Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41413 | 1 Perfsonar | 1 Perfsonar | 2022-12-02 | N/A | 4.3 MEDIUM |
perfSONAR v4.x <= v4.4.5 was discovered to contain a Cross-Site Request Forgery (CSRF) which is triggered when an attacker injects crafted input into the Search function. | |||||
CVE-2022-41412 | 1 Perfsonar | 1 Perfsonar | 2022-12-02 | N/A | 8.6 HIGH |
An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks. | |||||
CVE-2022-4233 | 1 Event Registration System Project | 1 Event Registration System | 2022-12-02 | N/A | 6.1 MEDIUM |
A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591. | |||||
CVE-2022-44356 | 1 Wavlink | 2 Wl-wn531g3, Wl-wn531g3 Firmware | 2022-12-02 | N/A | 7.5 HIGH |
WAVLINK Quantum D4G (WL-WN531G3) running firmware versions M31G3.V5030.201204 and M31G3.V5030.200325 has an access control issue which allows unauthenticated attackers to download configuration data and log files. | |||||
CVE-2022-3859 | 1 Trellix | 1 Agent | 2022-12-02 | N/A | 6.7 MEDIUM |
An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there. | |||||
CVE-2022-4222 | 1 Canteen Management System Project | 1 Canteen Management System | 2022-12-01 | N/A | 9.8 CRITICAL |
A vulnerability was found in SourceCodester Canteen Management System. It has been rated as critical. This issue affects the function query of the file ajax_invoice.php of the component POST Request Handler. The manipulation of the argument search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214523. | |||||
CVE-2022-44097 | 1 Book Store Management System Project | 1 Book Store Management System | 2022-12-01 | N/A | 9.8 CRITICAL |
Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. | |||||
CVE-2022-44096 | 1 Sanitization Management System Project | 1 Sanitization Management System | 2022-12-01 | N/A | 9.8 CRITICAL |
Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel. | |||||
CVE-2022-4232 | 1 Event Registration System Project | 1 Event Registration System | 2022-12-01 | N/A | 9.8 CRITICAL |
A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. Affected is an unknown function. The manipulation of the argument cmd leads to unrestricted upload. It is possible to launch the attack remotely. VDB-214590 is the identifier assigned to this vulnerability. | |||||
CVE-2022-4177 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High) | |||||
CVE-2022-4180 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) | |||||
CVE-2022-4179 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Audio in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) | |||||
CVE-2022-4178 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | |||||
CVE-2022-4182 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 4.3 MEDIUM |
Inappropriate implementation in Fenced Frames in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass fenced frame restrictions via a crafted HTML page. (Chromium security severity: Medium) | |||||
CVE-2022-4181 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Forms in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | |||||
CVE-2022-4184 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 4.3 MEDIUM |
Insufficient policy enforcement in Autofill in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Medium) | |||||
CVE-2022-4183 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 4.3 MEDIUM |
Insufficient policy enforcement in Popup Blocker in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) | |||||
CVE-2022-4185 | 2 Apple, Google | 2 Iphone Os, Chrome | 2022-12-01 | N/A | 4.3 MEDIUM |
Inappropriate implementation in Navigation in Google Chrome on iOS prior to 108.0.5359.71 allowed a remote attacker to spoof the contents of the modal dialogue via a crafted HTML page. (Chromium security severity: Medium) | |||||
CVE-2022-4176 | 1 Google | 3 Chrome, Chrome Os, Linux And Chrome Os | 2022-12-01 | N/A | 8.8 HIGH |
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High) | |||||
CVE-2022-4175 | 1 Google | 1 Chrome | 2022-12-01 | N/A | 8.8 HIGH |
Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |