Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-24957 | 1 Dhc-vision | 1 Eqms | 2022-04-04 | 3.5 LOW | 5.4 MEDIUM |
DHC Vision eQMS through 5.4.8.322 has Persistent XSS due to insufficient encoding of untrusted input/output. To exploit the vulnerability, the attacker has to create or edit a new information object and use the XSS payload as the name. Any user that opens the object's version or history tab will be attacked. | |||||
CVE-2022-0846 | 1 Speakout\! Email Petitions Project | 1 Speakout\! Email Petitions | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users | |||||
CVE-2021-44124 | 1 Hiby | 2 R3 Pro, R3 Pro Firmware | 2022-04-04 | 5.0 MEDIUM | 7.5 HIGH |
Hiby Music Hiby OS R3 Pro 1.5 and 1.6 is vulnerable to Directory Traversal. The HTTP Server does not have enough input data sanitization when shown data from SD Card, an attacker can navigate through the device's File System over HTTP. | |||||
CVE-2021-43099 | 1 Diyhi | 1 Bbs | 2022-04-04 | 4.0 MEDIUM | 4.9 MEDIUM |
An Archive Extraction (AKA "Zip Slip) vulnerability exists in bbs 5.3 in the UpgradeNow function in UpgradeManageAction.java, which unzips the arbitrary upladed zip file without checking filenames. The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). | |||||
CVE-2022-0450 | 1 Freshlightlab | 1 Menu Image\, Icons Made Easy | 2022-04-04 | 3.5 LOW | 5.4 MEDIUM |
The Menu Image, Icons made easy WordPress plugin before 3.0.8 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend | |||||
CVE-2021-43100 | 1 Diyhi | 1 Bbs | 2022-04-04 | 6.5 MEDIUM | 7.2 HIGH |
A File Upload vulnerability exists in bbs 5.3 is via TopicManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code. | |||||
CVE-2022-0342 | 1 Zyxel | 46 Atp100, Atp100 Firmware, Atp100w and 43 more | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device. | |||||
CVE-2021-46434 | 1 Emqx | 1 Emqx | 2022-04-04 | 5.0 MEDIUM | 5.3 MEDIUM |
** UNSUPPORTED WHEN ASSIGNED ** EMQ X Dashboard V3.0.0 is affected by username enumeration in the "/api /v3/auth" interface. When a user login, the application returns different results depending on whether the account is correct, that allowed an attacker to determine if a given username was valid. | |||||
CVE-2022-25757 | 1 Apache | 1 Apisix | 2022-04-04 | 6.8 MEDIUM | 9.8 CRITICAL |
In Apache APISIX before 2.13.0, when decoding JSON with duplicate keys, lua-cjson will choose the last occurred value as the result. By passing a JSON with a duplicate key, the attacker can bypass the body_schema validation in the request-validation plugin. For example, `{"string_payload":"bad","string_payload":"good"}` can be used to hide the "bad" input. Systems satisfy three conditions below are affected by this attack: 1. use body_schema validation in the request-validation plugin 2. upstream application uses a special JSON library that chooses the first occurred value, like jsoniter or gojay 3. upstream application does not validate the input anymore. The fix in APISIX is to re-encode the validated JSON input back into the request body at the side of APISIX. Improper Input Validation vulnerability in __COMPONENT__ of Apache APISIX allows an attacker to __IMPACT__. This issue affects Apache APISIX Apache APISIX version 2.12.1 and prior versions. | |||||
CVE-2022-27658 | 1 Sap | 1 Innovation Management | 2022-04-04 | 4.3 MEDIUM | 7.5 HIGH |
Under certain conditions, SAP Innovation management - version 2.0, allows an attacker to access information which could lead to information gathering for further exploits and attacks. | |||||
CVE-2022-26278 | 1 Tenda | 2 Ac9, Ac9 Firmware | 2022-04-04 | 10.0 HIGH | 9.8 CRITICAL |
Tenda AC9 v15.03.2.21_cn was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function. | |||||
CVE-2022-26980 | 1 Teampass | 1 Teampass | 2022-04-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. | |||||
CVE-2017-5645 | 4 Apache, Netapp, Oracle and 1 more | 79 Log4j, Oncommand Api Services, Oncommand Insight and 76 more | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. | |||||
CVE-2021-22100 | 1 Cloudfoundry | 2 Capi-release, Cf-deployment | 2022-04-04 | 5.0 MEDIUM | 5.3 MEDIUM |
In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible. An attacker can leverage this vulnerability to cause an inability for anyone to push or manage apps. | |||||
CVE-2022-28134 | 1 Jenkins | 1 Bitbucket Server Integration | 2022-04-04 | 5.5 MEDIUM | 5.4 MEDIUM |
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers. | |||||
CVE-2022-28133 | 1 Jenkins | 1 Bitbucket Server Integration | 2022-04-04 | 3.5 LOW | 5.4 MEDIUM |
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers. | |||||
CVE-2022-28139 | 1 Jenkins | 1 Rocketchat Notifier | 2022-04-04 | 4.0 MEDIUM | 4.3 MEDIUM |
A missing permission check in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | |||||
CVE-2022-0479 | 1 Sygnoos | 1 Popup Builder | 2022-04-04 | 7.5 HIGH | 9.8 CRITICAL |
The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link | |||||
CVE-2021-25064 | 1 Wow-company | 1 Wow Countdowns | 2022-04-04 | 6.5 MEDIUM | 7.2 HIGH |
The Wow Countdowns WordPress plugin through 3.1.2 does not sanitize user input into the 'did' parameter and uses it in a SQL statement, leading to an authenticated SQL Injection. | |||||
CVE-2021-25012 | 1 Popozure | 1 Pz-linkcard | 2022-04-04 | 4.3 MEDIUM | 6.1 MEDIUM |
The Pz-LinkCard WordPress plugin through 2.4.4.4 does not sanitise and escape multiple parameters before outputting them back in admin dashboard pages, leading to Reflected Cross-Site Scripting issues |