Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-2099 1 Woocommerce 1 Woocommerce 2022-07-18 3.5 LOW 4.8 MEDIUM
The WooCommerce WordPress plugin before 6.6.0 is vulnerable to stored HTML injection due to lack of escaping and sanitizing in the payment gateway titles
CVE-2022-2090 1 Flycart 1 Discount Rules For Woocommerce 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The Discount Rules for WooCommerce WordPress plugin before 2.4.2 does not escape a parameter before outputting it back in an attribute of the plugin's discount rule page, leading to Reflected Cross-Site Scripting
CVE-2022-2092 1 Wpovernight 1 Woocommerce Pdf Invoices\& Packing Slips 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 2.16.0 doesn't escape a parameter on its setting page, making it possible for attackers to conduct reflected cross-site scripting attacks.
CVE-2022-1933 1 Collect And Deliver Interface For Woocommerce Project 1 Collect And Deliver Interface For Woocommerce 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The CDI WordPress plugin before 5.1.9 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting
CVE-2020-4138 1 Ibm 1 Security Siteprotector System 2022-07-18 2.1 LOW 5.5 MEDIUM
IBM SiteProtector Appliance 3.1.1 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 174049.
CVE-2022-32406 1 Gtkradiant Project 1 Gtkradiant 2022-07-18 4.3 MEDIUM 5.5 MEDIUM
GtkRadiant v1.6.6 was discovered to contain a buffer overflow via the component q3map2. This vulnerability can cause a Denial of Service (DoS) via a crafted MAP file.
CVE-2022-2091 1 Cache Images Project 1 Cache Images 2022-07-18 4.3 MEDIUM 6.5 MEDIUM
The Cache Images WordPress plugin before 3.2.1 does not implement nonce checks, which could allow attackers to make any logged user upload images via a CSRF attack.
CVE-2022-32318 1 Fast Food Ordering System Project 1 Fast Food Ordering System 2022-07-18 3.5 LOW 5.4 MEDIUM
Fast Food Ordering System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via the component /ffos/classes/Master.php?f=save_category.
CVE-2022-2146 1 Import Csv Files Project 1 Import Csv Files 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The Import CSV Files WordPress plugin through 1.0 does not sanitise and escaped imported data before outputting them back in a page, and is lacking CSRF check when performing such action as well, resulting in a Reflected Cross-Site Scripting
CVE-2022-2144 1 Jquery Validation For Contact Form 7 Project 1 Jquery Validation For Contact Form 7 2022-07-18 4.3 MEDIUM 4.3 MEDIUM
The Jquery Validation For Contact Form 7 WordPress plugin before 5.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change Blog options like default_role, users_can_register via a CSRF attack
CVE-2022-2133 1 Miniorange 1 Oauth Single Sign On 2022-07-18 5.0 MEDIUM 5.3 MEDIUM
The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.
CVE-2022-2118 1 Tooltulips 1 404s 2022-07-18 3.5 LOW 4.8 MEDIUM
The 404s WordPress plugin before 3.5.1 does not sanitise and escape its fields, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2114 1 Supsystic 1 Data Tables Generator 2022-07-18 3.5 LOW 4.8 MEDIUM
The Data Tables Generator by Supsystic WordPress plugin before 1.10.20 does not sanitise and escape some of its Table settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
CVE-2022-2169 1 Dwbooster 1 Loading Page With Loading Screen 2022-07-18 3.5 LOW 4.8 MEDIUM
The Loading Page with Loading Screen WordPress plugin before 1.0.83 does not escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2168 1 Wpdownloadmanager 1 Download Manager 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The Download Manager WordPress plugin before 3.2.44 does not escape a generated URL before outputting it back in an attribute of the history dashboard, leading to Reflected Cross-Site Scripting
CVE-2022-2151 1 Emarketdesign 1 Best Contact Management Software 2022-07-18 3.5 LOW 4.8 MEDIUM
The Best Contact Management Software WordPress plugin through 3.7.3 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2149 1 Very Simple Breadcrumb Project 1 Very Simple Breadcrumb 2022-07-18 3.5 LOW 4.8 MEDIUM
The Very Simple Breadcrumb WordPress plugin through 1.0 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2148 1 Linkedin Company Updates Project 1 Linkedin Company Updates 2022-07-18 3.5 LOW 4.8 MEDIUM
The LinkedIn Company Updates WordPress plugin through 1.5.3 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2194 1 Tipsandtricks-hq 1 Accept Stripe 2022-07-18 3.5 LOW 4.8 MEDIUM
The Accept Stripe Payments WordPress plugin before 2.0.64 does not sanitize and escape some of its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2187 1 Contact Form 7 Captcha Project 1 Contact Form 7 Captcha 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
CVE-2022-2186 1 Bracketspace 1 Simple Post Notes 2022-07-18 3.5 LOW 4.8 MEDIUM
The Simple Post Notes WordPress plugin before 1.7.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2022-2173 1 Sigmaplugin 1 Advanced Database Cleaner 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
The Advanced Database Cleaner WordPress plugin before 3.1.1 does not escape numerous generated URLs before outputting them back in href attributes of admin dashboard pages, leading to Reflected Cross-Site Scripting
CVE-2022-35224 1 Sap 1 Enterprise Portal 2022-07-18 4.3 MEDIUM 6.1 MEDIUM
SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can be used to non-permanently deface or modify portal content. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim?s web browser session.
