attacker-specified report generation options.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41236
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- smalltest
[/TD][TD]
Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41243
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- view26_test-reporting
[/TD][TD]
Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41244
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- walti
[/TD][TD]
Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41240
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- wildfly_deployer
[/TD][TD]
Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41235
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- worksoft_execution_manager
[/TD][TD]
A missing permission check in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41246
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jenkins -- worksoft_execution_manager
[/TD][TD]
A cross-site request forgery (CSRF) vulnerability in Jenkins Worksoft Execution Manager Plugin 10.0.3.503 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41245
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jetbrains -- intellij_idea
[/TD][TD]
The installer of JetBrains IntelliJ IDEA before 2022.2.2 was vulnerable to EXE search order hijacking
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40978
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jetbrains -- team_city
[/TD][TD]
In JetBrains TeamCity before 2022.04.4 environmental variables of "password" type could be logged when using custom Perforce executable
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40979
MISC[/TD]
[/TR]
[TR]
[TD]
jettison -- jettison
[/TD][TD]
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40149
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jettison -- jettison
[/TD][TD]
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40150
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
jfinal_cms -- jfinal_cms
[/TD][TD]
JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37205
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
jfinal_cms -- jfinal_cms
[/TD][TD]
Final CMS 5.1.0 is vulnerable to SQL Injection.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37204
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
jfinal_cms -- jfinal_cms
[/TD][TD]
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37203
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
jodit_editor -- jodit_editor
[/TD][TD]
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23461
CONFIRM[/TD]
[/TR]
[TR]
[TD]
kayrasoft -- kayrasoft
[/TD][TD]
Kayrasoft product before version 2 has an unauthenticated SQL Injection vulnerability. This is fixed in version 2.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2177
CONFIRM[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
A flaw was found in Keylime before 6.3.0. The logic in the Keylime agent for checking for a secure mount can be fooled by previously created unprivileged mounts allowing secrets to be leaked to other processes on the host.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23948
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-43310
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
In Keylime before 6.3.0, Revocation Notifier uses a fixed /tmp path for UNIX domain socket which can allow unprivileged users a method to prohibit keylime operations.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23950
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
In Keylime before 6.3.0, unsanitized UUIDs can be passed by a rogue agent and can lead to log spoofing on the verifier and registrar.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23949
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
In Keylime before 6.3.0, current keylime installer installs the keylime.conf file, which can contain sensitive data, as world-readable.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23952
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
keylime -- keylime
[/TD][TD]
In Keylime before 6.3.0, quote responses from the agent can contain possibly untrusted ZIP data which can lead to zip bombs.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23951
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
kfm -- kfm
[/TD][TD]
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40359
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
kisa -- bigfileagent
[/TD][TD]
An improper input validation vulnerability leading to arbitrary file execution was discovered in BigFileAgent. In order to cause arbitrary files to be executed, the attacker makes the victim access a web page d by them or inserts a script using XSS into a general website.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23766
MISC[/TD]
[/TR]
[TR]
[TD]
kisa -- nis-hap11ac
[/TD][TD]
This Vulnerability in NIS-HAP11AC is caused by an exposed external port for the telnet service. Remote attackers use this vulnerability to induce all attacks such as source code hijacking, remote control of the device.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23768
MISC[/TD]
[/TR]
[TR]
[TD]
kisa -- securegate
[/TD][TD]
This vulnerability of SecureGate is SQL-Injection using login without password. A path traversal vulnerability is also identified during file transfer. An attacker can take advantage of these vulnerabilities to perform various attacks such as obtaining privileges and executing remote code, thereby taking over the victim’s system.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23767
MISC[/TD]
[/TR]
[TR]
[TD]
kitty -- kitty
[/TD][TD]
In Kitty before 0.26.2, insufficient validation in the desktop notification escape sequence can lead to arbitrary code execution. The user must display attacker-controlled content in the terminal, then click on a notification popup.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41322
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
knot -- resolver
[/TD][TD]
Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40188
CONFIRM[/TD]
[/TR]
[TR]
[TD]
kubernetes -- cri-o
[/TD][TD]
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2995
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
librenms -- librenms
[/TD][TD]
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.9.0.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3231
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
liferay -- liferay_portal
[/TD][TD]
Path traversal vulnerability in the Hypermedia REST APIs module in Liferay Portal 7.4.0 through 7.4.2 allows remote attackers to access files outside of com.liferay.headless.discovery.web/META-INF/resources via the `parameter` parameter.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28981
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
HtmlUtil.escapeRedirect in Liferay Portal 7.3.1 through 7.4.2, and Liferay DXP 7.0 fix pack 91 through 101, 7.1 fix pack 17 through 25, 7.2 fix pack 5 through 14, and 7.3 before service pack 3 can be circumvented by using multiple forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28977
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
A cross-site scripting (XSS) vulnerability in Liferay Portal v7.3.3 through v7.4.2 and Liferay DXP v7.3 before service pack 3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name of a tag.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28982
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
The Layout module in Liferay Portal v7.3.3 through v7.4.3.34, and Liferay DXP 7.3 before update 10, and 7.4 before update 35 does not check user permission before showing the preview of a "Content Page" type page, allowing attackers to view unpublished "Content Page" pages via URL manipulation.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39975
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal v7.4.3.4 and Liferay DXP v7.4 GA allows attackers to execute arbitrary web scripts or HTML via parameters with the filter_ prefix.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28980
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36, and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation, allowing attackers to download a web content page's XLIFF translation file via crafted URL.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38512
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
Liferay Portal v7.1.0 through v7.4.2 and Liferay DXP 7.1 before fix pack 26, 7.2 before fix pack 15, and 7.3 before service pack 3 was discovered to contain a cross-site scripting (XSS) vulnerability in the Portal Search module's Custom Facet widget. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Parameter Name text field.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28979
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
liferay -- multiple_products
[/TD][TD]
Stored cross-site scripting (XSS) vulnerability in the Site module's user membership administration page in Liferay Portal 7.0.1 through 7.4.1, and Liferay DXP 7.0 before fix pack 102, 7.1 before fix pack 26, 7.2 before fix pack 15, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the a user's name.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28978
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD][TD]
An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36402
MISC[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD][TD]
A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3239
MISC[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD][TD]
mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41222
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD][TD]
In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41218
MISC
MISC
MLIST
MLIST
MLIST[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD][TD]
drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.
