Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-862
Total 1368 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24669 1 Forgerock 1 Access Management 2022-10-31 N/A 6.5 MEDIUM
It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
CVE-2022-3400 1 Bricksbuilder 1 Bricks 2022-10-28 N/A 6.5 MEDIUM
The Bricks theme for WordPress is vulnerable to authorization bypass due to a missing capability check on the bricks_save_post AJAX action in versions 1.0 to 1.5.3. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to edit any page, post, or template on the vulnerable WordPress website.
CVE-2022-25193 1 Jenkins 1 Snow Commander 2022-10-28 4.0 MEDIUM 6.5 MEDIUM
Missing permission checks in Jenkins Snow Commander Plugin 1.10 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2021-0518 1 Google 1 Android 2022-10-28 4.9 MEDIUM 5.5 MEDIUM
In Wi-Fi, there is a possible leak of location-sensitive data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-176541017
CVE-2021-25002 1 Tipsacarrier Project 1 Tipsacarrier 2022-10-27 5.0 MEDIUM 7.5 HIGH
The Tipsacarrier WordPress plugin before 1.5.0.5 does not have any authorisation check in place some functions, which could allow unauthenticated users to access Orders data which could be used to retrieve the client full address, name and phone via tracking URL
CVE-2022-3048 2 Fedoraproject, Google 3 Fedora, Chrome, Chrome Os 2022-10-27 N/A 6.8 MEDIUM
Inappropriate implementation in Chrome OS lockscreen in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a local attacker to bypass lockscreen navigation restrictions via physical access to the device.
CVE-2020-15337 1 Zyxel 1 Cloudcnm Secumanager 2022-10-27 N/A 5.3 MEDIUM
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /registerCpe requests.
CVE-2022-36836 1 Samsung 2 Charm, Charm Firmware 2022-10-27 N/A 5.5 MEDIUM
Unprotected provider vulnerability in Charm by Samsung prior to version 1.2.3 allows attackers to read connection state without permission.
CVE-2020-15338 1 Zyxel 1 Cloudcnm Secumanager 2022-10-27 N/A 5.3 MEDIUM
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /cnr requests.
CVE-2021-36909 1 Webfactoryltd 1 Wp Reset Pro 2022-10-27 5.5 MEDIUM 8.1 HIGH
Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover.
CVE-2021-36917 1 Wpwave 1 Hide My Wp 2022-10-27 5.0 MEDIUM 7.5 HIGH
WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a reset token which can then be used to deactivate the plugin.
CVE-2021-38486 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2022-10-27 6.0 MEDIUM 8.5 HIGH
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.
CVE-2021-34647 1 Ninjaforms 1 Ninja Forms 2022-10-27 4.0 MEDIUM 6.5 MEDIUM
The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to export all Ninja Forms submissions data via the /ninja-forms-submissions/export REST API which can include personally identifiable information.
CVE-2021-34648 1 Ninjaforms 1 Ninja Forms 2022-10-27 4.0 MEDIUM 4.3 MEDIUM
The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send arbitrary emails from the affected server via the /ninja-forms-submissions/email-action REST API which can be used to socially engineer victims.
CVE-2022-29154 2 Fedoraproject, Samba 2 Fedora, Rsync 2022-10-27 N/A 7.4 HIGH
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
CVE-2021-33013 1 Myscada 1 Mypro 2022-10-27 5.0 MEDIUM 7.5 HIGH
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information.
CVE-2022-22535 1 Sap 1 Erp Human Capital Management 2022-10-26 4.0 MEDIUM 6.5 MEDIUM
SAP ERP HCM Portugal - versions 600, 604, 608, does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts.
CVE-2020-19038 1 Halo 1 Halo 2022-10-26 6.4 MEDIUM 9.1 CRITICAL
File Deletion vulnerability in Halo 0.4.3 via delBackup.
CVE-2021-24635 1 Bootstrapped 1 Visual Link Preview 2022-10-25 5.5 MEDIUM 5.4 MEDIUM
The Visual Link Preview WordPress plugin before 2.2.3 does not enforce authorisation on several AJAX actions and has the CSRF nonce displayed for all authenticated users, allowing any authenticated user (such as subscriber) to call them and 1) Get and search through title and content of Draft post, 2) Get title of a password-protected post as well as 3) Upload an image from an URL
CVE-2021-22149 1 Elastic 1 Enterprise Search 2022-10-25 6.5 MEDIUM 8.8 HIGH
Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization via an alternate route. Using this vulnerability, an authenticated attacker could utilize API keys belonging to higher privileged users.