Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30830 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\feature_edit.php.
CVE-2022-31970 1 Chatbot App With Suggestion Project 1 Chatbot App With Suggestion 2022-06-10 6.5 MEDIUM 7.2 HIGH
ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=responses/manage_response&id=.
CVE-2022-30829 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\users_edit.php.
CVE-2022-30833 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via /Wedding-Management/admin/client_edit.php?booking=31&user_id=.
CVE-2021-44519 1 Citrix 1 Xenmobile Server 2022-06-10 6.0 MEDIUM 8.8 HIGH
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Directory Traversal vulnerability, leading to remote code execution.
CVE-2022-30836 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection. via Wedding-Management/admin/select.php.
CVE-2022-30828 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\photos_edit.php.
CVE-2022-30827 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\package_edit.php.
CVE-2022-30826 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via admin\client_assign.php.
CVE-2022-30820 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 8.8 HIGH
In Wedding Management v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "users_edit.php" file.
CVE-2022-30819 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 8.8 HIGH
In Wedding Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "photos_edit.php" file.
CVE-2022-30818 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL injection via /Wedding-Management/admin/blog_events_edit.php?id=31.
CVE-2022-30821 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 8.8 HIGH
In Wedding Management System v1.0, the editing function of the "Services" module in the background management system has an arbitrary file upload vulnerability in the picture upload point of "package_edit.php" file.
CVE-2022-30822 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 8.8 HIGH
In Wedding Management System v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "users_profile.php" file.
CVE-2022-30825 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\client_edit.php.
CVE-2022-30823 1 Wedding Management System Project 1 Wedding Management System 2022-06-10 6.5 MEDIUM 7.2 HIGH
Wedding Management System v1.0 is vulnerable to SQL Injection via \admin\blog_events_edit.php.
CVE-2022-29725 1 Creatiwity 1 Witycms 2022-06-10 6.5 MEDIUM 8.8 HIGH
An arbitrary file upload in the image upload component of wityCMS v0.6.2 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-31005 1 Vapor 1 Vapor 2022-06-10 5.0 MEDIUM 7.5 HIGH
Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware enabled are vulnerable to an integer overflow vulnerability that can crash the application. Version 4.60.3 contains a patch for this issue. As a workaround, disable FileMiddleware and serve via a Content Delivery Network.
CVE-2022-31007 1 Elabftw 1 Elabftw 2022-06-10 6.5 MEDIUM 7.2 HIGH
eLabFTW is an electronic lab notebook manager for research teams. Prior to version 4.3.0, a vulnerability allows an authenticated user with an administrator role in a team to assign itself system administrator privileges within the application, or create a new system administrator account. The issue has been corrected in eLabFTW version 4.3.0. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A system administrator account can manage all accounts, teams and edit system-wide settings within the application. The impact is not deemed as high, as it requires the attacker to have access to an administrator account. Regular user accounts cannot exploit this to gain admin rights. A workaround for one if the issues is removing the ability of administrators to create accounts.
CVE-2022-31011 1 Pingcap 1 Tidb 2022-06-10 4.6 MEDIUM 7.8 HIGH
TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. TiDB version 5.3.1 contains a patch for this issue. Other mitigation strategies include turning off Security Enhanced Mode (SEM), disabling local login for non-root accounts, and ensuring that the same IP cannot be logged in as root and normal user at the same time.
CVE-2022-30540 1 Hornerautomation 1 Cscape 2022-06-10 6.8 MEDIUM 7.8 HIGH
The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code
CVE-2020-36403 2 Htslib, Linux 2 Htslib, Linux Kernel 2022-06-10 6.8 MEDIUM 8.8 HIGH
HTSlib through 1.10.2 allows out-of-bounds write access in vcf_parse_format (called from vcf_parse and vcf_read).
CVE-2022-30425 1 Tenda 2 Hg6, Hg6 Firmware 2022-06-10 9.0 HIGH 8.8 HIGH
Tenda Technology Co.,Ltd HG6 3.3.0-210926 was discovered to contain a command injection vulnerability via the pingAddr and traceAddr parameters. This vulnerability is exploited via a crafted POST request.
CVE-2022-29735 1 Deltacontrols 2 Entelitouch, Entelitouch Firmware 2022-06-10 6.8 MEDIUM 8.8 HIGH
Delta Controls enteliTOUCH 3.40.3935, 3.40.3706, and 3.33.4005 allows attackers to execute arbitrary commands via a crafted HTTP request.
CVE-2022-23082 1 Mend 1 Curekit 2022-06-10 5.0 MEDIUM 7.5 HIGH
In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.
CVE-2022-1808 1 Trudesk Project 1 Trudesk 2022-06-10 6.5 MEDIUM 8.8 HIGH
Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.
CVE-2022-29692 1 Unicorn-engine 1 Unicorn Engine 2022-06-09 6.8 MEDIUM 7.8 HIGH
Unicorn Engine v1.0.3 was discovered to contain a use-after-free vulnerability via the hook function.
CVE-2022-29693 1 Unicorn-engine 1 Unicorn Engine 2022-06-09 5.0 MEDIUM 7.5 HIGH
Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.
CVE-2022-27184 1 Hornerautomation 1 Cscape 2022-06-09 6.8 MEDIUM 7.8 HIGH
The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.
CVE-2022-29647 1 Mingsoft 1 Mcms 2022-06-09 6.8 MEDIUM 8.8 HIGH
An issue was discovered in MCMS 5.2.7. There is a CSRF vulnerability that can add an administrator account via ms/basic/manager/save.do.