[/TD][TD]
2022-09-18
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40768
MISC
MISC
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
linux -- linux_kernel
[/TD]
[TD]
There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2785
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
linux -- linux-pam
[/TD][TD]
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28321
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
logcheck -- logcheck
[/TD][TD]
In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2017-20148
MISC
GENTOO[/TD]
[/TR]
[TR]
[TD]
mattermost -- mattermost
[/TD][TD]
Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3257
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mcwebserver -- mcwebserver
[/TD][TD]
McWebserver mod runs a simple HTTP server alongside the Minecraft server in seperate threads. Path traversal in McWebserver Minecraft Mod for Fabric and Quilt up to and including 0.1.2.1 and McWebserver Minecraft Mod for Forge up to and including 0.1.1 allows all files, accessible by the program, to be read by anyone via HTTP request. Version 0.2.0 with patches are released to both platforms (Fabric and Quilt, Forge). As a workaround, the McWebserver mod can be disabled by removing the file from the `mods` directory.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39221
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
measuresoft -- scadapro
[/TD][TD]
The security descriptor of Measuresoft ScadaPro Server version 6.7 has inconsistent permissions, which could allow a local user with limited privileges to modify the service binary path and start malicious commands with SYSTEM privileges.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3263
CONFIRM[/TD]
[/TR]
[TR]
[TD]
mediawiki -- mediawiki
[/TD][TD]
An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28201
MISC
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
mediawiki -- mediawiki
[/TD][TD]
A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1 can take more than thirty seconds. There is a DDoS risk.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28204
MISC[/TD]
[/TR]
[TR]
[TD]
mediawiki -- mediawiki
[/TD][TD]
A denial-of-service issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. When many files exist, requesting Special:NewFiles with actor as a condition can result in a very long running query.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28203
MISC
MLIST[/TD]
[/TR]
[TR]
[TD]
mend -- cloudreve
[/TD][TD]
Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-32167
MISC[/TD]
[/TR]
[TR]
[TD]
microsoft -- endpoint_configuration_manager
[/TD][TD]
Microsoft Endpoint Configuration Manager Spoofing Vulnerability.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37972
MISC[/TD]
[/TR]
[TR]
[TD]
microsoft -- networkd-dispatcher
[/TD][TD]
A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-29799
MISC[/TD]
[/TR]
[TR]
[TD]
microsoft -- networkd-dispatcher
[/TD][TD]
A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse this vulnerability to replace scripts that networkd-dispatcher believes to be owned by root with ones that are not.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-29800
MISC[/TD]
[/TR]
[TR]
[TD]
microsoft -- windows_ui_desktop
[/TD]
[TD]
A local privilege escalation vulnerability in UI Desktop for Windows (Version 0.55.1.2 and earlier) allows a malicious actor with local access to a Windows device with UI Desktop to run arbitrary commands as SYSTEM.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35257
MISC[/TD]
[/TR]
[TR]
[TD]
microweber -- microweber
[/TD][TD]
Code Injection in GitHub repository microweber/microweber prior to 1.3.2.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3242
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
microweber -- microweber
[/TD][TD]
HTML injection attack is closely related to Cross-site Scripting (XSS). HTML injection uses HTML to deface the page. XSS, as the name implies, injects JavaScript into the page. Both attacks exploit insufficient validation of user input.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3245
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
modern_campus -- omni_cms
[/TD][TD]
Modern Campus Omni CMS (formerly OU Campus) 10.2.4 allows login-page SQL injection via a '" OR 1 = 1 -- - , <?php' substring.
[/TD][TD]
2022-09-18
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40766
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
msi -- center
[/TD][TD]
Micro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate privileges via running a crafted executable.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38532
MISC[/TD]
[/TR]
[TR]
[TD]
mz_automation -- libiec61850
[/TD][TD]
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) uses a NULL pointer in certain situations. which could allow an attacker to crash the server.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2973
MISC[/TD]
[/TR]
[TR]
[TD]
mz_automation -- libiec61850
[/TD][TD]
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2971
MISC[/TD]
[/TR]
[TR]
[TD]
mz_automation -- libiec61850
[/TD][TD]
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) does not sanitize input before memcpy is used, which could allow an attacker to crash the device or remotely execute arbitrary code.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2970
MISC[/TD]
[/TR]
[TR]
[TD]
mz_automation -- libiec61850
[/TD]
[TD]
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2972
MISC[/TD]
[/TR]
[TR]
[TD]
necta -- wifi_mouse
[/TD][TD]
Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3218
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
nepxion_discovery -- nepxion_discovery
[/TD][TD]
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch available for this issue at time of publication. There are no known workarounds.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23464
MISC[/TD]
[/TR]
[TR]
[TD]
nepxion_discovery -- nepxion_discovery
[/TD]
[TD]
Nepxion Discovery is a solution for Spring Cloud. Discover is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes such as java.lang.Runtime, leading to Remote Code Execution. There is no patch available for this issue at time of publication. There are no known workarounds.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23463
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- n300_router
[/TD][TD]
Netgear N300 wireless router wnr2000v4-V1.0.0.70 is vulnerable to Buffer Overflow via uhttpd. There is a stack overflow vulnerability caused by strcpy.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37232
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- n300_wireless_router_wnr2000v4
[/TD][TD]
Netgear N300 wireless router wnr2000v4-V1.0.0.70 was discovered to contain a stack overflow via strcpy in uhttpd.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-31937
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- nighthawk_router
[/TD][TD]
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncat
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37235
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- nighthawk_router
[/TD][TD]
Netgear Nighthawk AC1900 Smart WiFi Dual Band Gigabit Router R7000-V1.0.11.134_10.2.119 is vulnerable to Buffer Overflow via the wl binary in firmware. There is a stack overflow vulnerability caused by strncpy.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37234
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- wpn824ext_wifi_range_extender
[/TD][TD]
An exploitable firmware modification vulnerability was discovered on the Netgear WPN824EXT WiFi Range Extender. An attacker can conduct a MITM attack to modify the user-uploaded firmware image and bypass the CRC check. A successful attack can either introduce a backdoor to the device or make the device DoS. This affects Firmware Version: 1.1.1_1.1.9.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38955
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netgear -- wpn824ext_wifi_range_extender
[/TD][TD]
An exploitable firmware downgrade vulnerability was discovered on the Netgear WPN824EXT WiFi Range Extender. An attacker can conduct a MITM attack to replace the user-uploaded firmware image with an original old firmware image. This affects Firmware 1.1.1_1.1.9 and earlier.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38956
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
netlify -- netlify-ipx
[/TD][TD]
netlify-ipx is an on-Demand image optimization for Netlify using ipx. In versions prior to 1.2.3, an attacker can bypass the source image domain allowlist by sending specially crafted headers, causing the handler to load and return arbitrary images. Because the response is cached globally, this image will then be served to visitors without requiring those headers to be set. XSS can be achieved by requesting a malicious SVG with embedded scripts, which would then be served from the site domain. Note that this does not apply to images loaded in `<img>` tags, as scripts do not execute in this context. The image URL can be set in the header independently of the request URL, meaning any site images that have not previously been cached can have their cache poisoned. This problem has been fixed in version 1.2.3. As a workaround, cached content can be cleared by re-deploying the site.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39239
CONFIRM[/TD]
[/TR]
[TR]
[TD]
nextcloud -- security-advisories
[/TD][TD]
Nextcloud android is the official Android client for the Nextcloud home server platform. Internal paths to the Nextcloud Android app files are not properly protected. As a result access to internal files of the from within the Nextcloud Android app is possible. This may lead to a leak of sensitive information in some cases. It is recommended that the Nextcloud Android app is upgraded to 3.21.0. There are no known workarounds for this issue.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39210
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
nextcloud -- security-advisories
[/TD][TD]
Nextcloud Talk is an open source chat, video & audio calls client for the Nextcloud platform. In affected versions an attacker could see the last video frame of any participant who has video disabled but a camera selected. It is recommended that the Nextcloud Talk app is upgraded to 13.0.8 or 14.0.4. Users unable to upgrade should select "None" as camera before joining the call.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39212
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
nextcloud -- security-advisories
[/TD][TD]
Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39211
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
nhn -- toast_ui_grid
[/TD][TD]
Toast UI Grid is a component to display and edit data. Versions prior to 4.21.3 are vulnerable to cross-site scripting attacks when pasting specially crafted content into editable cells. This issue was fixed in version 4.21.3. There are no known workarounds.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23458
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
nokia -- 1350_optical_management_system
[/TD][TD]
An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /cgi-bin/R14.2* endpoints.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40712
MISC[/TD]
[/TR]
[TR]
[TD]
nokia -- 1350_optical_management_system
[/TD][TD]
An issue was discovered in NOKIA 1350OMS R14.2. Multiple Relative Path Traversal issues exist in different specific endpoints via the file parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40713
MISC[/TD]
[/TR]
[TR]
[TD]
nokia -- 1350_optical_management_system
[/TD][TD]
An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /oms1350/* endpoints.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40714
MISC[/TD]
[/TR]
[TR]
[TD]
nokia -- 1350_optical_management_system
[/TD][TD]
An issue was discovered in NOKIA 1350OMS R14.2. An Absolute Path Traversal vulnerability exists for a specific endpoint via the logfile parameter, allowing a remote authenticated attacker to read files on the filesystem arbitrarily.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40715
MISC[/TD]
[/TR]
[TR]
[TD]
octoprint -- octoprint
[/TD][TD]
Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2872
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
octoprint -- octoprint
[/TD][TD]
Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3068
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
octoprint -- octoprint
[/TD][TD]
If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2888
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_customer.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40117
