Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-28521 1 Zcms Project 1 Zcms 2022-05-04 7.5 HIGH 9.8 CRITICAL
ZCMS v20170206 was discovered to contain a file inclusion vulnerability via index.php?m=home&c=home&a=sp_set_config.
CVE-2022-29264 1 Coreboot 1 Coreboot 2022-05-04 7.5 HIGH 9.8 CRITICAL
An issue was discovered in coreboot 4.13 through 4.16. On APs, arbitrary code execution in SMM may occur.
CVE-2022-0567 1 Ovn 1 Ovn-kubernetes 2022-05-04 6.5 MEDIUM 9.1 CRITICAL
A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable.
CVE-2022-1440 1 Git-interface Project 1 Git-interface 2022-05-04 10.0 HIGH 9.8 CRITICAL
Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
CVE-2022-1039 1 Redlion 2 Da50n, Da50n Firmware 2022-05-04 10.0 HIGH 9.8 CRITICAL
The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.
CVE-2022-29077 1 Ripple 1 Rippled 2022-05-04 7.5 HIGH 9.8 CRITICAL
A heap-based buffer overflow exists in rippled before 1.8.5. The vulnerability allows attackers to cause a crash or execute commands remotely on a rippled node, which may lead to XRPL mainnet DoS or compromise. This exposes all digital assets on the XRPL to a security threat.
CVE-2021-38869 2 Ibm, Linux 2 Qradar Security Information And Event Manager, Linux Kernel 2022-05-04 7.5 HIGH 9.8 CRITICAL
IBM QRadar SIEM 7.3, 7.4, and 7.5 in some situations may not automatically log users out after they exceede their idle timeout. IBM X-Force ID: 208341.
CVE-2022-0541 1 Flothemes 1 Flo-launch 2022-05-04 7.5 HIGH 9.8 CRITICAL
The flo-launch WordPress plugin before 2.4.1 injects code into wp-config.php when creating a cloned site, allowing any attacker to initiate a new site install by setting the flo_custom_table_prefix cookie to an arbitrary value.
CVE-2022-0769 1 Usersultra 1 Users Ultra 2022-05-04 7.5 HIGH 9.8 CRITICAL
The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
CVE-2022-0693 1 Devbunch 1 Master Elements 2022-05-04 7.5 HIGH 9.8 CRITICAL
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
CVE-2022-1390 1 Admin Word Count Column Project 1 Admin Word Count Column 2022-05-04 7.5 HIGH 9.8 CRITICAL
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
CVE-2022-26674 1 Asus 2 Rt-ax88u, Rt-ax88u Firmware 2022-05-04 7.5 HIGH 9.8 CRITICAL
ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.
CVE-2022-26672 1 Asus 1 Webstorage 2022-05-04 7.5 HIGH 9.8 CRITICAL
ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.
CVE-2021-36203 1 Johnsoncontrols 1 Metasys System Configuration Tool 2022-05-03 6.4 MEDIUM 9.1 CRITICAL
The affected product may allow an attacker to identify and forge requests to internal systems by way of a specially crafted request.
CVE-2022-0782 1 Donations Project 1 Donations 2022-05-03 7.5 HIGH 9.8 CRITICAL
The Donations WordPress plugin through 1.8 does not sanitise and escape the nd_donations_id parameter before using it in a SQL statement via the nd_donations_single_cause_form_validate_fields_php_function AJAX action (available to unauthenticated users), leading to an unauthenticated SQL Injection
CVE-2022-22954 2 Linux, Vmware 6 Linux Kernel, Cloud Foundation, Identity Manager and 3 more 2022-05-03 10.0 HIGH 9.8 CRITICAL
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
CVE-2020-36381 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-36380 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-36379 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-36378 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-36377 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-36376 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
CVE-2020-26707 1 Aaptjs Project 1 Aaptjs 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the add function in Shenzhim AAPTJS 1.3.1 which allows attackers to execute arbitrary code via the filePath parameter.
CVE-2020-26772 1 Ppgo Jobs Project 1 Ppgo Jobs 2022-05-03 7.5 HIGH 9.8 CRITICAL
Command Injection in PPGo_Jobs v2.8.0 allows remote attackers to execute arbitrary code via the 'AjaxRun()' function.
CVE-2021-32071 1 Mitel 1 Micollab 2022-05-03 7.5 HIGH 9.8 CRITICAL
The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users.
CVE-2021-31698 1 Quectel 2 Eg25-g, Eg25-g Firmware 2022-05-03 10.0 HIGH 9.8 CRITICAL
Quectel EG25-G devices through 202006130814 allow executing arbitrary code remotely by using an AT command to place shell metacharacters in quectel_handle_fumo_cfg input in atfwd_daemon.
