Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-1757 | 1 Pagebar Project | 1 Pagebar | 2022-10-25 | 3.5 LOW | 5.4 MEDIUM |
The pagebar WordPress plugin before 2.70 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation in some of them, it could also lead to Stored XSS issues | |||||
CVE-2022-34140 | 1 Feehi | 1 Feehi Cms | 2022-10-25 | N/A | 5.4 MEDIUM |
A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field. | |||||
CVE-2022-0598 | 1 Login With Phone Number Project | 1 Login With Phone Number | 2022-10-25 | N/A | 4.8 MEDIUM |
The Login with phone number WordPress plugin before 1.3.8 does not sanitise and escape plugin settings which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | |||||
CVE-2022-29851 | 1 Open-xchange | 1 Ox App Suite | 2022-10-25 | N/A | 9.8 CRITICAL |
documentconverter in OX App Suite through 7.10.6, in a non-default configuration with ghostscript, allows OS Command Injection because file conversion may occur for an EPS document that is disguised as a PDF document. | |||||
CVE-2022-29520 | 1 Goabode | 2 Iota All-in-one Security Kit, Iota All-in-one Security Kit Firmware | 2022-10-25 | N/A | 9.8 CRITICAL |
An OS command injection vulnerability exists in the console_main_loop :sys functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. A specially-crafted XCMD can lead to arbitrary command execution. An attacker can send an XML payload to trigger this vulnerability. | |||||
CVE-2022-38580 | 1 Zalando | 1 Skipper | 2022-10-25 | N/A | 9.8 CRITICAL |
Zalando Skipper v0.13.236 is vulnerable to Server-Side Request Forgery (SSRF). | |||||
CVE-2022-3302 | 1 Cleantalk | 1 Spam Protection\, Antispam\, Firewall | 2022-10-25 | N/A | 7.2 HIGH |
The Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.185.1 does not validate ids before using them in a SQL statement, which could lead to SQL injection exploitable by high privilege users such as admin | |||||
CVE-2022-2762 | 1 Adminpad Project | 1 Adminpad | 2022-10-25 | N/A | 6.5 MEDIUM |
The AdminPad WordPress plugin before 2.2 does not have CSRF check when updating admin's note, allowing attackers to make a logged in admin update their notes via a CSRF attack | |||||
CVE-2022-3392 | 1 Wp Humans.txt Project | 1 Wp Humans.txt | 2022-10-25 | N/A | 4.8 MEDIUM |
The WP Humans.txt WordPress plugin through 1.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | |||||
CVE-2022-3393 | 1 Bestwebsoft | 1 Post To Csv | 2022-10-25 | N/A | 9.8 CRITICAL |
The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection | |||||
CVE-2022-3391 | 1 Retain | 1 Retain Live Chat | 2022-10-25 | N/A | 4.8 MEDIUM |
The Retain Live Chat WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | |||||
CVE-2022-3335 | 1 Kadencewp | 1 Kadence Woocommerce Email Designer | 2022-10-25 | N/A | 7.2 HIGH |
The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. | |||||
CVE-2022-3350 | 1 Tech-banker | 1 Contact Bank | 2022-10-25 | N/A | 4.8 MEDIUM |
The Contact Bank WordPress plugin through 3.0.30 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | |||||
CVE-2022-26891 | 1 Microsoft | 1 Edge Chromium | 2022-10-25 | 5.1 MEDIUM | 8.3 HIGH |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24475, CVE-2022-26894, CVE-2022-26895, CVE-2022-26900, CVE-2022-26908, CVE-2022-26909, CVE-2022-26912. | |||||
CVE-2022-39345 | 1 Gin-vue-admin Project | 1 Gin-vue-admin | 2022-10-25 | N/A | 7.5 HIGH |
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version. | |||||
CVE-2022-39342 | 1 Openfga | 1 Openfga | 2022-10-25 | N/A | 9.8 CRITICAL |
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users whose model has a relation defined as a tupleset (the right hand side of a ‘from’ statement) that involves anything other than a direct relationship (e.g. ‘as self’) are vulnerable. Version 0.2.4 contains a patch for this issue. | |||||
CVE-2022-39341 | 1 Openfga | 1 Openfga | 2022-10-25 | N/A | 9.8 CRITICAL |
OpenFGA is an authorization/permission engine. Versions prior to version 0.2.4 are vulnerable to authorization bypass under certain conditions. Users who have wildcard (`*`) defined on tupleset relations in their authorization model are vulnerable. Version 0.2.4 contains a patch for this issue. | |||||
CVE-2022-39340 | 1 Openfga | 1 Openfga | 2022-10-25 | N/A | 5.3 MEDIUM |
OpenFGA is an authorization/permission engine. Prior to version 0.2.4, the `streamed-list-objects` endpoint was not validating the authorization header, resulting in disclosure of objects in the store. Users `openfga/openfga` versions 0.2.3 and prior who are exposing the OpenFGA service to the internet are vulnerable. Version 0.2.4 contains a patch for this issue. | |||||
CVE-2022-39315 | 1 Getkirby | 1 Kirby | 2022-10-25 | N/A | 5.3 MEDIUM |
Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby's API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached. | |||||
CVE-2022-38198 | 1 Esri | 1 Arcgis Server | 2022-10-25 | N/A | 6.1 MEDIUM |
There is a reflected cross site scripting issue in the Esri ArcGIS Server services directory versions 10.9.1 and below that may allow a remote, unauthenticated attacker to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the victim’s browser. |