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40113
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/edit_customer_action.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40122
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds_action.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40118
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/edit_customer.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40114
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/beneficiary.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40116
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search_term parameter at /net-banking/transactions.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40119
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search_term parameter at /net-banking/customer_transactions.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40120
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/manage_customers.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40121
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online banking system -- online banking system
[/TD][TD]
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_beneficiary.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40115
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online_pet_shop_web_application -- online_pet_shop_web_application
[/TD][TD]
Online Pet Shop We App v1.0 is vulnerable to SQL injection via /pet_shop/classes/Master.php?f=delete_sub_category,id
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40934
MISC[/TD]
[/TR]
[TR]
[TD]
online_pet_shop_web_application -- online_pet_shop_web_application
[/TD][TD]
Online Pet Shop We App v1.0 by oretnom23 is vulnerable to SQL injection via /pet_shop/classes/Master.php?f=delete_order,id.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40933
MISC[/TD]
[/TR]
[TR]
[TD]
online_pet_shop_web_application -- online_pet_shop_web_application
[/TD][TD]
Online Pet Shop We App v1.0 is vulnerable to SQL Injection via /pet_shop/classes/Master.php?f=delete_category,id.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40935
MISC[/TD]
[/TR]
[TR]
[TD]
open5gs -- open5gs
[/TD][TD]
When Open5GS UPF receives a PFCP Session Establishment Request, it stores related values for building the PFCP Session Establishment Response. Once UPF receives a request, it gets the f_teid_len from incoming message, and then uses it to copy data from incoming message to struct f_teid without checking the maximum length. If the pdi.local_f_teid.len exceeds the maximum length of the struct of f_teid, the memcpy() overwrites the fields (e.g., f_teid_len) after f_teid in the pdr struct. After parsing the request, the UPF starts to build a response. The f_teid_len with its overwritten value is used as a length for memcpy(). A segmentation fault occurs, as a result of a memcpy(), if this overwritten value is large enough.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39063
MISC[/TD]
[/TR]
[TR]
[TD]
openwrt -- openwrt
[/TD][TD]
Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38333
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
opswat -- metadefender
[/TD][TD]
A stored Cross-Site Scripting (XSS) vulnerability in OPSWAT MetaDefender ICAP Server before 4.13.0 allows attackers to execute arbitrary JavaScript or HTML because of the blocked page response.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40778
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fe954.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35030
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6adb1e.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35037
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x65fc97.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35070
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35024
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0a32.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35060
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e20a0.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35039
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b064d.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35038
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6b6a8f.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35032
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /lib/x86_64-linux-gnu/libc.so.6+0xbb384.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35023
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e1fc8.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35036
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fbbb6.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35028
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x65f724.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35065
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x703969.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35031
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6babea.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35029
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e7e3d.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35034
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0bc3.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35062
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fe9a7.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35027
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fbc0b.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35026
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b559f.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35035
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e412a.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35061
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e41a8.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35063
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x5266a8.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35025
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e41b8.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35066
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x4adcdb in __asan_memset.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35064
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e41b0.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35067
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e420d.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35068
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b544e.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35069
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a global buffer overflow via /release-x64/otfccdump+0x718693.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35021
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
otfcc -- otfcc
[/TD][TD]
OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6badae.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35022
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
owasp -- modsecurity_core_rule_set
[/TD][TD]
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39955
CONFIRM[/TD]
[/TR]
[TR]
[TD]
owasp -- modsecurity_core_rule_set
[/TD][TD]
The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39957
CONFIRM[/TD]
[/TR]
[TR]
[TD]
owasp -- modsecurity_core_rule_set
[/TD][TD]
The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, access to which would ordinarily be detected, may be exfiltrated from the backend, despite being protected by a web application firewall that uses CRS. Short subsections of a restricted resource may bypass pattern matching techniques and allow undetected access. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39958
CONFIRM[/TD]
[/TR]
[TR]
[TD]
owasp -- modsecurity_core_rule_set
[/TD][TD]
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass for HTTP multipart requests by submitting a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MIME header fields that will not be decoded and inspected by the web application firewall engine and the rule set. The multipart payload will therefore bypass detection. A vulnerable backend that supports these encoding schemes can potentially be exploited. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised upgrade to 3.2.2 and 3.3.3 respectively. The mitigation against these vulnerabilities depends on the installation of the latest ModSecurity version (v2.9.6 / v3.0.8).
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39956
CONFIRM[/TD]
[/TR]
[TR]
[TD]
pagekit -- pagekit
[/TD][TD]
A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38916
MISC[/TD]
[/TR]
[TR]
[TD]
parantez_teknoloji -- kohac
[/TD][TD]
The library automation system product KOHA developed by Parantez Teknoloji before version 19.05.03 has an unauthenticated SQL Injection vulnerability. This has been fixed in the version 19.05.03.01.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-0495
CONFIRM[/TD]
[/TR]
[TR]
[TD]
paritytech -- frontier
[/TD][TD]
Frontier is an Ethereum compatibility layer for Substrate. Prior to commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state. This issue has been patched in commit d3beddc6911a559a3ecc9b3f08e153dbe37a8658. There are no known workarounds.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39242
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
parse-community -- parse-server
[/TD][TD]
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 4.10.16, or from 5.0.0 to 5.2.6, validation of the authentication adapter app ID for _Facebook_ and _Spotify_ may be circumvented. Configurations which allow users to authenticate using the Parse Server authentication adapter where `appIds` is set as a string instead of an array of strings authenticate requests from an app with a different app ID than the one specified in the `appIds` configuration. For this vulnerability to be exploited, an attacker needs to be assigned an app ID by the authentication provider which is a sub-set of the server-side configured app ID. This issue is patched in versions 4.10.16 and 5.2.7. There are no known workarounds.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39231
CONFIRM[/TD]
[/TR]
[TR]
[TD]
parse-community -- parse-server
[/TD][TD]
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 4.10.15, or 5.0.0 and above prior to 5.2.6, a user can write to the session object of another user if the session object ID is known. For example, an attacker can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object. Note that assigning a session to another user does not usually change the privileges of either of the two users, and a user cannot assign their own session to another user. This issue is patched in version 4.10.15 and above, and 5.2.6 and above. To mitigate this issue in unpatched versions add a `beforeSave` trigger to the `_Session` class and prevent writing if the requesting user is different from the user in the session object.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39225
CONFIRM[/TD]
[/TR]
[TR]
[TD]
pbc -- pbc
[/TD][TD]
An issue has been found in PBC through 2022-8-27. A SEGV issue detected in the function pbc_wmessage_integer in src/wmessage.c:137.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38936
MISC[/TD]
[/TR]
[TR]
[TD]
pds -- vista_7
[/TD][TD]
The ‘document’ parameter of PDS Vista 7’s /application/documents/display.aspx page is vulnerable to a Local File Inclusion vulnerability which allows an low-privileged authenticated attacker to leak the configuration files and source code of the web application.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-34002
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
pimcore -- pimcore
[/TD][TD]
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can: Perform any action within the application that the user can perform. View any information that the user is able to view. Modify any information that the user is able to modify. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3255
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
processmaker -- processmaker
[/TD][TD]
ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the user profile page. This vulnerability allows attackers to escalate normal users to Administrators.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38577
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
profanity -- profanity
[/TD][TD]
profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
[/TD][TD]
2022-09-18
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40769
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
protobuf -- multiple_products
[/TD][TD]
A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-1941
