# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2013-5791 |
|
1
|
Exec Code Overflow |
2013-10-16 |
2018-10-12 |
1.5 |
None |
Local |
Medium |
??? |
None |
None |
Partial |
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.0 and 8.4.1 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. NOTE: the previous information is from the October 2013 CPU. Oracle has not commented on claims from a third party that the issue is a stack-based buffer overflow in the Microsoft Access 1.x parser in vsacs.dll before 8.4.0.108 and before 8.4.1.52, which allows attackers to execute arbitrary code via a long field (aka column) name. |
2 |
CVE-2012-2425 |
20 |
1
|
DoS |
2012-04-25 |
2021-07-23 |
1.8 |
None |
Local Network |
High |
Not required |
None |
None |
Partial |
The intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, allow remote attackers to cause a denial of service (application crash) via a long URI. |
3 |
CVE-2011-5204 |
255 |
1
|
+Info |
2012-10-04 |
2012-10-05 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Akiva WebBoard 8.x stores passwords in plaintext, which allows local users to obtain sensitive information by reading from the database. |
4 |
CVE-2022-31758 |
362 |
|
|
2022-06-13 |
2022-06-21 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. |
5 |
CVE-2022-29973 |
770 |
|
+Info |
2022-05-02 |
2022-05-11 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
relan exFAT 1.3.0 allows local users to obtain sensitive information (data from deleted files in the filesystem) in certain situations involving offsets beyond ValidDataLength. |
6 |
CVE-2022-29127 |
|
|
Bypass |
2022-05-10 |
2022-05-23 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
BitLocker Security Feature Bypass Vulnerability. |
7 |
CVE-2022-28774 |
532 |
|
|
2022-05-11 |
2022-06-21 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Under certain conditions, the SAP Host Agent logfile shows information which would otherwise be restricted. |
8 |
CVE-2022-28192 |
416 |
|
DoS |
2022-05-17 |
2022-05-26 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges. |
9 |
CVE-2022-28161 |
532 |
|
|
2022-05-09 |
2022-05-17 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode. |
10 |
CVE-2022-27841 |
755 |
|
|
2022-04-11 |
2022-04-19 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Improper exception handling in Samsung Pass prior to version 3.7.07.5 allows physical attacker to view the screen that is previously running without authentication |
11 |
CVE-2022-27049 |
|
|
|
2022-03-31 |
2022-04-08 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
Raidrive before v2021.12.35 allows attackers to arbitrarily move log files by pre-creating a mountpoint and log files before Raidrive is installed. |
12 |
CVE-2022-26765 |
362 |
|
Bypass |
2022-05-26 |
2022-06-08 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
A race condition was addressed with improved state handling. This issue is fixed in watchOS 8.6, tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. |
13 |
CVE-2022-26355 |
668 |
|
|
2022-03-10 |
2022-03-18 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Citrix Federated Authentication Service (FAS) 7.17 - 10.6 causes deployments that have been configured to store a registration authority certificate's private key in a Trusted Platform Module (TPM) to incorrectly store that key in the Microsoft Software Key Storage Provider (MSKSP). This issue only occurs if PowerShell was used when configuring FAS to store the registration authority certificate’s private key in the TPM. It does not occur if the TPM was not selected for use or if the FAS administration console was used for configuration. |
14 |
CVE-2022-25831 |
287 |
|
|
2022-04-11 |
2022-04-18 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Improper access control vulnerability in S Secure prior to SMR Apr-2022 Release 1 allows physical attackers to access secured data in certain conditions. |
15 |
CVE-2022-25368 |
|
|
|
2022-03-10 |
2022-03-16 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Spectre BHB is a variant of Spectre-v2 in which malicious code uses the shared branch history (stored in the CPU BHB) to influence mispredicted branches in the victim's hardware context. Speculation caused by these mispredicted branches can then potentially be used to cause cache allocation, which can then be used to infer information that should be protected. |
16 |
CVE-2022-24823 |
668 |
|
|
2022-05-06 |
2022-06-16 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user. |
17 |
CVE-2022-24725 |
200 |
|
Dir. Trav. +Info |
2022-03-03 |
2022-03-17 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`. |
18 |
CVE-2022-24511 |
|
|
|
2022-03-09 |
2022-03-16 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Microsoft Office Word Tampering Vulnerability. |
