‼ CVE-2022-20195 ‼
📖 Read
via "National Vulnerability Database".
In the keystore library, there is a possible prevention of access to system Settings due to unsafe deserialization. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-213172664📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20191 ‼
📖 Read
via "National Vulnerability Database".
Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20207 ‼
📖 Read
via "National Vulnerability Database".
In static definitions of GattServiceConfig.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185513714📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20190 ‼
📖 Read
via "National Vulnerability Database".
Product: AndroidVersions: Android kernelAndroid ID: A-208744915References: N/A📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20198 ‼
📖 Read
via "National Vulnerability Database".
In llcp_dlc_proc_connect_pdu of llcp_dlc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC stack with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-221851879📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20233 ‼
📖 Read
via "National Vulnerability Database".
In param_find_digests_internal and related functions of the Titan-M source, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222472803References: N/A📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20208 ‼
📖 Read
via "National Vulnerability Database".
In parseRecursively of cppbor_parse.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192743373📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20206 ‼
📖 Read
via "National Vulnerability Database".
In setPackageOrComponentEnabled of NotificationManagerService.java, there is a missing permission check. This could lead to local information disclosure about enabled notification listeners with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-220737634📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20205 ‼
📖 Read
via "National Vulnerability Database".
In isFileUri of FileUtil.java, there is a possible way to bypass the check for a file:// scheme due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215212561📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20201 ‼
📖 Read
via "National Vulnerability Database".
In getAppSize of InstalldNativeService.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-220733817📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20209 ‼
📖 Read
via "National Vulnerability Database".
In hme_add_new_node_to_a_sorted_array of hme_utils.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-207502397📖 Read
via "National Vulnerability Database".
‼ CVE-2022-33140 ‼
📖 Read
via "National Vulnerability Database".
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32158 ‼
📖 Read
via "National Vulnerability Database".
Splunk Enterprise deployment servers in versions before 9.0 let clients deploy forwarder bundles to other deployment clients through the deployment server. An attacker that compromised a Universal Forwarder endpoint could use the vulnerability to execute arbitrary code on all other Universal Forwarder endpoints subscribed to the deployment server.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32300 ‼
📖 Read
via "National Vulnerability Database".
YoudianCMS v9.5.0 was discovered to contain a SQL injection vulnerability via the MailSendID parameter at /App/Lib/Action/Admin/MailAction.class.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40910 ‼
📖 Read
via "National Vulnerability Database".
There is a reflective cross-site scripting (XSS) vulnerability in the PHPCMS V9.6.3 management side.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-29438 ‼
📖 Read
via "National Vulnerability Database".
Authenticated (author or higher user role) Persistent Cross-Site Scripting (XSS) vulnerability in Image Slider by NextCode plugin <= 1.1.2 at WordPress.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32991 ‼
📖 Read
via "National Vulnerability Database".
Web Based Quiz System v1.0 was discovered to contain a SQL injection vulnerability via the eid parameter at welcome.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32101 ‼
📖 Read
via "National Vulnerability Database".
kkcms v1.3.7 was discovered to contain a SQL injection vulnerability via the cid parameter at /template/wapian/vlist.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32156 ‼
📖 Read
via "National Vulnerability Database".
In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI) to enable the remediation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32301 ‼
📖 Read
via "National Vulnerability Database".
YoudianCMS v9.5.0 was discovered to contain a SQL injection vulnerability via the IdList parameter at /App/Lib/Action/Home/ApiAction.class.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-4575 ‼
📖 Read
via "National Vulnerability Database".
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801.📖 Read
via "National Vulnerability Database".