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
python-jwt -- python-jwt
[/TD][TD]
python-jwt is a module for generating and verifying JSON Web Tokens. Versions prior to 3.3.4 are subject to Authentication Bypass by Spoofing, resulting in identity spoofing, session hijacking or authentication bypass. An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. Users should upgrade to version 3.3.4. There are no known workarounds.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39227
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in WLAN due to buffer copy without checking size of input while parsing keys in Snapdragon Connectivity, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25708
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
memory corruption in Kernel due to race condition while getting mapping reference in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22094
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in video module due to buffer overflow while processing WAV file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25686
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in synx driver due to use-after-free condition in the synx driver due to accessing object handles without acquiring lock in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22095
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in video due to buffer overflow while parsing ps video clips in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25688
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22093
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Information disclosure in Bluetooth driver due to buffer over-read while reading l2cap length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25706
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in display due to time-of-check time-of-use race condition during map or unmap in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25696
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Improper authorization of a replayed LTE security mode command can lead to a denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22091
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in kernel due to use after free issue in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22092
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Possible integer overflow and memory corruption due to improper validation of buffer size sent to write to console when computing the payload size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25656
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Information disclosure in WLAN due to improper validation of array index while parsing crafted ANQP action frames in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25690
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in graphics due to use-after-free while graphics profiling in Snapdragon Connectivity, Snapdragon Mobile
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25693
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Information disclosure in video due to buffer over-read while processing avi file in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25653
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in audio while playing record due to improper list handling in two threads in Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22089
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory Corruption during wma file playback due to integer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22074
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in audio module due to integer overflow in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22081
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in kernel due to improper input validation while processing ION commands in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25654
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Denial of service in WLAN HOST due to buffer over read while unpacking frames in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25670
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption in bluetooth due to integer overflow while processing HFP-UNIT profile in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22105
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Memory corruption occurs while processing command received from HLOS due to improper length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-22066
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- multiple_products
[/TD][TD]
Denial of service in video due to buffer over read while parsing MP4 clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25669
CONFIRM[/TD]
[/TR]
[TR]
[TD]
qualcomm -- snapdragon_wired_infrastructure_and_networking
[/TD][TD]
Cryptographic issues in BSP due to improper hash verification in Snapdragon Wired Infrastructure and Networking
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25652
CONFIRM[/TD]
[/TR]
[TR]
[TD]
rapid7 -- insightvm
[/TD][TD]
Rapid7 InsightVM suffers from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the Inspect Element browser feature to remove the login panel and view the details available in the last webpage visited by previous user
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2019-5641
CONFIRM[/TD]
[/TR]
[TR]
[TD]
redis -- redis
[/TD][TD]
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35951
CONFIRM
FEDORA[/TD]
[/TR]
[TR]
[TD]
renlm -- mygraph
[/TD][TD]
MyGraph is a permission management system. Versions prior to 1.0.4 are vulnerable to a storage XSS vulnerability leading to Remote Code Execution. This issue is patched in version 1.0.4. There is no known workaround.
[/TD][TD]
2022-09-24
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39240
CONFIRM[/TD]
[/TR]
[TR]
[TD]
rockwell_automation-- thinmanager_thinserver
[/TD][TD]
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38742
MISC[/TD]
[/TR]
[TR]
[TD]
ruby-arr-pm -- ruby-arr-pm
[/TD][TD]
Arr-pm is an RPM reader/writer library written in Ruby. Versions prior to 0.0.12 are subject to OS command injection resulting in shell execution if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class of this library. Version 0.0.12 patches these issues. A workaround for this issue is to ensure any RPMs being processed contain valid/known payload compressor values such as gzip, bzip2, xz, zstd, and lzma. The payload compressor field in an rpm can be checked by using the rpm command line tool.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39224
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
safe -- fme_server
[/TD][TD]
Safe Software FME Server v2021.2.5, v2022.0.0.2 and below contains a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the login page.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38339
MISC[/TD]
[/TR]
[TR]
[TD]
safe -- fme_server
[/TD][TD]
Safe Software FME Server v2021.2.5, v2022.0.0.2 and below was discovered to contain a Path Traversal vulnerability via the component fmedataupload.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38340
MISC[/TD]
[/TR]
[TR]
[TD]
safe -- fme_server
[/TD][TD]
Safe Software FME Server v2021.2.5 and below does not employ server-side validation.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38341
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
A NULL pointer dereference issue in the TEE_MACCompareFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACCompareFinal with a NULL pointer for the parameter operation.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40759
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
A Buffer Access with Incorrect Length Value vulnerablity in the TEE_CipherUpdate function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_CipherUpdate with an excessive size value of srcLen.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40758
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
A Buffer Access with Incorrect Length Value vulnerablity in the TEE_MACUpdate function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACUpdate with an excessive size value of chunkSize.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40760
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
The function tee_obj_free in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_AllocateOperation with a disturbed heap layout, related to utee_cryp_obj_alloc.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40761
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
A Memory Allocation with Excessive Size Value vulnerablity in the TEE_Realloc function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_Realloc with an excessive number for the parameter len.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40762
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
samsung -- mtower
[/TD][TD]
A Buffer Access with Incorrect Length Value vulnerablity in the TEE_MACComputeFinal function in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_MACComputeFinal with an excessive size value of messageLen.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40757
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
scala -- scala
[/TD][TD]
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36944
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
smokeping -- smokeping
[/TD][TD]
In the ebuild package through smokeping-2.7.3-r1 for SmokePing on Gentoo, the initscript allows the smokeping user to gain ownership of any file, allowing for the smokeping user to gain root privileges. There is a race condition involving /var/lib/smokeping and chown.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2016-20015
MISC[/TD]
[/TR]
[TR]
[TD]
smokeping -- smokeping
[/TD][TD]
In the ebuild package through smokeping-2.7.3-r1 for SmokePing on Gentoo, the initscript uses a PID file that is writable by the smokeping user. By writing arbitrary PIDs to that file, the smokeping user can cause a denial of service to arbitrary PIDs when the service is stopped.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2017-20147
MISC
GENTOO[/TD]
[/TR]
[TR]
[TD]
snipe-it -- snipe-it
[/TD][TD]
Improper Authentication in GitHub repository snipe/snipe-it prior to 6.0.10.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3173
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
solidigm -- ssd_dc_products
[/TD][TD]
Improper authentication in firmware for some Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-33076
MISC[/TD]
[/TR]
[TR]
[TD]
solidigm -- ssd_dc_products
[/TD][TD]
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-33081
MISC[/TD]
[/TR]
[TR]
[TD]
solidigm -- ssd_dc_products
[/TD][TD]
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-33079
MISC[/TD]
[/TR]
[TR]
[TD]
sophos -- firewall
[/TD][TD]
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3236
CONFIRM[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- news247_news_magazine_(cms)
[/TD][TD]
Cross Site Scripting (XSS vulnerability exists in )Sourcecodester News247 News Magazine (CMS) PHP 5.6 or higher and MySQL 5.7 or higher via the blog category name field
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-41731
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- online_tours_and_travels_management_system
[/TD][TD]
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tour/admin/update_tax.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40093
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- online_tours_and_travels_management_system
[/TD][TD]
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tour/admin/update_payment.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40092
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- online_tours_and_travels_management_system
[/TD][TD]
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tour/admin/update_packages.php.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40091
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_college
[/TD][TD]
Simple College Website v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /college_website/index.php?page=. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the page parameter.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40088
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_college
[/TD][TD]
A remote file inclusion (RFI) vulnerability in Simple College Website v1.0 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploitable when the directive allow_url_include is set to On.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40089
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_college
[/TD][TD]