19 |
CVE-2022-24448 |
909 |
|
|
2022-02-04 |
2022-05-12 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor. |
20 |
CVE-2022-23960 |
|
|
+Info |
2022-03-13 |
2022-07-04 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information. |
21 |
CVE-2022-23653 |
367 |
|
|
2022-02-23 |
2022-03-07 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/account_info`, `~/.b2_account_info` or a user-defined path) when `b2 authorize-account` is first run. This happens regardless of whether a valid key is provided or not. When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory is readable by a local attacker and the user did not yet run `b2 authorize-account` then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Users that have not yet run `b2 authorize-account` should upgrade to B2 Command-Line Tool v3.2.1 before running it. Users that have run `b2 authorize-account` are safe if at the time of the file creation no other local users had read access to the local configuration file. Users that have run `b2 authorize-account` where the designated path could be opened by another local user should upgrade to B2 Command-Line Tool v3.2.1 and remove the database and regenerate all application keys. Note that `b2 clear-account` does not remove the database file and it should not be used to ensure that all open handles to the file are invalidated. If B2 Command-Line Tool cannot be upgraded to v3.2.1 due to a dependency conflict, a binary release can be used instead. Alternatively a new version could be installed within a virtualenv, or the permissions can be changed to prevent local users from opening the database file. |
22 |
CVE-2022-23651 |
367 |
|
|
2022-02-23 |
2022-03-07 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API keys (and bucket name-to-id mapping) in a local database file ($XDG_CONFIG_HOME/b2/account_info, ~/.b2_account_info or a user-defined path). When first created, the file is world readable and is (typically a few milliseconds) later altered to be private to the user. If the directory containing the file is readable by a local attacker then during the brief period between file creation and permission modification, a local attacker can race to open the file and maintain a handle to it. This allows the local attacker to read the contents after the file after the sensitive information has been saved to it. Consumers of this SDK who rely on it to save data using SqliteAccountInfo class should upgrade to the latest version of the SDK. Those who believe a local user might have opened a handle using this race condition, should remove the affected database files and regenerate all application keys. Users should upgrade to b2-sdk-python 1.14.1 or later. |
23 |
CVE-2022-23242 |
404 |
|
Exec Code |
2022-03-23 |
2022-03-29 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
TeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted connection password. |
24 |
CVE-2022-22713 |
400 |
|
DoS |
2022-05-10 |
2022-05-23 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
Windows Hyper-V Denial of Service Vulnerability. |
25 |
CVE-2022-22325 |
200 |
|
+Info |
2022-05-13 |
2022-05-23 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
IBM MQ (IBM MQ for HPE NonStop 8.1.0) can inadvertently disclose sensitive information under certain circumstances to a local user from a stack trace. IBM X-Force ID: 218853. |
26 |
CVE-2022-21975 |
362 |
|
DoS |
2022-03-09 |
2022-05-23 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
Windows Hyper-V Denial of Service Vulnerability. |
27 |
CVE-2022-21494 |
|
|
|
2022-04-19 |
2022-04-28 |
1.2 |
None |
Local |
High |
Not required |
None |
None |
Partial |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H). |
28 |
CVE-2022-21493 |
|
|
|
2022-04-19 |
2022-04-28 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H). |
29 |
CVE-2022-21416 |
|
|
|
2022-04-19 |
2022-04-27 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data. CVSS 3.1 Base Score 5.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N). |
30 |
CVE-2022-21405 |
|
|
|
2022-04-19 |
2022-04-27 |
1.2 |
None |
Local |
High |
Not required |
Partial |
None |
None |
Vulnerability in the OSS Support Tools product of Oracle Support Tools (component: Oracle Explorer). The supported version that is affected is 18.3. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where OSS Support Tools executes to compromise OSS Support Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in OSS Support Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all OSS Support Tools accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N). |
31 |
CVE-2022-20196 |
|
|
Bypass |
2022-06-15 |
2022-06-24 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
