CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1701 CVE-2022-2309 476 DoS 2022-07-05 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
1702 CVE-2022-2321 307 2022-07-05 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Login Bruteforce attacks
1703 CVE-2022-20828 Exec Code 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in the CLI parser of Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected ASA FirePOWER module as the root user. This vulnerability is due to improper handling of undefined command parameters. An attacker could exploit this vulnerability by using a crafted command on the CLI or by submitting a crafted HTTPS request to the web-based management interface of the Cisco ASA that is hosting the ASA FirePOWER module. Note: To exploit this vulnerability, the attacker must have administrative access to the Cisco ASA. A user who has administrative access to a particular Cisco ASA is also expected to have administrative access to the ASA FirePOWER module that is hosted by that Cisco ASA.
1704 CVE-2022-20829 Exec Code 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability.
1705 CVE-2022-21231 2022-06-24 2022-06-25
0.0
None ??? ??? ??? ??? ??? ???
All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)
1706 CVE-2022-22366 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
IBM UrbanCode Deploy (UCD) 6.2.7.15, 7.0.5.10, 7.1.2.6, and 7.2.2.1 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 22106.
1707 CVE-2022-22367 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
IBM UrbanCode Deploy (UCD) 6.2.7.15, 7.0.5.10, 7.1.2.6, and 7.2.2.1 could disclose sensitive database information to a local user in plain text. IBM X-Force ID: 221008.
1708 CVE-2022-22373 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
An improper validation vulnerability in IBM InfoSphere Information Server 11.7 Pack for SAP Apps and BW Packs may lead to creation of directories and files on the server file system that may contain non-sensitive debugging information like stack traces. IBM X-Force ID: 221323.
1709 CVE-2022-22389 DoS 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may terminate abnormally when executing specially crafted SQL statements by an authenticated user. IBM X-Force ID: 2219740.
1710 CVE-2022-22390 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an information disclosure caused by improper privilege management when table function is used. IBM X-Force ID: 221973.
1711 CVE-2022-22472 Bypass 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
IBM Spectrum Protect Plus Container Backup and Restore (10.1.5 through 10.1.10.2 for Kubernetes and 10.1.7 through 10.1.10.2 for Red Hat OpenShift) could allow a remote attacker to bypass IBM Spectrum Protect Plus role based access control restrictions, caused by improper disclosure of session information. By retrieving the logs of a container an attacker could exploit this vulnerability to bypass login security of the IBM Spectrum Protect Plus server and gain unauthorized access based on the permissions of the IBM Spectrum Protect Plus user to the vulnerable Spectrum Protect Plus server software. IBM X-Force ID: 225340.
1712 CVE-2022-22474 DoS 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
IBM Spectrum Protect 8.1.0.0 through 8.1.14.0 dsmcad, dsmc, and dsmcsvc processes incorrectly handle certain read operations on TCP/IP sockets. This can result in a denial of service for IBM Spectrum Protect client operations. IBM X-Force ID: 225348.
1713 CVE-2022-22478 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
IBM Spectrum Protect Client 8.1.0.0 through 8.1.14.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 225886.
1714 CVE-2022-22487 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
An IBM Spectrum Protect storage agent could allow a remote attacker to perform a brute force attack by allowing unlimited attempts to login to the storage agent without locking the administrative ID. A remote attacker could exploit this vulnerability using brute force techniques to gain unauthorized administrative access to both the IBM Spectrum Protect storage agent and the IBM Spectrum Protect Server 8.1.0.000 through 8.1.14 with which it communicates. IBM X-Force ID: 226326.
1715 CVE-2022-22494 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.14 could allow a remote attacker to gain details of the database, such as type and version, by sending a specially-crafted HTTP request. This information could then be used in future attacks. IBM X-Force ID: 226940.
1716 CVE-2022-22496 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
While a user account for the IBM Spectrum Protect Server 8.1.0.000 through 8.1.14 is being established, it may be configured to use SESSIONSECURITY=TRANSITIONAL. While in this mode, it may be susceptible to an offline dictionary attack. IBM X-Force ID: 226942.
1717 CVE-2022-22502 XSS 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227124.
1718 CVE-2022-23170 2022-06-24 2022-06-24
0.0
None ??? ??? ??? ??? ??? ???
SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
1719 CVE-2022-23717 DoS 2022-06-30 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
PingID Windows Login prior to 2.8 is vulnerable to a denial of service condition on local machines when combined with using offline security keys as part of authentication.
1720 CVE-2022-23718 Exec Code 2022-06-30 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.
1721 CVE-2022-23719 DoS Exec Code 2022-06-30 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
PingID Windows Login prior to 2.8 does not authenticate communication with a local Java service used to capture security key requests. An attacker with the ability to execute code on the target machine maybe able to exploit and spoof the local Java service using multiple attack vectors. A successful attack can lead to code executed as SYSTEM by the PingID Windows Login application, or even a denial of service for offline security key authentication.