Simple College Website v1.0 was discovered to contain an arbitrary file write vulnerability via the function file_put_contents(). This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40087
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_task_managing_system
[/TD][TD]
SourceCodester Simple Task Managing System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at changeStatus.php.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40030
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_task_managing_system
[/TD][TD]
SourceCodester Simple Task Managing System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at board.php.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40026
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_task_managing_system
[/TD][TD]
SourceCodester Simple Task Managing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component newTask.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the shortName parameter.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40027
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_task_managing_system
[/TD][TD]
SourceCodester Simple Task Managing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component newProjectValidation.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fullName parameter.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40028
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- simple_task_managing_system
[/TD][TD]
SourceCodester Simple Task Managing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component newProjectValidation.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the shortName parameter.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40029
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- storage_unit_rental_management_system
[/TD][TD]
A Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Storage Unit Rental Management System PHP 8.0.10 , Apache 2.4.14, SURMS V 1.0 via the Add New Tenant List Rent List form.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-42597
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
steal -- steal
[/TD][TD]
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37259
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
steal -- steal
[/TD][TD]
Prototype pollution vulnerability in stealjs steal 2.2.4 via the alias variable in babel.js.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37265
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
steal -- steal
[/TD][TD]
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37258
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
supremainc -- biostar_2
[/TD][TD]
A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38351
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via __asan_memcpy at /asan/asan_interceptors_memintrinsics.cpp:.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35090
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a memory leak via /lib/mem.c.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35085
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a floating point exception (FPE) via DCTStream::readMCURow() at /xpdf/Stream.cc.ow()
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35091
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via DCTStream::readHuffSym(DCTHuffTable*) at /xpdf/Stream.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35094
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a global buffer overflow via DCTStream::transformDataUnit at /xpdf/Stream.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35093
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via convert_gfxline at /gfxpoly/convert.c.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35092
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via FoFiTrueType::writeTTF at /xpdf/FoFiTrueType.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35097
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via GfxICCBasedColorSpace::getDefaultColor(GfxColor*) at /xpdf/GfxState.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35098
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap-buffer-overflow via getTransparentColor at /home/bupt/Desktop/swftools/src/gif2swf.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35089
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35099
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap buffer-overflow via getGifDelayTime at /home/bupt/Desktop/swftools/src/src/gif2swf.c.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35088
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a was discovered to contain a heap-buffer overflow via the function readU8 at /lib/ttf.c.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40008
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a was discovered to contain a heap-use-after-free via the function grow_unicode at /lib/ttf.c.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40009
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via draw_stroke at /gfxpoly/stroke.c.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35096
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via MovieAddFrame at /src/gif2swf.c.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35087
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via InfoOutputDev::type3D1 at /pdf/InfoOutputDev.cc.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35095
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
swftools -- swftools
[/TD][TD]
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35086
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tacitine -- firewall
[/TD][TD]
This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper session management in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform session fixation on the targeted device.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40630
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tacitine -- firewall
[/TD][TD]
This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper control of code generation in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary commands on the targeted device.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40628
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tacitine -- firewall
[/TD][TD]
This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to insecure design in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to view sensitive information on the targeted device.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40629
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tenable -- visam_vbase
[/TD][TD]
When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3217
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 and AC18 routers V15.03.05.19 contain heap overflow vulnerabilities in the function setSchedWifi with the request /goform/openSchedWifi/
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40865
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function setSmartPowerManagement with the request /goform/PowerSaveSet
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40864
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 and AC18 router V15.03.05.19 contains stack overflow vulnerability in the function fromNatStaticSetting with the request /goform/NatStaticSetting
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40862
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 router V15.03.05.19 contains a stack overflow vulnerability in the function formSetQosBand->FUN_0007dd20 with request /goform/SetNetControlList
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40860
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 V15.03.05.19 contained a stack overflow via the function fromAddressNat.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40851
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac18
[/TD][TD]
Tenda AC18 router V15.03.05.19 contains a stack overflow vulnerability in the formSetQosBand->FUN_0007db78 function with the request /goform/SetNetControlList/
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40861
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac18
[/TD][TD]
Tenda AC18 router contained a stack overflow vulnerability in /goform/fast_setting_wifi_set
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40854
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, formSetDeviceName.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40071
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: formSetVirtualSer.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40067
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: formSetQosBand.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40068
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via bin/httpd, function: formSetFirewallCfg.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40070
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, form_fast_setting_wifi_set.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40075
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: setSmartPowerManagement.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40072
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
]Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: fromSetSysTime.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40069
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, setSchedWifi.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40074
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: fromSetWifiGusetBasic.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40076
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac21
[/TD][TD]
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, saveParentControlInfo.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40073
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formSetAutoPing function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40103
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDget function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40104
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDset function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40102
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the set_local_time function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40106
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterGet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40105
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a command injection vulnerability via the FormexeCommand function.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40100
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40101
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- i9
[/TD][TD]
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formexeCommand function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40107
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- multiple_products
[/TD][TD]
Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function fromDhcpListClient with a combined parameter "list*" ("%s%d","list").
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40869
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- w20e
[/TD][TD]
Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a stack overflow vulnerability in the function formDelDhcpRule with the request /goform/delDhcpRules/
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40868
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- w20e
[/TD][TD]
Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (DoS) or Remote Code Execution (RCE) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40855
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- w20e
[/TD]
[TD]
Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a stack overflow vulnerability in the function formIPMacBindDel with the request /goform/delIpMacBind/
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40867
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- w20e
[/TD]
[TD]
Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a stack overflow vulnerability in the function formSetDebugCfg with request /goform/setDebugCfg/
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40866
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac15
[/TD][TD]
Tenda AC15 router V15.03.05.19 contains a stack overflow via the list parameter at /goform/fast_setting_wifi_set
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40853
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of `AvgPool3DGradOp` does not fully validate the input `orig_input_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 9178ac9d6389bdc54638ab913ea0e419234d14eb. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35959