CVE-2020-35437 1 Intelliants 1 Subrion Cms 2022-07-17 4.3 MEDIUM 6.1 MEDIUM
Subrion CMS 4.2.1 is affected by: Cross Site Scripting (XSS) through the avatar[path] parameter in a POST request to the /_core/profile/ URI.
CVE-2020-15364 1 Nexos Project 1 Nexos 2022-07-17 4.3 MEDIUM 6.1 MEDIUM
The Nexos theme through 1.7 for WordPress allows top-map/?search_location= reflected XSS.
CVE-2022-31080 1 Linuxfoundation 1 Kubeedge 2022-07-16 4.0 MEDIUM 6.5 MEDIUM
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, a large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a WSClient will be in a denial of service. The software is affected If users who are authenticated to the edge side connect to `cloudhub` from the edge side through WebSocket protocol. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There are currently no known workarounds.
CVE-2022-31079 1 Linuxfoundation 1 Kubeedge 2022-07-16 3.5 LOW 6.5 MEDIUM
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, the Cloud Stream server and the Edge Stream server reads the entire message into memory without imposing a limit on the size of this message. An attacker can exploit this by sending a large message to exhaust memory and cause a DoS. The Cloud Stream server and the Edge Stream server are under DoS attack in this case. The consequence of the exhaustion is that the CloudCore and EdgeCore will be in a denial of service. Only an authenticated user can cause this issue. It will be affected only when users enable `cloudStream` module in the config file `cloudcore.yaml` and enable `edgeStream` module in the config file `edgecore.yaml`. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. As a workaround, disable cloudStream module in the config file `cloudcore.yaml` and disable edgeStream module in the config file `edgecore.yaml`.
CVE-2022-31078 1 Linuxfoundation 1 Kubeedge 2022-07-16 3.5 LOW 6.5 MEDIUM
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, the CloudCore Router does not impose a limit on the size of responses to requests made by the REST handler. An attacker could use this weakness to make a request that will return an HTTP response with a large body and cause DoS of CloudCore. In the HTTP Handler API, the rest handler makes a request to a pre-specified handle. The handle will return an HTTP response that is then read into memory. The consequence of the exhaustion is that CloudCore will be in a denial of service. Only an authenticated user of the cloud can make an attack. It will be affected only when users enable `router` module in the config file `cloudcore.yaml`. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. As a workaround, disable the router switch in the config file `cloudcore.yaml`.
CVE-2022-31075 1 Linuxfoundation 1 Kubeedge 2022-07-16 3.5 LOW 6.5 MEDIUM
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, EdgeCore may be susceptible to a DoS attack on CloudHub if an attacker was to send a well-crafted HTTP request to `/edge.crt`. If an attacker can send a well-crafted HTTP request to CloudHub, and that request has a very large body, that request can crash the HTTP service through a memory exhaustion vector. The request body is being read into memory, and a body that is larger than the available memory can lead to a successful attack. Because the request would have to make it through authorization, only authorized users may perform this attack. The consequence of the exhaustion is that CloudHub will be in denial of service. KubeEdge is affected only when users enable the CloudHub module in the file `cloudcore.yaml`. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. As a workaround, disable the CloudHub switch in the config file `cloudcore.yaml`.
CVE-2022-31074 1 Linuxfoundation 1 Kubeedge 2022-07-16 4.0 MEDIUM 6.5 MEDIUM
KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, several endpoints in the Cloud AdmissionController may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it. The consequence of the exhaustion is that the Cloud AdmissionController will be in denial of service. This bug has been fixed in Kubeedge 1.11.1, 1.10.2, and 1.9.4. There is currently no known workaround.
CVE-2022-22023 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-07-16 6.9 MEDIUM 6.6 MEDIUM
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability.