In gallery3d and photos, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201535148 |
32 |
CVE-2022-20195 |
502 |
|
DoS |
2022-06-15 |
2022-06-24 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
In the keystore library, there is a possible prevention of access to system Settings due to unsafe deserialization. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-213172664 |
33 |
CVE-2022-20097 |
362 |
|
|
2022-05-03 |
2022-05-11 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
In aee daemon, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06383944. |
34 |
CVE-2022-20032 |
362 |
|
Mem. Corr. |
2022-02-09 |
2022-02-11 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
In vow driver, there is a possible memory corruption due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05852822; Issue ID: ALPS05852822. |
35 |
CVE-2022-0835 |
312 |
|
|
2022-04-11 |
2022-04-18 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
AVEVA System Platform 2020 stores sensitive information in cleartext, which may allow access to an attacker or a low-privileged user. |
36 |
CVE-2022-0563 |
209 |
|
|
2022-02-21 |
2022-06-03 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4. |
37 |
CVE-2022-0021 |
532 |
|
|
2022-02-10 |
2022-02-17 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms. |
38 |
CVE-2022-0019 |
522 |
|
|
2022-02-10 |
2022-02-17 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms. |
39 |
CVE-2021-44199 |
427 |
|
DoS |
2021-11-29 |
2021-11-30 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612 |
40 |
CVE-2021-43566 |
362 |
|
|
2022-01-11 |
2022-06-02 |
1.2 |
None |
Local |
High |
Not required |
None |
Partial |
None |
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed. |
41 |
CVE-2021-43393 |
347 |
|
|
2022-03-04 |
2022-03-10 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to abuse signature verification. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform. |
42 |
CVE-2021-43392 |
347 |
|
+Info |
2022-03-04 |
2022-03-10 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
STMicroelectronics STSAFE-J 1.1.4, J-SAFE3 1.2.5, and J-SIGN sometimes allow attackers to obtain information on cryptographic secrets. This is associated with the ECDSA signature algorithm on the Java Card J-SAFE3 and STSAFE-J platforms exposing a 3.0.4 Java Card API. It is exploitable for STSAFE-J in closed configuration and J-SIGN (when signature verification is activated) but not for J-SAFE3 EPASS BAC and EAC products. It might also impact other products based on the J-SAFE-3 Java Card platform. |
43 |
CVE-2021-42376 |
476 |
|
DoS |
2021-11-15 |
2022-03-31 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input. |
44 |
CVE-2021-42375 |
|
|
DoS |
2021-11-15 |
2022-03-31 |
1.9 |
None |
Local |
Medium |
Not required |
None |
None |
Partial |
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input. |
45 |
CVE-2021-42015 |
525 |
|
|
2021-11-09 |
2021-11-12 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache. |
46 |
CVE-2021-41994 |
330 |
|
Bypass |
2022-04-30 |
2022-05-10 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
A misconfiguration of RSA in PingID iOS app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login. |
47 |
CVE-2021-41993 |
330 |
|
Bypass |
2022-04-30 |
2022-05-10 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
A misconfiguration of RSA in PingID Android app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login. |
48 |
CVE-2021-41808 |
532 |
|
|
2022-01-18 |
2022-01-26 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
In M-Files Server product with versions before 21.11.10775.0, enabling logging of Federated authentication to event log wrote sensitive information to log. Mitigating factors are logging is disabled by default. |
49 |
CVE-2021-40089 |
|
|
|
2021-08-25 |
2021-09-09 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
An issue was discovered in PrimeKey EJBCA before 7.6.0. The General Purpose Custom Publisher, which is normally run to invoke a local script upon a publishing operation, was still able to run if the System Configuration setting Enable External Script Access was disabled. With this setting disabled it's not possible to create new such publishers, but existing publishers would continue to run. |
50 |
CVE-2021-40041 |
79 |
|
XSS |
2022-01-10 |
2022-01-13 |
1.9 |
None |
Local |
Medium |
Not required |
None |
Partial |
None |
There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. Due to insufficient validation of user input, a local authenticated attacker could exploit this vulnerability by injecting special characters. Successful exploit could cause certain information disclosure. Affected product versions include: WS318n-21 10.0.2.2, 10.0.2.5 and 10.0.2.6. |