Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-0784 | 1 Title Experiments Free Project | 1 Title Experiments Free | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
The Title Experiments Free WordPress plugin before 9.0.1 does not sanitise and escape the id parameter before using it in a SQL statement via the wpex_titles AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection | |||||
CVE-2022-0770 | 1 Gtranslate | 1 Translate Wordpress With Gtranslate | 2022-04-04 | 6.8 MEDIUM | 8.8 HIGH |
The Translate WordPress with GTranslate WordPress plugin before 2.9.9 does not have CSRF check in some files, and write debug data such as user's cookies in a publicly accessible file if a specific parameter is used when requesting them. Combining those two issues, an attacker could gain access to a logged in admin cookies by making them open a malicious link or page | |||||
CVE-2022-28158 | 1 Jenkins | 1 Pipeline\ | 2022-04-04 | 4.0 MEDIUM | 6.5 MEDIUM |
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | |||||
CVE-2022-28159 | 1 Jenkins | 1 Tests Selector | 2022-04-04 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | |||||
CVE-2022-23901 | 1 Re2c | 1 Re2c | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
A stack overflow re2c 2.2 exists due to infinite recursion issues in src/dfa/dead_rules.cc. | |||||
CVE-2022-28160 | 1 Jenkins | 1 Tests Selector | 2022-04-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller. | |||||
CVE-2022-0787 | 1 Limit Login Attempts Project | 1 Limit Login Attempts | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections | |||||
CVE-2017-20016 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 5.0 MEDIUM | 7.5 HIGH |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in WEKA INTEREST Security Scanner up to 1.8 and classified as problematic. This vulnerability affects unknown code of the component Portscan. The manipulation with an unknown input leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2017-20015 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in WEKA INTEREST Security Scanner up to 1.8. This affects an unknown part of the component LAN Viewer. The manipulation with an unknown input leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2017-20014 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, has been found in WEKA INTEREST Security Scanner up to 1.8. Affected by this issue is some unknown functionality of the component Webspider. The manipulation with an unknown input leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2017-20013 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in WEKA INTEREST Security Scanner up to 1.8. Affected by this vulnerability is the Stresstest Configuration Handler. A manipulation leads to a local denial of service. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2017-20012 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in WEKA INTEREST Security Scanner up to 1.8. Affected is Stresstest Scheme Handler which leads to a denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2017-20011 | 1 Weka | 1 Interest Security Scanner | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in WEKA INTEREST Security Scanner 1.8. It has been rated as problematic. This issue affects some unknown processing of the component HTTP Handler. The manipulation with an unknown input leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | |||||
CVE-2022-0249 | 1 Gitlab | 1 Gitlab | 2022-04-04 | 6.4 MEDIUM | 9.1 CRITICAL |
A vulnerability was discovered in GitLab starting with version 12. GitLab was vulnerable to a blind SSRF attack since requests to shared address space were not blocked. | |||||
CVE-2022-0136 | 1 Gitlab | 1 Gitlab | 2022-04-04 | 5.5 MEDIUM | 8.1 HIGH |
A vulnerability was discovered in GitLab versions 10.5 to 14.5.4, 14.6 to 14.6.4, and 14.7 to 14.7.1. GitLab was vulnerable to a blind SSRF attack through the Project Import feature. | |||||
CVE-2022-0818 | 1 Yithemes | 1 Woocommerce Affiliate | 2022-04-04 | 4.3 MEDIUM | 6.1 MEDIUM |
The WooCommerce Affiliate Plugin WordPress plugin before 4.16.4.5 does not have authorization and CSRF checks on a specific action handler, as well as does not sanitize its settings, which enables an unauthenticated attacker to inject malicious XSS payloads into the settings page of the plugin. | |||||
CVE-2022-0123 | 1 Gitlab | 1 Gitlab | 2022-04-04 | 4.9 MEDIUM | 6.8 MEDIUM |
An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab does not validate SSL certificates for some of external CI services which makes it possible to perform MitM attacks on connections to these external services. | |||||
CVE-2021-39876 | 1 Gitlab | 1 Gitlab | 2022-04-04 | 4.0 MEDIUM | 4.3 MEDIUM |
In all versions of GitLab CE/EE since version 11.3, the endpoint for auto-completing Assignee discloses the members of private groups. | |||||
CVE-2015-10002 | 1 Kiddoware | 1 Kids Place | 2022-04-04 | 2.1 LOW | 5.5 MEDIUM |
A vulnerability classified as problematic has been found in Kiddoware Kids Place. This affects the Home Button Protection. A repeated pressing of the button causes a local denial of service. It is recommended to upgrade the affected component. | |||||
CVE-2022-0833 | 1 Church Admin Project | 1 Church Admin | 2022-04-04 | 4.3 MEDIUM | 4.3 MEDIUM |
The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data |