‼ CVE-2022-3751 ‼
📖 Read
via "National Vulnerability Database".
SQL Injection in GitHub repository owncast/owncast prior to 0.0.13.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3991 ‼
📖 Read
via "National Vulnerability Database".
The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4030 ‼
📖 Read
via "National Vulnerability Database".
The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitrary files on the server that will subsequently be deleted. This can be used to delete the wp-config.php file that can allow an attacker to configure the site and achieve remote code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3384 ‼
📖 Read
via "National Vulnerability Database".
The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4029 ‼
📖 Read
via "National Vulnerability Database".
The Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This would be highly complex to exploit as it would require the attacker to set the cookie a cookie for the targeted user.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2021-31693 ‼
📖 Read
via "National Vulnerability Database".
VMware Tools for Windows (12.x.y prior to 12.1.5, 11.x.y and 10.x.y) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest OS, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest OS.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3995 ‼
📖 Read
via "National Vulnerability Database".
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-41413 ‼
📖 Read
via "National Vulnerability Database".
perfSONAR v4.x <= v4.4.5 was discovered to contain a Cross-Site Request Forgery (CSRF) which is triggered when an attacker injects crafted input into the Search function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45337 ‼
📖 Read
via "National Vulnerability Database".
Tenda TX9 Pro v22.03.02.10 was discovered to contain a stack overflow via the list parameter at /goform/SetIpMacBind.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-41412 ‼
📖 Read
via "National Vulnerability Database".
An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45328 ‼
📖 Read
via "National Vulnerability Database".
Church Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/edit_members.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44096 ‼
📖 Read
via "National Vulnerability Database".
Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45332 ‼
📖 Read
via "National Vulnerability Database".
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44097 ‼
📖 Read
via "National Vulnerability Database".
Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45869 ‼
📖 Read
via "National Vulnerability Database".
A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40265 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version "65" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version "65" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3859 ‼
📖 Read
via "National Vulnerability Database".
An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-46338 ‼
📖 Read
via "National Vulnerability Database".
g810-led 0.4.2, a LED configuration tool for Logitech Gx10 keyboards, contained a udev rule to make supported device nodes world-readable and writable, allowing any process on the system to read traffic from keyboards, including sensitive data.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4228 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. The manipulation of the argument password leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214587.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4229 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4232 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".