1722 CVE-2022-23720 +Priv 2022-06-30 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
PingID Windows Login prior to 2.8 does not alert or halt operation if it has been provisioned with the full permissions PingID properties file. An IT administrator could mistakenly deploy administrator privileged PingID API credentials, such as those typically used by PingFederate, into PingID Windows Login user endpoints. Using sensitive full permissions properties file outside of a privileged trust boundary leads to an increased risk of exposure or discovery, and an attacker could leverage these credentials to perform administrative actions against PingID APIs or endpoints.
1723 CVE-2022-23725 2022-06-30 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
PingID Windows Login prior to 2.8 does not properly set permissions on the Windows Registry entries used to store sensitive API keys under some circumstances.
1724 CVE-2022-23763 Exec Code 2022-06-28 2022-06-28
0.0
None ??? ??? ??? ??? ??? ???
Origin validation error vulnerability in NeoRS’s ActiveX moudle allows attackers to download and execute arbitrary files. Remote attackers can use this vulerability to encourage users to access crafted web pages, causing damage such as malicious code infections.
1725 CVE-2022-23896 XSS 2022-06-28 2022-06-28
0.0
None ??? ??? ??? ??? ??? ???
Admidio 4.1.2 version is affected by stored cross-site scripting (XSS).
1726 CVE-2022-24444 2022-06-28 2022-06-29
0.0
None ??? ??? ??? ??? ??? ???
Silverstripe silverstripe/framework through 4.10 allows Session Fixation.
1727 CVE-2022-24874 XSS 2022-04-20 2022-04-21
0.0
None ??? ??? ??? ??? ??? ???
acs commons is an open source framework for AEM projects. ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. This issue has been resolved in 5.2.0. There are no known workarounds for this issue.
1728 CVE-2022-24893 787 Mem. Corr. 2022-06-25 2022-06-27
0.0
None ??? ??? ??? ??? ??? ???
ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.
1729 CVE-2022-25238 XSS 2022-06-28 2022-06-29
0.0
None ??? ??? ??? ??? ??? ???
Silverstripe silverstripe/framework through 4.10.0 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code.
1730 CVE-2022-25758 DoS 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.
1731 CVE-2022-25876 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
The package link-preview-js before 2.1.16 are vulnerable to Server-side Request Forgery (SSRF) which allows attackers to send arbitrary requests to the local network and read the response. This is due to flawed DNS rebinding protection.
1732 CVE-2022-25896 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.
1733 CVE-2022-25898 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
1734 CVE-2022-25900 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the --upload-pack feature of git.
1735 CVE-2022-26051 Bypass 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Operation restriction bypass vulnerability in Portal of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Portal.
1736 CVE-2022-26054 Bypass 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Operation restriction bypass vulnerability in Link of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Link.
1737 CVE-2022-26135 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
1738 CVE-2022-26351 2022-03-14 2022-03-14
0.0
None ??? ??? ??? ??? ??? ???
Canon imagePROGRAF and imageRUNNER devices through 2022-03-14 generate RSA keys that can be broken with Fermat's factorization method. This allows efficient calculation of private RSA keys from the public key of a TLS certificate.
1739 CVE-2022-26365 +Info 2022-07-05 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).
1740 CVE-2022-26368 Bypass 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Browse restriction bypass and operation restriction bypass vulnerability in Cabinet of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter and/or obtain the data of Cabinet.
1741 CVE-2022-26477 2022-06-27 2022-06-28
0.0
None ??? ??? ??? ??? ??? ???
The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
1742 CVE-2022-26487 DoS +Info 2022-03-06 2022-03-07
0.0
None ??? ??? ??? ??? ??? ???
Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allow remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic).
1743 CVE-2022-26502 2022-03-18 2022-03-21
0.0
None ??? ??? ??? ??? ??? ???
**REJECT** Veeam Backup & Replication 10.x and 11.x has an Untrusted Search Path.
1744 CVE-2022-27306 2022-04-01 2022-04-02
0.0
None ??? ??? ??? ??? ??? ???
The function url.parse() in Node.js v17.7.0 allows attackers to spoof a hostname.
1745 CVE-2022-27627 XSS 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Cross-site scripting vulnerability in Organization's Information of Cybozu Garoon 4.10.2 to 5.5.1 allows a remote attacker to execute an arbitrary script on the logged-in user's web browser.
1746 CVE-2022-27661 Bypass 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Operation restriction bypass vulnerability in Workflow of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Workflow.
1747 CVE-2022-27803 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Improper input validation vulnerability in Space of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Space.
1748 CVE-2022-27807 2022-07-04 2022-07-05
0.0
None ??? ??? ??? ??? ??? ???
Improper input validation vulnerability in Link of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to disable to add Categories.
1749 CVE-2022-27904 2022-07-01 2022-07-01
0.0
None ??? ??? ??? ??? ??? ???
The Automox Agent installation package before 37 on macOS allows an unprivileged user to obtain root access because of incorrect access control on a file used within the PostInstall script.
1750 CVE-2022-28127 2022-06-30 2022-06-30
0.0
None ??? ??? ??? ??? ??? ???
A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability.
Total number of vulnerabilities : 2011   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 (This Page)36 37 38 39 40 41
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.