CVE-2022-2363 1 Simple Parking Management System Project 1 Simple Parking Management System 2022-07-16 3.5 LOW 4.6 MEDIUM
A vulnerability, which was classified as problematic, has been found in SourceCodester Simple Parking Management System 1.0. Affected by this issue is some unknown functionality of the file /ci_spms/admin/search/searching/. The manipulation of the argument search with the input "><script>alert("XSS")</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2022-2364 1 Simple Parking Management System Project 1 Simple Parking Management System 2022-07-16 3.5 LOW 5.4 MEDIUM
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Parking Management System 1.0. This affects an unknown part of the file /ci_spms/admin/category. The manipulation of the argument vehicle_type with the input "><script>alert("XSS")</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2021-39041 1 Ibm 1 Qradar Security Information And Event Manager 2022-07-16 5.0 MEDIUM 5.3 MEDIUM
IBM QRadar SIEM 7.3, 7.4, and 7.5 may be vulnerable to partial denial of service attack, resulting in some protocols not listening to specified ports. IBM X-Force ID: 214028.
CVE-2022-29619 1 Sap 1 Businessobjects Business Intelligence Platform 2022-07-16 5.5 MEDIUM 6.5 MEDIUM
Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 allows user Administrator to view, edit or modify rights of objects it doesn't own and which would otherwise be restricted.
CVE-2022-31598 1 Sap 1 Business Objects Business Intelligence Platform 2022-07-16 4.9 MEDIUM 5.4 MEDIUM
Due to insufficient input validation, SAP Business Objects - version 420, allows an authenticated attacker to submit a malicious request through an allowed operation. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
CVE-2022-31592 1 Sap 1 Enterprise Extension Defense Forces \& Public Security 2022-07-16 4.0 MEDIUM 4.3 MEDIUM
The application SAP Enterprise Extension Defense Forces & Public Security - versions 605, 606, 616,617,618, 802, 803, 804, 805, 806, does not perform necessary authorization checks for an authenticated user over the network, resulting in escalation of privileges leading to a limited impact on confidentiality.
CVE-2022-31654 1 Vmware 1 Vrealize Log Insight 2022-07-16 3.5 LOW 5.4 MEDIUM
VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in configurations.
CVE-2022-31655 1 Vmware 1 Vrealize Log Insight 2022-07-16 3.5 LOW 5.4 MEDIUM
VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in alerts.
CVE-2022-32115 1 Withknown 1 Known 2022-07-15 4.3 MEDIUM 6.1 MEDIUM
An issue in the isSVG() function of Known v1.2.2+2020061101 allows attackers to execute arbitrary code via a crafted SVG file.
CVE-2022-31290 1 Withknown 1 Known 2022-07-15 3.5 LOW 5.4 MEDIUM
A cross-site scripting (XSS) vulnerability in Known v1.2.2+2020061101 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Your Name text field.
CVE-2022-30852 1 Withknown 1 Known 2022-07-15 4.0 MEDIUM 4.3 MEDIUM
Known v1.3.1 was discovered to contain an Insecure Direct Object Reference (IDOR).
CVE-2022-2089 1 Bold-themes 1 Bold Page Builder 2022-07-15 3.5 LOW 4.8 MEDIUM
The Bold Page Builder WordPress plugin before 4.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
CVE-2022-2093 1 Ninjateam 1 Wp Duplicate Page 2022-07-15 3.5 LOW 4.8 MEDIUM
The WP Duplicate Page WordPress plugin before 1.3 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
CVE-2022-2123 1 Wp Opt-in Project 1 Wp Opt-in 2022-07-15 4.3 MEDIUM 4.3 MEDIUM
The WP Opt-in WordPress plugin through 1.4.1 is vulnerable to CSRF which allows changed plugin settings and can be used for sending spam emails.
CVE-2022-2050 1 Maxfoundry 1 Wp-paginate 2022-07-15 3.5 LOW 4.8 MEDIUM
The WP-Paginate WordPress plugin before 2.1.9 does not escape one of its settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when unfiltered_html is disallowed
CVE-2021-3695 3 Fedoraproject, Gnu, Redhat 13 Fedora, Grub, Codeready Linux Builder and 10 more 2022-07-15 4.4 MEDIUM 4.5 MEDIUM
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results, also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.
CVE-2021-3696 2 Gnu, Redhat 12 Grub, Codeready Linux Builder, Developer Tools and 9 more 2022-07-15 6.9 MEDIUM 4.5 MEDIUM
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
CVE-2022-1957 1 Comment License Project 1 Comment License 2022-07-15 4.3 MEDIUM 4.3 MEDIUM
The Comment License WordPress plugin before 1.4.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
CVE-2022-1956 1 Shortcut Macros Project 1 Shortcut Macros 2022-07-15 4.0 MEDIUM 6.5 MEDIUM
The Shortcut Macros WordPress plugin through 1.3 does not have authorisation and CSRF checks in place when updating its settings, which could allow any authenticated users, such as subscriber, to update them.