Total
319 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-46179 | 1 Liuos Project | 1 Liuos | 2023-01-13 | N/A | 7.8 HIGH |
LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to "" (no quotes) to null the variable and force credential checks. | |||||
CVE-2022-4340 | 1 Reputeinfosystems | 1 Bookingpress | 2023-01-09 | N/A | 5.3 MEDIUM |
The BookingPress WordPress plugin before 1.0.31 suffers from an Insecure Direct Object Reference (IDOR) vulnerability in it's thank you page, allowing any visitor to display information about any booking, including full name, date, time and service booked, by manipulating the appointment_id query parameter. | |||||
CVE-2022-4417 | 1 Cerber | 1 Wp Cerber Security\, Anti-spam \& Malware Scan | 2023-01-09 | N/A | 5.3 MEDIUM |
The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users | |||||
CVE-2022-4239 | 1 Amentotech | 1 Workreap | 2023-01-04 | N/A | 6.5 MEDIUM |
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id. | |||||
CVE-2022-3794 | 1 Jegtheme | 1 Jeg Elementor Kit | 2022-12-30 | N/A | 4.3 MEDIUM |
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various AJAX actions in versions up to, and including, 2.5.6. Authenticated users can use an easily available nonce value to create header templates and make additional changes to the site, as the plugin does not use capability checks for this purpose. | |||||
CVE-2022-3805 | 1 Jegtheme | 1 Jeg Elementor Kit | 2022-12-30 | N/A | 7.5 HIGH |
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements. | |||||
CVE-2022-3876 | 1 Clickstudios | 1 Passwordstate | 2022-12-28 | N/A | 6.5 MEDIUM |
A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This issue affects some unknown processing of the file /api/browserextension/UpdatePassword/ of the component API. The manipulation of the argument PasswordID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216245 was assigned to this vulnerability. | |||||
CVE-2021-4226 | 1 Rsjoomla | 1 Rsfirewall\! | 2022-12-20 | N/A | 9.8 CRITICAL |
RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented. | |||||
CVE-2022-4097 | 1 Updraftplus | 1 All-in-one Security | 2022-12-15 | N/A | 5.3 MEDIUM |
The All-In-One Security (AIOS) WordPress plugin before 5.0.8 is susceptible to IP Spoofing attacks, which can lead to bypassed security features (like IP blocks, rate limiting, brute force protection, and more). | |||||
CVE-2022-3930 | 1 Wpwax | 1 Directorist | 2022-12-14 | N/A | 6.5 MEDIUM |
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own. | |||||
CVE-2022-38765 | 1 Canon | 1 Vitrea View | 2022-12-12 | N/A | 6.5 MEDIUM |
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter. | |||||
CVE-2022-3846 | 1 Amentotech | 1 Workreap | 2022-12-06 | N/A | 7.5 HIGH |
The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it's possible to read any user's notification (employer or freelancer) as the notification ID is brute-forceable. | |||||
CVE-2022-4281 | 1 Facepay Project | 1 Facepay | 2022-12-06 | N/A | 8.8 HIGH |
A vulnerability has been found in Facepay 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /face-recognition-php/facepay-master/camera.php. The manipulation of the argument userId leads to authorization bypass. The attack can be launched remotely. The identifier VDB-214789 was assigned to this vulnerability. | |||||
CVE-2022-24187 | 1 Sz-fujia | 1 Ourphoto | 2022-12-01 | N/A | 7.5 HIGH |
The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users. | |||||
CVE-2022-3995 | 1 Standalonetech | 1 Terawallet | 2022-12-01 | N/A | 4.3 MEDIUM |
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets. | |||||
CVE-2022-3589 | 1 Miele | 1 Appwash | 2022-11-30 | N/A | 8.1 HIGH |
An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability. | |||||
CVE-2022-3511 | 1 Getawesomesupport | 1 Awesome Support | 2022-11-29 | N/A | 6.5 MEDIUM |
The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as subscriber to download arbitrary exported tickets via an IDOR vector | |||||
CVE-2022-0613 | 2 Fedoraproject, Uri.js Project | 2 Fedora, Uri.js | 2022-11-29 | 6.4 MEDIUM | 6.5 MEDIUM |
Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8. | |||||
CVE-2022-1579 | 1 Gunkastudios | 1 Login Block Ips | 2022-11-23 | N/A | 7.5 HIGH |
The function check_is_login_page() uses headers for the IP check, which can be easily spoofed. | |||||
CVE-2022-1581 | 1 Wp-polls Project | 1 Wp-polls | 2022-11-23 | N/A | 5.3 MEDIUM |
The WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations. |