Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-40737 | 1 Axiosys | 1 Bento4 | 2022-09-19 | N/A | 6.5 MEDIUM |
An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields. | |||||
CVE-2022-40736 | 1 Axiosys | 1 Bento4 | 2022-09-19 | N/A | 6.5 MEDIUM |
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp. | |||||
CVE-2022-35947 | 1 Glpi-project | 1 Glpi | 2022-09-19 | N/A | 9.8 CRITICAL |
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration. | |||||
CVE-2022-35946 | 1 Glpi-project | 1 Glpi | 2022-09-19 | N/A | 6.5 MEDIUM |
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script. | |||||
CVE-2022-35945 | 1 Glpi-project | 1 Glpi | 2022-09-19 | N/A | 6.1 MEDIUM |
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person. | |||||
CVE-2022-31187 | 1 Glpi-project | 1 Glpi | 2022-09-19 | N/A | 5.4 MEDIUM |
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search. | |||||
CVE-2022-31143 | 1 Glpi-project | 1 Glpi | 2022-09-19 | N/A | 5.3 MEDIUM |
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue. | |||||
CVE-2022-40621 | 1 Wavlink | 2 Wn531g3, Wn531g3 Firmware | 2022-09-19 | N/A | 7.5 HIGH |
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack. | |||||
CVE-2022-40623 | 1 Wavlink | 2 Wn531g3, Wn531g3 Firmware | 2022-09-19 | N/A | 8.8 HIGH |
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 does not utilize anti-CSRF tokens, which, when combined with other issues (such as CVE-2022-35518), can lead to remote, unauthenticated command execution. | |||||
CVE-2022-40622 | 1 Wavlink | 2 Wn531g3, Wn531g3 Firmware | 2022-09-19 | N/A | 8.8 HIGH |
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible. | |||||
CVE-2022-3225 | 1 Budibase | 1 Budibase | 2022-09-19 | N/A | 5.7 MEDIUM |
Improper Access Control in GitHub repository budibase/budibase prior to 1.3.20. | |||||
CVE-2022-34102 | 1 Crestron | 1 Airmedia | 2022-09-19 | N/A | 8.8 HIGH |
Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt. | |||||
CVE-2022-29649 | 1 Qsmart Next Project | 1 Qsmart Next | 2022-09-18 | N/A | 6.1 MEDIUM |
Qsmart Next v4.1.2 was discovered to contain a cross-site scripting (XSS) vulnerability. | |||||
CVE-2022-3211 | 1 Pimcore | 1 Pimcore | 2022-09-18 | N/A | 5.4 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.6. | |||||
CVE-2022-37207 | 1 Jflyfox | 1 Jfinal Cms | 2022-09-18 | N/A | 8.8 HIGH |
JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection | |||||
CVE-2022-3221 | 1 Ikus-soft | 1 Rdiffweb | 2022-09-17 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.3. | |||||
CVE-2022-34101 | 1 Crestron | 1 Airmedia | 2022-09-17 | N/A | 7.8 HIGH |
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack. | |||||
CVE-2022-31324 | 1 Pentasecurity | 1 Wapples | 2022-09-17 | N/A | 6.5 MEDIUM |
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request. | |||||
CVE-2022-38496 | 1 Lief-project | 1 Lief | 2022-09-17 | N/A | 5.5 MEDIUM |
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the component BinaryStream.hpp. | |||||
CVE-2022-38307 | 1 Lief-project | 1 Lief | 2022-09-17 | N/A | 5.5 MEDIUM |
LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function LIEF::MachO::SegmentCommand::file_offset() at /MachO/SegmentCommand.cpp. |