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bce3717eaef4f769019fd18e990464ca4a2efeea. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35965
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of `BlockLSTMGradV2` does not fully validate its inputs. This results in a a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 2a458fc4866505be27c62f81474ecb2b870498fa. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35964
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 03a659d7be9a1154fdf5eeac221e5950fec07dad. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35963
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35935
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `AvgPoolOp` function takes an argument `ksize` that must be positive but is not checked. A negative `ksize` can trigger a `CHECK` failure and crash the program. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds to this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35941
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `ScatterNd` function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or less than zero will either write content at the wrong index or trigger a crash. We have patched the issue in GitHub commit b4d4b4cb019bd7240a52daa4ba61e3cc814f0384. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35939
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. This issue has been patched in GitHub commit 4142e47e9e31db481781b955ed3ff807a781b494. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35938
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read is triggered. This issue has been patched in GitHub commit 595a65a3e224a0362d7e68c2213acfc2b499a196. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35937
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36027
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35934
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedAdd` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 49b3824d83af706df0ad07e4e677d88659756d89. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35967
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedBiasAdd` is given `min_input`, `max_input`, `min_bias`, `max_bias` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35972
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of `AvgPoolGrad` does not fully validate the input `orig_input_shape`. This results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35968
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The implementation of `Conv2DBackpropInput` requires `input_sizes` to be 4-dimensional. Otherwise, it gives a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 50156d547b9a1da0144d7babe665cf690305b33c. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35969
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedInstanceNorm` is given `x_min` or `x_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35970
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35971
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedAvgPool` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 7cdf9d4d2083b739ec81cfdace546b0c99f50622. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35966
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedMatMul` is given nonscalar input for: `min_a`, `max_a`, `min_b`, or `max_b` It gives a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit aca766ac7693bf29ed0df55ad6bfcc78f35e7f48. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35973
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizeDownAndShrinkRange` is given nonscalar inputs for `input_min` or `input_max`, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 73ad1815ebcfeb7c051f9c2f7ab5024380ca8613. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35974
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizedRelu` or `QuantizedRelu6` are given nonscalar inputs for `min_features` or `max_features`, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 49b3824d83af706df0ad07e4e677d88659756d89. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35979
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `RaggedRangOp` function takes an argument `limits` that is eventually used to construct a `TensorShape` as an `int64`. If `limits` is a very large float, it can overflow when converted to an `int64`. This triggers an `InvalidArgument` but also throws an abort signal that crashes the program. We have patched the issue in GitHub commit 37cefa91bee4eace55715eeef43720b958a01192. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35940
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. In `core/kernels/list_kernels.cc's TensorListReserve`, `num_elements` is assumed to be a tensor of size 1. When a `num_elements` of more than 1 element is provided, then `tf.raw_ops.TensorListReserve` fails the `CHECK_EQ` in `CheckIsAlignedAndSingleElement`. We have patched the issue in GitHub commit b5f6fbfba76576202b72119897561e3bd4f179c7. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35960
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `Save` or `SaveSlices` is run over tensors of an unsupported `dtype`, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 5dd7b86b84a864b834c6fa3d7f9f51c87efa99d4. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35983
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `RaggedTensorToVariant` is given a `rt_nested_splits` list that contains tensors of ranks other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 88f93dfe691563baa4ae1e80ccde2d5c7a143821. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36018
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit aed36912609fc07229b4d0a7b44f3f48efc00fd0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36000
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `SparseBincount` is given inputs for `indices`, `values`, and `dense_shape` that do not make a valid sparse tensor, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 40adbe4dd15b582b0210dfbf40c243a62f5119fa. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35982
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. The `UnbatchGradOp` function takes an argument `id` that is assumed to be a scalar. A nonscalar `id` can trigger a `CHECK` failure and crash the program. It also requires its argument `batch_index` to contain three times the number of elements as indicated in its `batch_index.dim_size(0)`. An incorrect `batch_index` can trigger a `CHECK` failure and crash the program. We have patched the issue in GitHub commit 5f945fc6409a3c1e90d6970c9292f805f6e6ddf2. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35952
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. `FractionalMaxPoolGrad` validates its inputs with `CHECK` failures instead of with returning errors. If it gets incorrectly sized inputs, the `CHECK` failure can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 8741e57d163a079db05a7107a7609af70931def4. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35981
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36026
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `AudioSummaryV2` receives an input `sample_rate` with more than one element, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf6b45244992e2ee543c258e519489659c99fb7f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35995
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `Conv2DBackpropInput` receives empty `out_backprop` inputs (e.g. `[3, 1, 0, 1]`), the current CPU/GPU kernels `CHECK` fail (one with dnnl, the other with cudnn). This can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 27a65a43cf763897fecfa5cdb5cc653fc5dd0346. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35999
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36012
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit 1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36011
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `Requantize` is given `input_min`, `input_max`, `requested_output_min`, `requested_output_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36017
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `RandomPoissonV2` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 552bfced6ce4809db5f3ca305f60ff80dd40c5a3. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36003
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `RangeSize` receives values that do not fit into an `int64_t`, it crashes. We have patched the issue in GitHub commit 37e64539cd29fcfb814c4451152a60f5d107b0f0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36015
CONFIRM
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `tensorflow::full_type::SubstituteFromAttrs` receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status. We have patched the issue in GitHub commit 6104f0d4091c260ce9352f9155f7e9b725eab012. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36016
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `mlir::tfg::TFOp::nameAttr` receives null type list attributes, it crashes. We have patched the issue in GitHub commits 3a754740d5414e362512ee981eefba41561a63a6 and a0f0b9a21c9270930457095092f558fbad4c03e5. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36014
MISC
MISC
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `mlir::tfg::GraphDefImporter::ConvertNodeDef` tries to convert NodeDefs without an op name, it crashes. We have patched the issue in GitHub commit a0f0b9a21c9270930457095092f558fbad4c03e5. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36013
MISC
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36019
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c8ba76d48567aed347508e0552a257641931024d. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35998
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. `DenseBincount` assumes its input tensor `weights` to either have the same shape as its input tensor `input` or to be length-0. A different `weights` shape will trigger a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bf4c14353c2328636a18bfad1e151052c81d5f43. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35987
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. `ParameterizedTruncatedNormal` assumes `shape` is of type `int32`. A valid `shape` of type `int64` results in a mismatched type `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 72180be03447a10810edca700cbc9af690dfeb51. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35984
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit f3cf67ac5705f4f04721d15e485e192bb319feed. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36005
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `LRNGrad` is given an `output_image` input tensor that is not 4-D, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bd90b3efab4ec958b228cd7cfe9125be1c0cf255. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35985
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `RaggedBincount` is given an empty input tensor `splits`, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 7a4591fd4f065f4fa903593bc39b2f79530a74b8. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35986
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `DrawBoundingBoxes` receives an input `boxes` that is not of dtype `float`, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit da0d65cdc1270038e72157ba35bf74b85d9bda11. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36001
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `tf.linalg.matrix_rank` receives an empty input `a`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c55b476aa0e0bd4ee99d0f3ad18d9d706cd1260a. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35988
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 32d7bd3defd134f21a4e344c8dfd40099aaf6b18. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35989
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `tf.quantization.fake_quant_with_min_max_vars_per_channel_gradient` receives input `min` or `max` of rank other than 1, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit f3cf67ac5705f4f04721d15e485e192bb319feed. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35990
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `TensorListScatter` and `TensorListScatterV2` receive an `element_shape` of a rank greater than one, they give a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit bb03fdf4aae944ab2e4b35c7daa051068a8b7f61. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35991
