Total
22706 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-40274 | 2 Gridea, Linux | 2 Gridea, Linux Kernel | 2022-10-04 | N/A | 7.8 HIGH |
Gridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled. | |||||
CVE-2018-8409 | 1 Microsoft | 3 .net Core, Asp.net Core, System.io.pipelines | 2022-10-04 | 5.0 MEDIUM | 7.5 HIGH |
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1. | |||||
CVE-2022-40314 | 1 Moodle | 1 Moodle | 2022-10-04 | N/A | 9.8 CRITICAL |
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified. | |||||
CVE-2022-38732 | 1 Netapp | 1 Snapcenter | 2022-10-03 | N/A | 7.5 HIGH |
SnapCenter versions prior to 4.7 shipped without Content Security Policy (CSP) implemented which could allow certain types of attacks that otherwise would be prevented. | |||||
CVE-2022-28721 | 1 Hp | 600 1g5m0a, 1g5m0a Firmware, 1k7k6a and 597 more | 2022-10-03 | N/A | 9.8 CRITICAL |
Certain HP Print Products are potentially vulnerable to Remote Code Execution. | |||||
CVE-2022-36158 | 1 Contec | 8 Fxa2000, Fxa2000 Firmware, Fxa3000 and 5 more | 2022-10-03 | N/A | 8.0 HIGH |
Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi). | |||||
CVE-2021-40695 | 1 Moodle | 1 Moodle | 2022-10-03 | N/A | 4.3 MEDIUM |
It was possible for a student to view their quiz grade before it had been released, using a quiz web service. | |||||
CVE-2021-40691 | 1 Moodle | 1 Moodle | 2022-10-03 | N/A | 4.3 MEDIUM |
A session hijack risk was identified in the Shibboleth authentication plugin. | |||||
CVE-2022-3053 | 2 Apple, Google | 2 Macos, Chrome | 2022-10-02 | N/A | 4.3 MEDIUM |
Inappropriate implementation in Pointer Lock in Google Chrome on Mac prior to 105.0.5195.52 allowed a remote attacker to restrict user navigation via a crafted HTML page. | |||||
CVE-2022-33744 | 1 Linux | 1 Linux Kernel | 2022-10-02 | 1.9 LOW | 4.7 MEDIUM |
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0, e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages. | |||||
CVE-2017-20147 | 1 Smokeping | 1 Smokeping | 2022-09-30 | N/A | 6.5 MEDIUM |
In the ebuild package through smokeping-2.7.3-r1 for SmokePing on Gentoo, the initscript uses a PID file that is writable by the smokeping user. By writing arbitrary PIDs to that file, the smokeping user can cause a denial of service to arbitrary PIDs when the service is stopped. | |||||
CVE-2022-32837 | 1 Apple | 5 Ipados, Iphone Os, Mac Os X and 2 more | 2022-09-30 | N/A | 7.8 HIGH |
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to cause unexpected system termination or write kernel memory. | |||||
CVE-2017-20148 | 1 Debian | 1 Logcheck | 2022-09-30 | N/A | 9.8 CRITICAL |
In the ebuild package through logcheck-1.3.23.ebuild for Logcheck on Gentoo, it is possible to achieve root privilege escalation from the logcheck user because of insecure recursive chown calls. | |||||
CVE-2022-30121 | 1 Ivanti | 1 Endpoint Manager | 2022-09-30 | N/A | 6.7 MEDIUM |
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system. | |||||
CVE-2022-36870 | 1 Samsung | 2 Samsung Pay, Samsung Pay Kr | 2022-09-30 | N/A | 6.5 MEDIUM |
Pending Intent hijacking vulnerability in MTransferNotificationManager in Samsung Pay prior to version 5.0.63 for KR and 5.1.47 for Global allows attackers to access files without permission via implicit Intent. | |||||
CVE-2022-36872 | 1 Samsung | 2 Samsung Pay, Samsung Pay Kr | 2022-09-30 | N/A | 6.5 MEDIUM |
Pending Intent hijacking vulnerability in SpayNotification in Samsung Pay prior to version 5.0.63 for KR and 5.1.47 for Global allows attackers to access files without permission via implicit Intent. | |||||
CVE-2022-36871 | 1 Samsung | 2 Samsung Pay, Samsung Pay Kr | 2022-09-30 | N/A | 6.5 MEDIUM |
Pending Intent hijacking vulnerability in NotiCenterUtils in Samsung Pay prior to version 5.0.63 for KR and 5.1.47 for Global allows attackers to access files without permission via implicit Intent. | |||||
CVE-2020-2564 | 1 Oracle | 1 Siebel Ui Framework | 2022-09-30 | 5.0 MEDIUM | 5.3 MEDIUM |
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.10 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | |||||
CVE-2019-2996 | 3 Netapp, Oracle, Redhat | 14 E-series Santricity Os Controller, E-series Santricity Storage Manager, E-series Santricity Unified Manager and 11 more | 2022-09-30 | 4.0 MEDIUM | 4.2 MEDIUM |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u221; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N). | |||||
CVE-2019-2999 | 6 Canonical, Debian, Netapp and 3 more | 19 Ubuntu Linux, Debian Linux, E-series Santricity Os Controller and 16 more | 2022-09-30 | 4.0 MEDIUM | 4.7 MEDIUM |
Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N). |