Total
1368 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-3489 | 1 Weberge | 1 Wp Hide | 2022-11-09 | N/A | 5.3 MEDIUM |
The WP Hide WordPress plugin through 0.0.2 does not have authorisation and CSRF checks in place when updating the custom_wpadmin_slug settings, allowing unauthenticated attackers to update it with a crafted request | |||||
CVE-2020-25711 | 3 Infinispan, Netapp, Redhat | 3 Infinispan, Active Iq Unified Manager, Data Grid | 2022-11-09 | 4.9 MEDIUM | 6.5 MEDIUM |
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. | |||||
CVE-2021-24730 | 1 Infornweb | 1 Logo Showcase With Slick Slider | 2022-11-09 | 4.0 MEDIUM | 4.3 MEDIUM |
The Logo Showcase with Slick Slider WordPress plugin before 1.2.5 does not have CSRF and authorisation checks in the lswss_save_attachment_data AJAX action, allowing any authenticated users, such as Subscriber, to change title, description, alt text, and URL of arbitrary uploaded media. | |||||
CVE-2022-3451 | 1 Addify | 1 Product Stock Manager | 2022-11-09 | N/A | 4.3 MEDIUM |
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options | |||||
CVE-2022-20446 | 1 Google | 1 Android | 2022-11-09 | N/A | 3.3 LOW |
In AlwaysOnHotwordDetector of AlwaysOnHotwordDetector.java, there is a possible way to access the microphone from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-229793943 | |||||
CVE-2022-20451 | 1 Google | 1 Android | 2022-11-09 | N/A | 7.8 HIGH |
In onCallRedirectionComplete of CallsManager.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235098883 | |||||
CVE-2022-20450 | 1 Google | 1 Android | 2022-11-09 | N/A | 7.8 HIGH |
In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way to bypass user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-210065877 | |||||
CVE-2022-40223 | 1 Searchwp | 1 Searchwp | 2022-11-09 | N/A | 4.3 MEDIUM |
Nonce token leakage and missing authorization in SearchWP premium plugin <= 4.2.5 on WordPress leading to plugin settings change. | |||||
CVE-2022-1329 | 1 Elementor | 1 Elementor Website Builder | 2022-11-08 | 6.5 MEDIUM | 8.8 HIGH |
The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2. | |||||
CVE-2020-2091 | 1 Jenkins | 1 Amazon Ec2 | 2022-11-07 | 5.5 MEDIUM | 8.1 HIGH |
A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. | |||||
CVE-2020-10684 | 3 Debian, Fedoraproject, Redhat | 5 Debian Linux, Fedora, Ansible and 2 more | 2022-11-07 | 3.6 LOW | 7.1 HIGH |
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. | |||||
CVE-2020-14306 | 1 Istio-operator Project | 1 Istio-operator | 2022-11-07 | 6.5 MEDIUM | 8.8 HIGH |
An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | |||||
CVE-2020-25718 | 2 Fedoraproject, Samba | 2 Fedora, Samba | 2022-11-07 | 6.5 MEDIUM | 8.8 HIGH |
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | |||||
CVE-2020-13422 | 1 Openiam | 1 Openiam | 2022-11-04 | 5.5 MEDIUM | 8.1 HIGH |
OpenIAM before 4.2.0.3 does not verify if a user has permissions to perform /webconsole/rest/api/* administrative actions. | |||||
CVE-2021-22147 | 1 Elastic | 1 Elasticsearch | 2022-11-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | |||||
CVE-2022-2696 | 1 Oracle | 1 Restaurant Menu - Food Ordering System - Table Reservation | 2022-11-03 | N/A | 6.5 MEDIUM |
The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to authorization bypass via several AJAX actions in versions up to, and including 2.3.0 due to missing capability checks and missing nonce validation. This makes it possible for authenticated attackers with minimal permissions to perform a wide variety of actions such as modifying the plugin's settings and modifying the ordering system preferences. | |||||
CVE-2022-3337 | 1 Cloudflare | 1 Warp Mobile Client | 2022-11-01 | N/A | 8.5 HIGH |
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform. | |||||
CVE-2022-3321 | 1 Cloudflare | 1 Warp Mobile Client | 2022-11-01 | N/A | 8.2 HIGH |
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform. | |||||
CVE-2022-3096 | 1 Wp Total Hacks Project | 1 Wp Total Hacks | 2022-11-01 | N/A | 5.4 MEDIUM |
The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well. | |||||
CVE-2022-3320 | 1 Cloudflare | 1 Warp | 2022-10-31 | N/A | 9.8 CRITICAL |
It was possible to bypass policies configured for Zero Trust Secure Web Gateway by using warp-cli 'set-custom-endpoint' subcommand. Using this command with an unreachable endpoint caused the WARP Client to disconnect and allowed bypassing administrative restrictions on a Zero Trust enrolled endpoint. |