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `TensorListFromTensor` receives an `element_shape` of a rank greater than one, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 3db59a042a38f4338aa207922fa2f476e000a6ee. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35992
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `SetSize` receives an input `set_shape` that is not a 1D tensor, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit cf70b79d2662c0d3c6af74583641e345fc939467. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35993
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `CollectiveGather` receives an scalar input `input`, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit c1f491817dec39a26be3c574e86a88c30f3c4770. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35994
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `Conv2D` is given empty `input` and the `filter` and `padding` sizes are valid, the output is all-zeros. This causes division-by-zero floating point exceptions that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 611d80db29dd7b0cfb755772c69d60ae5bca05f9. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35996
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. If `tf.sparse.cross` receives an input `separator` that is not a scalar, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 83dcb4dbfa094e33db084e97c4d0531a559e0ebf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35997
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `Unbatch` receives a nonscalar input `id`, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 4419d10d576adefa36b0e0a9425d2569f7c0189f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36002
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
tensorflow -- tensorflow
[/TD][TD]
TensorFlow is an open source platform for machine learning. When `tf.random.gamma` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 552bfced6ce4809db5f3ca305f60ff80dd40c5a3. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36004
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tesla -- model_3
[/TD][TD]
Tesla Model 3 V11.0(2022.4.5.1 6b701552d7a6) Tesla mobile app v4.23 is vulnerable to Authentication Bypass by spoofing. Tesla Model 3's Phone Key authentication is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to open a door and drive the car away by leveraging access to a legitimate Phone Key.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37709
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
testlink -- testlink
[/TD][TD]
TestLink v1.9.20 was discovered to contain a stored cross-site scripting (XSS) vulnerability via /lib/inventory/inventoryView.php.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35194
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
testlink -- testlink
[/TD][TD]
TestLink v1.9.20 was discovered to contain a Cross-Site Request Forgery (CSRF) via /lib/plan/planView.php.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35196
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tibco -- multiple_products
[/TD][TD]
The Web Player component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows a low privileged attacker with network access to execute blind Server Side Request Forgery (SSRF) on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 12.0.0 and TIBCO Spotfire Server: version 12.0.0.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-30579
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tibco -- tibco_ebx
[/TD][TD]
The Web Server component of TIBCO Software Inc.'s TIBCO EBX contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 6.0.0 through 6.0.8.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-30577
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tibco -- tibco_ebx_add-ons
[/TD][TD]
The Web Server component of TIBCO Software Inc.'s TIBCO EBX Add-ons contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 5.4.1 and below.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-30578
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
tinyproxy -- tinyproxy
[/TD][TD]
Tinyproxy commit 84f203f and earlier does not process HTTP request lines in the process_request() function and is using uninitialized buffers. This vulnerability allows attackers to access sensitive information at system runtime.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40468
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40142
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40139
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40140
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product’s login authentication by falsifying request parameters on affected installations.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40144
N/A
N/A
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40143
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- apex_one
[/TD][TD]
A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40141
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- housecall
[/TD][TD]
A vulnerability on Trend Micro HouseCall version 1.62.1.1133 and below could allow a local attacker to escalate privlieges due to an overly permissive folder om the product installer.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38764
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- mobile_security
[/TD][TD]
A potential unathenticated file deletion vulnerabilty on Trend Micro Mobile Security for Enterprise 9.8 SP5 could allow an attacker with access to the Management Server to delete files. This issue was resolved in 9.8 SP5 Critical Patch 2.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40980
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- security
[/TD][TD]
Trend Micro Security 2022 (consumer) has a link following vulnerability where an attacker with lower privileges could manipulate a mountpoint which could lead to escalation of privilege on an affected machine.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-34893
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- security
[/TD][TD]
Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-37347.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37348
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
trend_micro -- security
[/TD][TD]
Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-35234.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37347
N/A
N/A[/TD]
[/TR]
[TR]
[TD]
uboot -- uboot
[/TD]
[TD]
There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2347
MISC[/TD]
[/TR]
[TR]
[TD]
ucms -- ucms
[/TD][TD]
UCMS v1.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Import function under the Site Management page.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38527
MISC[/TD]
[/TR]
[TR]
[TD]
valine -- valine
[/TD][TD]
Valine v1.4.18 was discovered to contain a remote code execution (RCE) vulnerability which allows attackers to execute arbitrary code via a crafted POST request.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38545
MISC[/TD]
[/TR]
[TR]
[TD]
velneo -- vclient
[/TD][TD]
Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-45035
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
veritas -- desktop_and_laptop_option
[/TD][TD]
A Reflected Cross-Site Scripting (XSS) vulnerability affects the Veritas Desktop Laptop Option (DLO) application login page (aka the DLOServer/restore/login.jsp URI). This affects versions before 9.8 (e.g., 9.1 through 9.7).
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41319
MISC[/TD]
[/TR]
[TR]
[TD]
veritas -- veritas_system_recovery
[/TD][TD]
Veritas System Recovery (VSR) versions 18 and 21 store a network destination password in the Windows registry during configuration of the backup configuration. This vulnerability could provide a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41320
MISC[/TD]
[/TR]
[TR]
[TD]
vim -- vim
[/TD][TD]
Use After Free in GitHub repository vim/vim prior to 9.0.0490.
[/TD][TD]
2022-09-18
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3235
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
vim -- vim
[/TD][TD]
Use After Free in GitHub repository vim/vim prior to 9.0.0530.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3256
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
vim -- vim
[/TD][TD]
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
[/TD][TD]
2022-09-17
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3234
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
vim -- vim
[/TD]
[TD]
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3278
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
vmware -- spring_data_rest
[/TD][TD]
Applications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.5.5, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure of the underlying domain model, they can craft HTTP requests that expose hidden entity attributes.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-31679
MISC[/TD]
[/TR]
[TR]
[TD]
vuetify -- vuetify
[/TD][TD]
The package vuetify from 2.0.0-beta.4 and before 2.6.10 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization in the 'eventName' function within the VCalendar component.
[/TD][TD]
2022-09-18
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-25873
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wasm3 -- wasm3
[/TD][TD]
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component op_Select_i32_srs in wasm3/source/m3_exec.h.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-39974
MISC[/TD]
[/TR]
[TR]
[TD]
watchdog -- anti-virus
[/TD][TD]
Incorrect access control in Watchdog Anti-Virus v1.4.158 allows attackers to perform a DLL hijacking attack and execute arbitrary code via a crafted binary.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38611
MISC[/TD]
[/TR]
[TR]
[TD]
wayland -- wayland
[/TD]
[TD]
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2021-3782
MISC[/TD]
[/TR]
[TR]
[TD]
wedding_planner -- wedding_planner
[/TD][TD]
Wedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the booking_id parameter at /admin/budget.php.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38509
MISC[/TD]
[/TR]
[TR]
[TD]
western_digital -- discovery_desktop_app
[/TD][TD]
WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-29835
MISC[/TD]
[/TR]
[TR]
[TD]
whatsapp -- whatsapp
[/TD][TD]
An integer overflow in WhatsApp could result in remote code execution in an established video call.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36934
CONFIRM[/TD]
[/TR]
[TR]
[TD]
whatsapp -- whatsapp
[/TD][TD]
An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-27492
CONFIRM[/TD]
[/TR]
[TR]
[TD]
withsecure -- multiple_products
[/TD][TD]
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28886
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability Backup Scheduler plugin <= 1.5.13 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38079
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Kraken.io Image Optimizer plugin <= 2.6.5 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38454
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Read more By Adam plugin <= 1.1.8 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38085
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in NOTICE BOARD plugin <= 1.1 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38460
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in AlgolPlus Advanced Dynamic Pricing for WooCommerce plugin <= 4.1.3 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38095
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Site Offline Or Coming Soon Or Maintenance Mode WordPress plugin before 1.5.3 prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-1580
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2958
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Sucuri Security plugin <= 1.8.33 at WordPress leading to Event log entry creation.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-29489
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Login No Captcha reCAPTCHA WordPress plugin before 1.7 doesn't check the proper IP address allowing attackers to spoof IP addresses on the allow list and bypass the need for captcha on the login screen.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2913
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38470
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Seriously Simple Podcasting plugin <= 2.16.0 at WordPress, leading to plugin settings change.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40132
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Craw Data WordPress plugin through 1.0.0 does not implement nonce checks, which could allow attackers to make a logged in admin change the url value performing unwanted crawls on third-party sites (SSRF).
