‼ CVE-2022-25130 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25131 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function recvSlaveCloudCheckStatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45082 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25133 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25135 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function recv_mesh_info_sync of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25132 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23642 ‼
📖 Read
via "National Vulnerability Database".
Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25137 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function recvSlaveUpgstatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25136 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in the function meshSlaveUpdate of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-44302 ‼
📖 Read
via "National Vulnerability Database".
BaiCloud-cms v2.5.7 was discovered to contain multiple SQL injection vulnerabilities via the tongji and baidu_map parameters in /user/ztconfig.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25365 ‼
📖 Read
via "National Vulnerability Database".
Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24980 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Kitodo.Presentation (aka dif) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any file or webpage the webserver has access to.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0409 ‼
📖 Read
via "National Vulnerability Database".
Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25366 ‼
📖 Read
via "National Vulnerability Database".
Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20013 ‼
📖 Read
via "National Vulnerability Database".
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24979 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Varnishcache extension before 2.0.1 for TYPO3. The Edge Site Includes (ESI) content element renderer component does not include an access check. This allows an unauthenticated user to render various content elements, resulting in insecure direct object reference (IDOR), with the potential of exposing internal content elements.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25256 ‼
📖 Read
via "National Vulnerability Database".
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0678 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0630 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Read in Homebrew mruby prior to 3.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0632 ‼
📖 Read
via "National Vulnerability Database".
NULL Pointer Dereference in Homebrew mruby prior to 3.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0690 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.📖 Read
via "National Vulnerability Database".