CVE-2022-3511
The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as su…
Read morePage 3/27.
CVEs without a recognized CWE (not present in the CWE map or marked as N/A).
The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as su…
Read moreThe Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to p…
Read moreThe Salat Times WordPress plugin before 3.2.2 does not sanitize and escapes its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_…
Read moreThe Find and Replace All WordPress plugin before 1.3 does not sanitize and escape some parameters from its setting page before outputting them back to the user, leading to a Reflected Cross-Site Scri…
Read moreThe Download Plugin WordPress plugin before 2.0.0 does not properly validate a user has the required privileges to access a backup's nonce identifier, which may allow any users with an account on the…
Read moreAn issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure.
Read morededecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php.
Read morededecmdv6 v6.1.9 is vulnerable to Arbitrary file deletion via file_manage_control.php.
Read moreZoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to a validation bypass that allows users to access sensitive data via the report module.
Read moreAn access control issue in /Admin/dashboard.php of Record Management System using CodeIgniter v1.0 allows attackers to access and modify user data.
Read moreA vulnerability was found in quarkus. This security flaw happens in Dev UI Config Editor which is vulnerable to drive-by localhost attacks leading to remote code execution.
Read moreD-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control.
Read moreA vulnerability has been identified in Micro Focus Filr in versions prior to 4.3.1.1. The vulnerability could be exploited to allow a remote unauthenticated attacker to enumerate valid users of the s…
Read moreThe Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF che…
Read moreThe Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate file…
Read moreThe Evaluate WordPress plugin through 1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even…
Read moreThe Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users
Read moreThe Popup Maker WordPress plugin before 1.16.11 does not sanitise and escape some of its Popup options, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scriptin…
Read moreThe WPQA Builder WordPress plugin before 5.9 does not have CSRF check when following and unfollowing users, which could allow attackers to make logged in users perform such actions via CSRF attacks
Read moreThe Contact Form 7 Database Addon WordPress plugin before 1.2.6.5 does not validate data when output it back in a CSV file, which could lead to CSV injection
Read moreThe Spacer WordPress plugin before 3.0.7 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even w…
Read moreThe Easy Digital Downloads WordPress plugin before 3.1.0.2 does not validate data when its output in a CSV file, which could lead to CSV injection.
Read moreThe Event Monster WordPress plugin before 1.2.0 does not have CSRF check when deleting visitors, which could allow attackers to make logged in admin delete arbitrary visitors via a CSRF attack
Read moreThe WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in cert…
Read moreThe function check_is_login_page() uses headers for the IP check, which can be easily spoofed.
Read moreThe My wpdb WordPress plugin before 2.5 is missing CSRF check when running SQL queries, which could allow attacker to make a logged in admin run arbitrary SQL query via a CSRF attack
Read moreThe WP User Frontend WordPress plugin before 3.5.29 uses a user supplied argument called urhidden in its registration form, which contains the role for the account to be created with, encrypted via w…
Read moreAuth. (subscriber+) Broken Access Control vulnerability in Plugin for Google Reviews plugin <= 2.2.2 on WordPress.
Read moreUnauth. Arbitrary File Deletion vulnerability in WatchTowerHQ plugin <= 3.6.15 on WordPress.
Read moreAuth. WordPress Options Change vulnerability in Image Hover Effects Ultimate plugin <= 9.7.1 on WordPress.
Read moreBroken Access Control vulnerability in WordPress LoginPress plugin <= 1.6.2 on WordPress leading to unauth. changing of Opt-In or Opt-Out tracking settings.
Read moreBroken Access Control vulnerability in miniOrange's Google Authenticator plugin <= 5.6.1 on WordPress.
Read moreBroken Access Control vulnerability in Permalink Manager Lite plugin <= 2.2.20 on WordPress.
Read moreBroken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with subscriber or higher user roles to change the status of the translation jobs.
Read moreIn drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666.
Read moreAuth. (contributor+) Privilege Escalation vulnerability in Crowdsignal Dashboard plugin <= 3.0.9 on WordPress.
Read moreAuth. (subscriber+) Broken Access Control vulnerability in WooSwipe WooCommerce Gallery plugin <= 2.0.1 on WordPress.
Read moreBroken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with a subscriber or higher user role to change plugin settings (selected language for…
Read moreAffected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API u…
Read moreA vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on a…
Read moreUsers with write permissions to a repository can delete arbitrary directories.
Read moreIf anonymous read enabled, it's possible to read the database file directly without logging in.
Read moreCryptographic issues in WLAN during the group key handshake of the WPA/WPA2 protocol in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music
Read moreThe Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated…
Read moreIBM CICS TX 11.1 Standard and Advanced could allow a remote attacker to bypass security restrictions, caused by a reverse tabnabbing flaw. An attacker could exploit this vulnerability and redirect a…
Read morePillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).
Read moreA vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow.…
Read moreImproper access control in BIOS firmware for some Intel(R) NUCs before version INWHL357.0046 may allow a privileged user to potentially enable escalation of privilege via local access.