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2912
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (author+) CSV Injection vulnerability in Export Post Info plugin <= 1.2.0 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38061
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The WBW Currency Switcher for WooCommerce WordPress plugin before 1.6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2575
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The WordPress Ping Optimizer WordPress plugin before 2.35.1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-1591
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The WP Server Health Stats WordPress plugin before 1.7.0 does not escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2887
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Form Builder CP WordPress plugin before 1.2.32 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2567
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2654
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Classified Listing Pro WordPress plugin before 2.0.20 does not escape a generated URL before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2655
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The WP Taxonomy Import WordPress plugin through 1.0.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2669
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Float to Top Button WordPress plugin through 2.3.6 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2709
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Scroll To Top WordPress plugin before 1.4.1 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2710
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not sanitise and escape some of the reservation user inputs, allowing unauthenticated attackers to perform Cross-Site Scripting attacks logged in admin viewing the malicious reservation made
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2753
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Affiliates Manager WordPress plugin before 2.9.14 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2799
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2635
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not validate and escape some reservation parameters before using them in SQL statements, which could allow unauthenticated attackers to perform SQL Injection attacks
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2754
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2840
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2863
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2351
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Affiliates Manager WordPress plugin before 2.9.14 does not validate and sanitise the affiliate data, which could allow users registering as affiliate to perform CSV injection attacks against an admin exporting the data
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2798
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Titan Anti-spam & Security WordPress plugin before 7.3.1 does not properly checks HTTP headers in order to validate the origin IP address, allowing threat actors to bypass it's block feature by spoofing the headers.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2877
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Mobile Events Manager WordPress plugin before 1.4.8 does not properly escape the Enquiry source field when exporting events, or the Paid for field when exporting transactions as CSV, leading to a CSV injection vulnerability.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-1194
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated (custom specific plugin role) Persistent Cross-Site Scripting (XSS) vulnerability in Awesome Support plugin <= 6.0.7 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38073
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Topdigitaltrends Mega Addons For WPBakery Page Builder plugin <= 4.2.7 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36798
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability Add Shortcodes Actions And Filters plugin <= 2.0.9 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37342
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in SEO Redirection plugin <= 8.9 at WordPress, leading to deletion of 404 errors and redirection history.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38704
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in Blossom Recipe Maker plugin <= 1.0.7 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37338
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Unauthenticated Optin Campaign Cache Deletion vulnerability in MailOptin plugin <= 1.2.49.0 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36340
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Awesome UG Torro Forms plugin <= 1.0.16 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36791
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (author+) Stored Cross-Site Scripting (XSS) vulnerability in Themes Awesome History Timeline plugin <= 1.0.5 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37328
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in Rate my Post – WP Rating System plugin <= 3.3.4 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40671
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in WHA Crossword plugin <= 1.1.10 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36365
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Stored Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in 3D Tag Cloud plugin <= 3.8 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36417
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CPO Shortcodes plugin <= 1.5.0 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40672
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in WHA Word Search Puzzles game plugin <= 2.0.1 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36383
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Totalsoft Event Calendar – Calendar plugin <= 1.4.6 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36390
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in YDS Support Ticket System plugin <= 1.0 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36388
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Wordfence Security – Firewall & Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3144
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Max Foundry Button Plugin MaxButtons plugin <= 9.2 at WordPress
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38703
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WHA Crossword plugin <= 1.1.10 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37330
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (subscriber+) Broken Access Control vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38134
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3142
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Gettext override translations WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3036
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (subscriber+) Race Condition vulnerability in Rate my Post – WP Rating System plugin <= 3.3.4 at WordPress allows attackers to increase/decrease votes.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40310
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Meet My Team plugin <= 2.0.5 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37339
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Cross-Site Request Forgery (CSRF) vulnerability in SedLex FavIcon Switcher plugin <= 1.2.11 at WordPress allows plugin settings change.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40219
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (admin+) Arbitrary File Edit/Upload vulnerability in XplodedThemes WPide plugin <= 2.6 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40217
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Unauthenticated Plugin Settings Change vulnerability in Awesome Filterable Portfolio plugin <= 1.9.7 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-35238
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in Tabs plugin <= 3.7.1 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40215
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Slickr Flickr WordPress plugin through 2.8.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3021
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability in Awesome Filterable Portfolio plugin <= 1.9.7 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40193
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Multiple Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in GS Testimonial Slider plugin <= 1.9.6 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40213
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PCA Predict plugin <= 1.0.3 at WordPress.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40195
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Unauthenticated Sensitive Information Disclosure vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40194
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Translate Multilingual sites WordPress plugin before 2.3.3 is vulnerable to an authenticated SQL injection. By adding a new language (via the settings page) containing specific special characters, the backticks in the SQL query can be surpassed and a time-based blind payload can be injected.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3141
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
Authenticated Arbitrary Code Execution vulnerability in Soflyy Import any XML or CSV File to WordPress plugin <= 3.6.7 at WordPress.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-36386
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD]
[TD]
The Image Hover Effects Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Title & Description values that can be added to an Image Hover in versions up to, and including, 9.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, the plugin only allows administrators access to edit Image Hovers, however, if a site admin makes the plugin's features available to lower privileged users through the 'Who Can Edit?' setting then this can be exploited by those users.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2937
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
xpdf -- xpdf
[/TD][TD]
XPDF 4.04 is vulnerable to Null Pointer Dereference in FoFiType1C.cc:2393.
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-38928
MISC[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40154
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40155
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40156
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40151
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40153
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
xstream -- xstream
[/TD][TD]
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40152
CONFIRM
CONFIRM[/TD]
[/TR]
[TR]
[TD]
yetiforce -- yetiforce_customer_relationship_management
[/TD][TD]
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.3.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-2924
MISC
CONFIRM[/TD]
[/TR]
[TR]
[TD]
yetiforce -- yetiforce_customer_relationship_management
[/TD][TD]
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3000
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
yetiforce -- yetiforce_customer_relationship_management
[/TD][TD]
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3004
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
yetiforce -- yetiforce_customer_relationship_management
[/TD][TD]
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-3005
CONFIRM
MISC[/TD]
[/TR]
[TR]
[TD]
z-blogphp -- z-blogphp
[/TD][TD]
A security issue was discovered in Z-BlogPHP <= 1.7.2. A Server-Side Request Forgery (SSRF) vulnerability in the zb_users/plugin/UEditor/php/action_crawler.php file allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the source parameter.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40357
MISC[/TD]
[/TR]
[TR]
[TD]
zapier -- code_by_zapier
[/TD][TD]
Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)
[/TD][TD]
2022-09-21
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28802
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
zentao -- demo15
[/TD][TD]
Zentao Demo15 is vulnerable to Directory Traversal. The impact is: obtain sensitive information (remote). The component is: URL : view-source:https://demo15.zentao.pm/user-login.html/zentao/index.php?mode=getconfig.
[/TD][TD]
2022-09-19
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-37700
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
zohocorp -- manageengine_password_manager_pro
[/TD][TD]
Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40300
MISC[/TD]
[/TR]
[TR]
[TD]
zoo_management_system -- zoo_management_system
[/TD][TD]
In Zoo Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of the "gallery" file of the "Gallery" module in the background management system.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40932
MISC[/TD]
[/TR]
[TR]
[TD]
zoom -- on-premise_meeting_connector_mmr
[/TD][TD]
Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 contains an improper access control vulnerability. As a result, a malicious actor could obtain the audio and video feed of a meeting they were not authorized to join and cause other meeting disruptions.
[/TD][TD]
2022-09-16
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-28758
MISC[/TD]
[/TR]
[TR]
[TD]
zte_global -- zxvstb
[/TD]
[TD]
There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.
[/TD][TD]
2022-09-23
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-23144
MISC[/TD]
[/TR]
[TR]
[TD]
zutty -- zutty
[/TD][TD]
In Zutty before 0.13, DECRQSS in text written to the terminal can achieve arbitrary code execution.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-41138
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
zyxel -- gs1900-8
[/TD][TD]
An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface.
[/TD][TD]
2022-09-20
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-34746
CONFIRM[/TD]
[/TR]
[TR]
[TD]
zzcms -- zzcms
[/TD][TD]
An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40443
MISC[/TD]
[/TR]
[TR]
[TD]
zzcms -- zzcms
[/TD][TD]
ZZCMS 2022 was discovered to contain a full path disclosure vulnerability via the page /admin/index.PHP? _server.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40444
MISC[/TD]
[/TR]
[TR]
[TD]
zzcms -- zzcms
[/TD][TD]
ZZCMS 2022 was discovered to contain a SQL injection vulnerability via the component /admin/sendmailto.php?tomail=&groupid=.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40446
MISC[/TD]
[/TR]
[TR]
[TD]
zzcms -- zzcms
[/TD][TD]
ZZCMS 2022 was discovered to contain a SQL injection vulnerability via the keyword parameter at /admin/baojia_list.php.
[/TD][TD]
2022-09-22
[/TD][TD]
not yet calculated
[/TD][TD]CVE-2022-40447
MISC[/TD]
[/TR]
Back to top
This product is provided subject to this Notification and this Privacy & Use policy.
Continue reading...