Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-20146 | 1 Gorillatoolkit | 1 Handlers | 2023-01-06 | N/A | 9.8 CRITICAL |
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy. | |||||
CVE-2020-36635 | 1 Openmrs | 1 Appointment Scheduling Module | 2023-01-06 | N/A | 5.4 MEDIUM |
A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.13.0 is able to address this issue. The name of the patch is 34213c3f6ea22df427573076fb62744694f601d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216915. | |||||
CVE-2022-23553 | 1 Alpine Project | 1 Alpine | 2023-01-06 | N/A | 7.5 HIGH |
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows URL access filter bypass. This issue has been fixed in version 1.10.4. There are no known workarounds. | |||||
CVE-2022-23554 | 1 Alpine Project | 1 Alpine | 2023-01-06 | N/A | 5.4 MEDIUM |
Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows Authentication Filter bypass. The AuthenticationFilter relies on the request URI to evaluate if the user is accessing the swagger endpoint. By accessing a URL with a path such as /api/foo;%2fapi%2fswagger the contains condition will hold and will return from the authentication filter without aborting the request. Note that the principal object will not be assigned and therefore the issue wont allow user impersonation. This issue has been fixed in version 1.10.4. There are no known workarounds. | |||||
CVE-2015-10004 | 1 Json Web Token Project | 1 Json Web Token | 2023-01-06 | N/A | 7.5 HIGH |
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. | |||||
CVE-2022-4818 | 1 Talend | 1 Open Studio For Mdm | 2023-01-06 | N/A | 4.3 MEDIUM |
A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability. | |||||
CVE-2014-125026 | 1 Cloudflare | 1 Golz4 | 2023-01-06 | N/A | 9.8 CRITICAL |
LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. | |||||
CVE-2022-2584 | 1 Protocol | 1 Go-codec-dagpb | 2023-01-06 | N/A | 7.5 HIGH |
The dag-pb codec can panic when decoding invalid blocks. | |||||
CVE-2022-45963 | 1 H3c | 22 Secpath F100-c-g3, Secpath F100-c-g3 Firmware, Secpath F500-6gw and 19 more | 2023-01-06 | N/A | 9.8 CRITICAL |
h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability. | |||||
CVE-2013-10005 | 1 Socks5 Project | 1 Socks5 | 2023-01-06 | N/A | 7.5 HIGH |
The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow. | |||||
CVE-2020-36567 | 1 Gin-gonic | 1 Gin | 2023-01-06 | N/A | 7.5 HIGH |
Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines. | |||||
CVE-2022-3156 | 1 Rockwellautomation | 1 Studio 5000 Logix Emulate | 2023-01-06 | N/A | 7.8 HIGH |
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. | |||||
CVE-2019-19705 | 1 Lenovo | 272 Aio300-23isu, Aio300-23isu Firmware, Aio310-20iap and 269 more | 2023-01-06 | N/A | 7.8 HIGH |
Realtek Audio Drivers for Windows, as used on the Lenovo ThinkPad X1 Carbon 20A7, 20A8, 20BS, and 20BT before 6.0.8882.1 and 20KH and 20KG before 6.0.8907.1 (and on many other Lenovo and non-Lenovo products), mishandles DLL preloading. | |||||
CVE-2022-31740 | 1 Mozilla | 3 Firefox, Firefox Esr, Thunderbird | 2023-01-06 | N/A | 8.8 HIGH |
On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. | |||||
CVE-2018-25057 | 1 Simple Php Link Shortener Project | 1 Simple Php Link Shortener | 2023-01-06 | N/A | 9.8 CRITICAL |
A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link["id"] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996. | |||||
CVE-2022-4611 | 1 Clickstudios | 1 Passwordstate | 2023-01-06 | N/A | 5.3 MEDIUM |
A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability. | |||||
CVE-2022-4607 | 1 Tum | 1 Ogc Web Feature Service | 2023-01-06 | N/A | 9.8 CRITICAL |
A vulnerability was found in 3D City Database OGC Web Feature Service up to 5.2.0. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to xml external entity reference. Upgrading to version 5.2.1 is able to address this issue. The name of the patch is 246f4e2a97ad81491c00a7ed72ce5e7c7f75050a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216215. | |||||
CVE-2018-25053 | 1 Json2html | 1 Json2html | 2023-01-06 | N/A | 6.1 MEDIUM |
A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959. | |||||
CVE-2022-4604 | 1 Wp-english-wp-admin Project | 1 Wp-english-wp-admin | 2023-01-06 | N/A | 8.8 HIGH |
A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199. | |||||
CVE-2021-4290 | 1 Fallstudie Project | 1 Fallstudie | 2023-01-06 | N/A | 9.8 CRITICAL |
A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907. |