CVE-2021-38568 1 Foxitsoftware 2 Foxit Reader, Phantompdf 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows memory corruption during conversion of a PDF document to a different document format.
CVE-2021-34166 1 Simple Food Website Project 1 Simple Food Website 2022-05-03 7.5 HIGH 9.8 CRITICAL
A SQL INJECTION vulnerability in Sourcecodester Simple Food Website 1.0 allows a remote attacker to Bypass Authentication and become Admin.
CVE-2020-21935 1 Motorola 2 Cx2, Cx2 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
A command injection vulnerability in HNAP1/GetNetworkTomographySettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary code.
CVE-2021-33911 1 Zohocorp 1 Manageengine Admanager Plus 2022-05-03 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine ADManager Plus before 7110 allows remote code execution.
CVE-2021-36124 1 Echobh 1 Sharecare 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Echo ShareCare 8.15.5. It does not perform authentication or authorization checks when accessing a subset of sensitive resources, leading to the ability for unauthenticated users to access pages that are vulnerable to attacks such as SQL injection.
CVE-2020-11176 1 Qualcomm 198 Apq8017, Apq8017 Firmware, Apq8053 and 195 more 2022-05-03 10.0 HIGH 9.8 CRITICAL
While processing server certificate from IPSec server, certificate validation for subject alternative name API can cause heap overflow which can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile
CVE-2020-11182 1 Qualcomm 536 Aqt1000, Aqt1000 Firmware, Pm3003a and 533 more 2022-05-03 10.0 HIGH 9.8 CRITICAL
Possible heap overflow while parsing NAL header due to lack of check of length of data received from user in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CVE-2021-33590 1 Labapart 1 Gattlib 2022-05-03 7.5 HIGH 9.8 CRITICAL
GattLib 0.3-rc1 has a stack-based buffer over-read in get_device_path_from_mac in dbus/gattlib.c.
CVE-2021-30190 1 Codesys 1 V2 Web Server 2022-05-03 7.5 HIGH 9.8 CRITICAL
CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.
CVE-2021-33026 1 Flask-caching Project 1 Flask-caching 2022-05-03 7.5 HIGH 9.8 CRITICAL
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code.
CVE-2020-4979 1 Ibm 1 Qradar Security Information And Event Manager 2022-05-03 7.5 HIGH 9.8 CRITICAL
IBM QRadar SIEM 7.3 and 7.4 is vulnerable to insecure inter-deployment communication. An attacker that is able to comprimise or spoof traffic between hosts may be able to execute arbitrary commands. IBM X-Force D: 192538.
CVE-2021-29369 1 Gnuplot Project 1 Gnuplot 2022-05-03 7.5 HIGH 9.8 CRITICAL
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
CVE-2021-30234 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRIGMP/set_MLD_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the MLD_PROXY_WAN_CONNECT parameter.
CVE-2021-30233 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRIptv/setIptvInfo interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iptv_vlan parameter.
CVE-2021-30232 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRIGMP/set_IGMP_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the IGMP_PROXY_WAN_CONNECT parameter.
CVE-2021-30231 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/zrDm/set_ZRElink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the bssaddr, abiaddr, devtoken, devid, elinksync, or elink_proc_enable parameter.
CVE-2021-30230 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRFirmware/set_time_zone interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the zonename parameter.
CVE-2021-30228 1 Chinamobile 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter.
CVE-2021-25216 4 Debian, Isc, Netapp and 1 more 23 Debian Linux, Bind, Active Iq Unified Manager and 20 more 2022-05-03 6.8 MEDIUM 9.8 CRITICAL
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
CVE-2021-29003 1 Genexis 2 Platinum 4410, Platinum 4410 Firmware 2022-05-03 7.5 HIGH 9.8 CRITICAL
Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
CVE-2020-35308 1 Conquest Dicom Server Project 1 Conquest Dicom Server 2022-05-03 7.5 HIGH 9.8 CRITICAL
CONQUEST DICOM SERVER before 1.5.0 has a code execution vulnerability which can be exploited by attackers to execute malicious code.
CVE-2021-28033 1 Byte Struct Project 1 Byte Struct 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the byte_struct crate before 0.6.1 for Rust. There can be a drop of uninitialized memory if a certain deserialization method panics.
CVE-2021-27236 1 Mutare 1 Voice 2022-05-03 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. getfile.asp allows Unauthenticated Local File Inclusion, which can be leveraged to achieve Remote Code Execution.
CVE-2021-26753 1 Nedi 1 Nedi 2022-05-03 6.5 MEDIUM 9.9 CRITICAL
NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data.