Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23067 1 Tooljet 1 Tooljet 2022-05-26 6.8 MEDIUM 8.8 HIGH
ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.
CVE-2022-22009 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2016 and 1 more 2022-05-26 4.4 MEDIUM 7.8 HIGH
Windows Hyper-V Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22008, CVE-2022-23257, CVE-2022-24537.
CVE-2022-30948 1 Jenkins 3 Git, Mercurial, Repo 2022-05-26 5.0 MEDIUM 7.5 HIGH
Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
CVE-2022-29586 1 Konicaminolta 90 Bizhub 226i, Bizhub 226i Firmware, Bizhub 227 and 87 more 2022-05-26 6.9 MEDIUM 7.4 HIGH
Konica Minolta bizhub MFP devices before 2022-04-14 allow a Sandbox Escape. An attacker must attach a keyboard to a USB port, press F12, and then escape from the kiosk mode.
CVE-2021-30873 1 Apple 1 Macos 2022-05-26 6.8 MEDIUM 7.8 HIGH
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. A malicious application may be able to elevate privileges.
CVE-2021-30935 1 Apple 2 Mac Os X, Macos 2022-05-26 8.3 HIGH 8.8 HIGH
A logic issue was addressed with improved validation. This issue is fixed in Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. An application may be able to execute arbitrary code with kernel privileges.
CVE-2021-30903 1 Apple 3 Ipad Os, Iphone Os, Macos 2022-05-26 4.6 MEDIUM 7.8 HIGH
This issue was addressed with improved checks. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1. A local attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2021-30906 1 Apple 5 Ipad Os, Iphone Os, Macos and 2 more 2022-05-26 4.6 MEDIUM 7.8 HIGH
This issue was addressed with improved checks. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. A local attacker may be able to elevate their privileges.
CVE-2020-9941 1 Apple 5 Ipad Os, Iphone Os, Mac Os X and 2 more 2022-05-25 5.0 MEDIUM 7.5 HIGH
This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. A remote attacker may be able to unexpectedly alter application state.
CVE-2022-30697 1 Acronis 1 Snap Deploy 2022-05-24 4.6 MEDIUM 7.8 HIGH
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 3640
CVE-2022-30708 1 Webmin 1 Webmin 2022-05-24 6.5 MEDIUM 8.8 HIGH
Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.
CVE-2020-9992 1 Apple 3 Ipad Os, Iphone Os, Xcode 2022-05-24 9.3 HIGH 7.8 HIGH
This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. This issue is fixed in iOS 14.0 and iPadOS 14.0, Xcode 12.0. An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network.
CVE-2021-27358 2 Grafana, Netapp 2 Grafana, E-series Performance Analyzer 2022-05-23 5.0 MEDIUM 7.5 HIGH
The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
CVE-2021-27516 1 Urijs Project 1 Urijs 2022-05-23 5.0 MEDIUM 7.5 HIGH
URI.js (aka urijs) before 1.19.6 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
CVE-2021-27803 3 Debian, Fedoraproject, W1.fi 3 Debian Linux, Fedora, Wpa Supplicant 2022-05-23 5.4 MEDIUM 7.5 HIGH
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
CVE-2021-23972 1 Mozilla 1 Firefox 2022-05-23 6.8 MEDIUM 8.8 HIGH
One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.
CVE-2021-46787 1 Huawei 3 Emui, Harmonyos, Magic Ui 2022-05-23 5.0 MEDIUM 7.5 HIGH
The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash.
CVE-2021-46788 1 Huawei 2 Emui, Magic Ui 2022-05-23 5.0 MEDIUM 7.5 HIGH
Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations.
CVE-2022-29789 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services.
CVE-2022-22261 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services.
CVE-2022-29791 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services.
CVE-2022-29790 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions.
CVE-2022-29792 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality.
CVE-2022-29796 1 Huawei 2 Emui, Harmonyos 2022-05-23 5.0 MEDIUM 7.5 HIGH
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services.
CVE-2021-43234 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-05-23 6.8 MEDIUM 7.8 HIGH
Windows Fax Service Remote Code Execution Vulnerability
CVE-2022-24507 1 Microsoft 6 Windows 10, Windows 11, Windows Server and 3 more 2022-05-23 4.6 MEDIUM 7.8 HIGH
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
CVE-2018-8202 1 Microsoft 9 .net Framework, Windows 10, Windows 7 and 6 more 2022-05-23 7.2 HIGH 7.8 HIGH
An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level, aka ".NET Framework Elevation of Privilege Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2.
CVE-2022-21984 1 Microsoft 3 Windows 10, Windows 11, Windows Server 2022-05-23 6.0 MEDIUM 8.8 HIGH
Windows DNS Server Remote Code Execution Vulnerability.
