Total
9170 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-11987 | 3 Apache, Fedoraproject, Oracle | 18 Batik, Fedora, Banking Apis and 15 more | 2022-07-25 | 6.4 MEDIUM | 8.2 HIGH |
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | |||||
CVE-2018-1273 | 2 Apache, Pivotal Software | 3 Ignite, Spring Data Commons, Spring Data Rest | 2022-07-25 | 7.5 HIGH | 9.8 CRITICAL |
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. | |||||
CVE-2022-27929 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP. | |||||
CVE-2022-27930 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed. | |||||
CVE-2022-27931 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol. | |||||
CVE-2022-27932 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 4.3 MEDIUM | 7.5 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join. | |||||
CVE-2022-27933 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.8 MEDIUM | 8.2 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join. | |||||
CVE-2022-27934 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP. | |||||
CVE-2022-27935 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth. | |||||
CVE-2022-27936 | 1 Pexip | 1 Pexip Infinity | 2022-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323. | |||||
CVE-2022-32248 | 1 Sap | 1 S\/4hana | 2022-07-20 | 5.0 MEDIUM | 5.3 MEDIUM |
Due to missing input validation in the Manage Checkbooks component of SAP S/4HANA - version 101, 102, 103, 104, 105, 106, an attacker could insert or edit the value of an existing field in the database. This leads to an impact on the integrity of the data. | |||||
CVE-2022-35171 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-07-19 | 4.3 MEDIUM | 5.5 MEDIUM |
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below | |||||
CVE-2022-26655 | 1 Pexip | 1 Pexip Infinity | 2022-07-18 | 5.0 MEDIUM | 7.5 HIGH |
Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams. | |||||
CVE-2021-44221 | 1 Siemens | 1 Simatic Easie Core Package | 2022-07-15 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability has been identified in SIMATIC eaSie Core Package (All versions < V22.00). The affected systems do not properly validate input that is sent to the underlying message passing framework. This could allow an remote attacker to trigger a denial of service of the affected system. | |||||
CVE-2022-31121 | 1 Hyperledger | 1 Fabric | 2022-07-15 | 5.0 MEDIUM | 7.5 HIGH |
Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue. | |||||
CVE-2022-28196 | 1 Nvidia | 5 Jetson Agx Xavier, Jetson Linux, Jetson Tx2 and 2 more | 2022-07-14 | 3.6 LOW | 4.6 MEDIUM |
NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot blob_decompress function, where insufficient validation of untrusted data may allow a local attacker with elevated privileges to cause a memory buffer overflow, which may lead to code execution, limited loss of Integrity, and limited denial of service. The scope of impact can extend to other components. | |||||
CVE-2022-21766 | 2 Google, Mediatek | 36 Android, Mt6580, Mt6735 and 33 more | 2022-07-14 | 4.6 MEDIUM | 6.7 MEDIUM |
In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641653. | |||||
CVE-2022-21765 | 2 Google, Mediatek | 36 Android, Mt6580, Mt6735 and 33 more | 2022-07-14 | 4.6 MEDIUM | 6.7 MEDIUM |
In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641673. | |||||
CVE-2022-21784 | 2 Google, Mediatek | 33 Android, Mt6761, Mt6779 and 30 more | 2022-07-13 | 4.6 MEDIUM | 6.7 MEDIUM |
In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704462. | |||||
CVE-2022-28127 | 1 Robustel | 2 R1510, R1510 Firmware | 2022-07-12 | 6.4 MEDIUM | 9.1 CRITICAL |
A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability. |