Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-30739 | 1 Samsung | 1 Account | 2022-06-10 | 4.0 MEDIUM | 4.3 MEDIUM |
Improper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get an user email or phone number with a normal level permission. | |||||
CVE-2022-30737 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Implicit Intent hijacking vulnerability in Samsung Account prior to version 13.2.00.6 allows attackers to get email ID. | |||||
CVE-2022-30736 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Improper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get the data of contact and gallery without permission. | |||||
CVE-2022-30735 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 7.5 HIGH |
Improper privilege management vulnerability in Samsung Account prior to 13.2.00.6 allows attackers to get the access_token without permission. | |||||
CVE-2022-30734 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Sensitive information exposure in Sign-out log in Samsung Account prior to version 13.2.00.6 allows attackers to get an user email or phone number without permission. | |||||
CVE-2022-30733 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 5.3 MEDIUM |
Sensitive information exposure in Sign-in log in Samsung Account prior to version 13.2.00.6 allows attackers to get an user email or phone number without permission. | |||||
CVE-2022-30732 | 1 Samsung | 1 Account | 2022-06-10 | 5.0 MEDIUM | 7.5 HIGH |
Exposure of Sensitive Information vulnerability in Samsung Account prior to version 13.2.00.6 allows attacker to access sensitive information via onActivityResult. | |||||
CVE-2020-36542 | 1 Demokratian | 1 Demokratian | 2022-06-10 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability classified as critical has been found in Demokratian. This affects an unknown part of the file install/install3.php. The manipulation leads to privilege escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. | |||||
CVE-2020-36541 | 1 Demokratian | 1 Demokratian | 2022-06-10 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability was found in Demokratian. It has been rated as critical. Affected by this issue is some unknown functionality of the file basicos_php/genera_select.php. The manipulation of the argument id_provincia with the input -1%20union%20all%20select%201,2,3,4,database() leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. | |||||
CVE-2020-36540 | 1 Neetai | 1 Neetai Tech | 2022-06-10 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2020-36539 | 1 Logicoycreativo | 1 Logico Y Creativo | 2022-06-10 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability was found in Lógico y Creativo 1.0 and classified as critical. This issue affects some unknown processing. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. | |||||
CVE-2020-36527 | 1 Aptis-solutions | 1 Server Status | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability, which was classified as problematic, has been found in Server Status. This issue affects some unknown processing of the component HTTP Status/SMTP Status. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2020-36526 | 1 Akeles | 1 Countdown Timer | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability classified as problematic was found in Countdown Timer. This vulnerability affects unknown code of the component Macro Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2020-36525 | 1 Servicerocket | 1 Linking | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability classified as problematic has been found in Linking. This affects an unknown part of the component New Windows Macro. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2020-36524 | 1 Refined | 1 Refined Toolkit | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability was found in Refined Toolkit. It has been rated as problematic. Affected by this issue is some unknown functionality of the component UI-Image/UI-Button. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2020-36523 | 1 Avono | 1 Plantuml | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
A vulnerability was found in PlantUML 6.43. It has been declared as problematic. Affected by this vulnerability is the component Database Information Macro. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2022-26944 | 1 Percona | 1 Xtrabackup | 2022-06-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Percona XtraBackup 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. NOTE: this issue exists because of an incomplete fix for CVE-2020-10997. | |||||
CVE-2022-26497 | 1 Bigbluebutton | 1 Greenlight | 2022-06-10 | 3.5 LOW | 5.4 MEDIUM |
BigBlueButton Greenlight 2.11.1 allows XSS. A threat actor could have a username containing a JavaScript payload. The payload gets executed in the browser of the victim in the "Share room access" dialog if the victim has shared access to the particular room with the attacker previously. | |||||
CVE-2022-1982 | 1 Mattermost | 1 Mattermost Server | 2022-06-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post. | |||||
CVE-2022-32019 | 1 Car Rental Management System Project | 1 Car Rental Management System | 2022-06-10 | 7.5 HIGH | 9.8 CRITICAL |
Car Rental Management System v1.0 is vulnerable to Arbitrary code execution via car-rental-management-system/admin/ajax.php?action=save_car. |