CVE-2022-23294 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2022-05-23 6.5 MEDIUM 8.8 HIGH
Windows Event Tracing Remote Code Execution Vulnerability.
CVE-2022-24508 1 Microsoft 4 Windows 10, Windows 11, Windows Server and 1 more 2022-05-23 6.5 MEDIUM 8.8 HIGH
Windows SMBv3 Client/Server Remote Code Execution Vulnerability.
CVE-2022-21974 1 Microsoft 5 Windows 10, Windows 11, Windows Server and 2 more 2022-05-23 9.3 HIGH 7.8 HIGH
Roaming Security Rights Management Services Remote Code Execution Vulnerability.
CVE-2018-0825 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2022-05-23 7.6 HIGH 7.5 HIGH
StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka "StructuredQuery Remote Code Execution Vulnerability".
CVE-2017-11788 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2022-05-23 5.0 MEDIUM 7.5 HIGH
Windows Search in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows server, version 1709 allows an unauthenticated attacker to remotely send specially crafted messages that could cause a denial of service against the system due to improperly handing objects in memory, aka "Windows Search Denial of Service Vulnerability".
CVE-2022-21995 1 Microsoft 5 Windows 10, Windows 11, Windows Server and 2 more 2022-05-23 6.8 MEDIUM 7.9 HIGH
Windows Hyper-V Remote Code Execution Vulnerability.
CVE-2018-0902 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2016 2022-05-23 4.6 MEDIUM 7.8 HIGH
The Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) in Windows 10 Gold, 1511, 1607, 1703, and 1709. Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to the way the kernel-mode driver validates and enforces impersonation levels, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0884.
CVE-2022-21992 1 Microsoft 5 Windows 10, Windows 11, Windows Server and 2 more 2022-05-23 9.3 HIGH 7.8 HIGH
Windows Mobile Device Management Remote Code Execution Vulnerability.
CVE-2022-21990 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-05-23 6.8 MEDIUM 8.8 HIGH
Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23285.
CVE-2018-0881 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2022-05-23 6.9 MEDIUM 7.0 HIGH
The Microsoft Video Control in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege due to how objects are handled in memory, aka "Microsoft Video Control Elevation of Privilege Vulnerability".
CVE-2018-8350 1 Microsoft 2 Windows 10, Windows Server 2022-05-23 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.
CVE-2018-0880 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2016 2022-05-23 6.9 MEDIUM 7.0 HIGH
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882.
CVE-2018-0877 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2016 2022-05-23 7.2 HIGH 7.8 HIGH
The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability".
CVE-2018-0884 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2016 2022-05-23 4.6 MEDIUM 7.8 HIGH
Windows Scripting Host (WSH) in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to how objects are handled in memory, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0902.
CVE-2018-0883 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2022-05-23 7.6 HIGH 7.5 HIGH
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how file copy destinations are validated, aka "Windows Shell Remote Code Execution Vulnerability".
CVE-2018-0882 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2016 2022-05-23 6.9 MEDIUM 7.0 HIGH
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880.
CVE-2022-28872 1 F-secure 1 Safe 2022-05-23 6.8 MEDIUM 8.8 HIGH
A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop.
CVE-2022-26110 1 Wisc 1 Htcondor 2022-05-23 6.5 MEDIUM 8.8 HIGH
An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.
CVE-2021-28789 1 Apple-swift-format Project 1 Apple-swift-format 2022-05-20 6.8 MEDIUM 7.8 HIGH
The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing a malicious workspace with a crafted apple-swift-format.path configuration value that triggers execution upon opening the workspace.
CVE-2021-28956 1 Sass Lint Project 1 Sass Lint 2022-05-20 6.8 MEDIUM 8.8 HIGH
** UNSUPPORTED WHEN ASSIGNED ** The unofficial vscode-sass-lint (aka Sass Lint) extension through 1.0.7 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2022-30060 1 Ftcms 1 Ftcms 2022-05-20 6.5 MEDIUM 8.8 HIGH
ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Write via admin/controllers/tp.php
CVE-2019-13939 1 Siemens 20 Apogee Modular Building Controller, Apogee Modular Building Controller Firmware, Apogee Modular Equiment Controller and 17 more 2022-05-20 4.8 MEDIUM 7.1 HIGH
A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Series (BACnet) (All versions < V3.5.3), APOGEE PXC Series (P2) (All versions >= V2.8.2 and < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC100-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC12-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC22-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC22.1-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC36.1-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC50-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3x and < V6.00.327), Nucleus NET (All versions), Nucleus RTOS (All versions), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2017.02.2 with patch "Nucleus 2017.02.02 Nucleus NET Patch"), Nucleus SafetyCert (All versions), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Series (BACnet) (All versions < V3.5.3), VSTAR (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. The vulnerability could affect availability and integrity of the device. Adjacent network access is required, but no authentication and no user interaction is needed to conduct an attack.