CVE-2022-1661 1 Keysight 4 N6841a Rf, N6841a Rf Firmware, N6854a and 1 more 2022-06-09 5.0 MEDIUM 7.5 HIGH
The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.
CVE-2022-22576 1 Haxx 1 Curl 2022-06-09 5.5 MEDIUM 8.1 HIGH
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
CVE-2021-25746 1 Kubernetes 1 Ingress-nginx 2022-06-09 5.5 MEDIUM 7.1 HIGH
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use .metadata.annotations in an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
CVE-2021-25745 1 Kubernetes 1 Ingress-nginx 2022-06-09 5.5 MEDIUM 8.1 HIGH
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
CVE-2022-24857 1 Django-mfa3 Project 1 Django-mfa3 2022-06-09 6.5 MEDIUM 8.8 HIGH
django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. The issue has been fixed in django-mfa3 0.5.0. It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL)
CVE-2021-32040 1 Mongodb 1 Mongodb 2022-06-09 5.0 MEDIUM 7.5 HIGH
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the size of the stack frames used by that stage. If an attacker could cause such an aggregation to occur, they could maliciously crash MongoDB in a DoS attack. This vulnerability affects MongoDB versions prior to 5.0.4, 4.4.11, 4.2.16.
CVE-2021-44080 1 Sercomm 2 H500s, H500s Firmware 2022-06-09 9.0 HIGH 7.2 HIGH
A Command Injection vulnerability in httpd web server (setup.cgi) in SerComm h500s, FW: lowi-h500s-v3.4.22 allows logged in administrators to arbitrary OS commands as root in the device via the connection_type parameter of the statussupport_diagnostic_tracing.json endpoint.
CVE-2022-26975 1 Barco 1 Control Room Management Suite 2022-06-09 5.0 MEDIUM 7.5 HIGH
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing log files without authentication.
CVE-2021-43308 1 Markdown-link-extractor Project 1 Markdown-link-extractor 2022-06-09 5.0 MEDIUM 7.5 HIGH
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function
CVE-2021-43307 1 Semver-regex Project 1 Semver-regex 2022-06-09 5.0 MEDIUM 7.5 HIGH
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the semver-regex npm package, when an attacker is able to supply arbitrary input to the test() method
CVE-2021-34083 1 Google-it Project 1 Google-it 2022-06-09 9.3 HIGH 8.1 HIGH
Google-it is a Node.js package which allows its users to send search queries to Google and receive the results in a JSON format. When using the 'Open in browser' option in versions up to 1.6.2, google-it will unsafely concat the result's link retrieved from google to a shell command, potentially exposing the server to RCE.
CVE-2021-34081 1 Gitsome Project 1 Gitsome 2022-06-09 9.3 HIGH 8.8 HIGH
OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.
CVE-2021-43306 1 Jqueryvalidation 1 Jquery Validation 2022-06-09 5.0 MEDIUM 7.5 HIGH
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method
CVE-2021-34078 1 Adp 1 Lifion-verifiy-dependencies 2022-06-09 9.3 HIGH 8.8 HIGH
lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file.
CVE-2021-40186 1 Dnnsoftware 1 Dotnetnuke 2022-06-09 5.0 MEDIUM 7.5 HIGH
The AppCheck research team identified a Server-Side Request Forgery (SSRF) vulnerability within the DNN CMS platform, formerly known as DotNetNuke. SSRF vulnerabilities allow the attacker to exploit the target system to make network requests on their behalf, allowing a range of possible attacks. In the most common scenario, the attacker exploits SSRF vulnerabilities to attack systems behind the firewall and access sensitive information from Cloud Provider metadata services.
CVE-2021-26635 1 Bandisoft 1 Ark Library 2022-06-09 6.8 MEDIUM 7.8 HIGH
In the code that verifies the file size in the ark library, it is possible to manipulate the offset read from the target file due to the wrong use of the data type. An attacker could use this vulnerability to cause a stack buffer overflow and as a result, perform an attack such as remote code execution.
CVE-2022-23639 1 Crossbeam Project 1 Crossbeam 2022-06-09 6.8 MEDIUM 8.1 HIGH
crossbeam-utils provides atomics, synchronization primitives, scoped threads, and other utilities for concurrent programming in Rust. crossbeam-utils prior to version 0.8.7 incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause unaligned memory accesses and data race. Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. This has been fixed in crossbeam-utils 0.8.7. There are currently no known workarounds.
CVE-2021-3717 1 Redhat 4 Enterprise Linux, Jboss Enterprise Application Platform, Single Sign-on and 1 more 2022-06-09 4.6 MEDIUM 7.8 HIGH
A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This flaw affects wildfly-core versions prior to 17.0.
CVE-2022-22977 2 Microsoft, Vmware 2 Windows, Tools 2022-06-09 3.6 LOW 7.1 HIGH
VMware Tools for Windows(12.0.0, 11.x.y and 10.x.y) contains an XML External Entity (XXE) vulnerability. A malicious actor with non-administrative local user privileges in the Windows guest OS, where VMware Tools is installed, may exploit this issue leading to a denial-of-service condition or unintended information disclosure.
CVE-2021-42195 1 Swftools 1 Swftools 2022-06-09 6.8 MEDIUM 7.8 HIGH
An issue was discovered in swftools through 20201222. A heap-buffer-overflow exists in the function handleEditText() located in swfdump.c. It allows an attacker to cause code Execution.