Read moreUnmarshal can panic on some inputs, possibly allowing for denial of service attacks.
Read moreAn improper authorization issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to read variables set directly in a…
Read moreLack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click o…
Read moreImproper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take o…
Read moreAn issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A m…
Read moreBypass of healthcheck endpoint allow list affecting all versions from 12.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an unauthorized attacker to prevent access to GitLab
Read moreAn information disclosure issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to use GitLab Flavored Markdown (GF…
Read moreMicrosoft Exchange Server Elevation of Privilege Vulnerability
Read moreMicrosoft SharePoint Server Spoofing Vulnerability
Read moreMicrosoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability
Read moreVisual Studio Remote Code Execution Vulnerability
Read moreWindows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
Read moreWindows Win32k Elevation of Privilege Vulnerability
Read moreMicrosoft Office Graphics Remote Code Execution Vulnerability
Read moreMicrosoft Excel Remote Code Execution Vulnerability
Read moreMicrosoft Excel Information Disclosure Vulnerability
Read moreMicrosoft Excel Security Feature Bypass Vulnerability
Read moreMicrosoft Word Information Disclosure Vulnerability
Read moreWindows Overlay Filter Elevation of Privilege Vulnerability
Read moreWindows Overlay Filter Elevation of Privilege Vulnerability
Read moreBitLocker Security Feature Bypass Vulnerability
Read moreWindows GDI+ Information Disclosure Vulnerability
Read moreNetwork Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability
Read moreMicrosoft DWM Core Library Elevation of Privilege Vulnerability
Read moreWindows Digital Media Receiver Elevation of Privilege Vulnerability
Read moreWindows Win32k Elevation of Privilege Vulnerability
Read moreAzure CycleCloud Elevation of Privilege Vulnerability
Read moreMicrosoft Exchange Server Elevation of Privilege Vulnerability
Read moreMicrosoft Exchange Server Spoofing Vulnerability
Read moreMicrosoft Exchange Server Spoofing Vulnerability
Read moreMicrosoft Business Central Information Disclosure Vulnerability
Read more.NET Framework Information Disclosure Vulnerability
Read moreMicrosoft Excel Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft Word Information Disclosure Vulnerability
Read moreWindows Network Address Translation (NAT) Denial of Service Vulnerability
Read moreWindows HTTP.sys Elevation of Privilege Vulnerability
Read moreNetwork Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
Read moreWindows Human Interface Device Information Disclosure Vulnerability
Read moreWindows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Read moreWindows Kerberos Denial of Service Vulnerability
Read moreWindows Graphics Component Remote Code Execution Vulnerability
Read moreAzure RTOS GUIX Studio Remote Code Execution Vulnerability
Read moreWindows Extensible File Allocation Table Elevation of Privilege Vulnerability
Read moreWindows Mark of the Web Security Feature Bypass Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read moreNetlogon RPC Elevation of Privilege Vulnerability
Read moreWindows Hyper-V Denial of Service Vulnerability
Read moreWindows Group Policy Elevation of Privilege Vulnerability
Read moreWindows Kerberos Elevation of Privilege Vulnerability
Read moreWindows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
Read moreIBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
Read moreImproper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Read moreImproper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Read moreAuth. (subscriber+) Arbitrary Options Update vulnerability in Zoho CRM Lead Magnet plugin <= 1.7.5.8 on WordPress.
Read moreSanitization Management System v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /classes/Master.php?f=delete_img.
Read moreAn information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files.
Read morebtcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
Read moreThe VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. Th…
Read moreThe Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.1. This is due to missing or inco…
Read moreThe Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to authorization bypass via several AJAX actions in versions up to, and including 2.3.0 due to missin…
Read moreDue to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL v…
Read moreAn improper control of a resource through its lifetime vulnerability [CWE-664] in FortiEDR CollectorWindows 4.0.0 through 4.1, 5.0.0 through 5.0.3.751, 5.1.0 may allow a privileged user to terminate…
Read moreAn improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may a…
Read moreAn improper access control [CWE-284] vulnerability in FortiOS version 7.2.0 and versions 7.0.0 through 7.0.7 may allow a remote authenticated read-only user to modify the interface settings via the A…
Read moreA hidden functionality vulnerability [CWE-1242] in FortiTester CLI 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow a local, privileged user to obtain a root shell on the devic…
Read moreA key management error vulnerability [CWE-320] affecting the RSA SSH host key in FortiOS 7.2.0 and below, 7.0.6 and below, 6.4.9 and below may allow an unauthenticated attacker to perform a man in th…
Read moreInappropriate implementation in Full screen mode in Google Chrome on Android prior to 107.0.5304.62 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page. (C…
Read moreA logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web co…
Read moreA logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, macOS Monterey 12.6. A user may be able to v…
Read moreAn issue in code signature validation was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, macOS Monterey 12.6. An app may be able to access user-sensitive…
Read more