Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23290 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-08-08 7.2 HIGH 7.8 HIGH
Windows Inking COM Elevation of Privilege Vulnerability
CVE-2022-23288 1 Microsoft 3 Windows 10, Windows Server, Windows Server 2019 2023-08-08 6.9 MEDIUM 7.0 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2022-23287 1 Microsoft 5 Windows 10, Windows 11, Windows Server and 2 more 2023-08-08 6.9 MEDIUM 7.0 HIGH
Windows ALPC Elevation of Privilege Vulnerability
CVE-2022-23286 1 Microsoft 4 Windows 10, Windows 11, Windows Server and 1 more 2023-08-08 6.9 MEDIUM 7.0 HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2022-23284 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2023-08-08 9.0 HIGH 7.2 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-22351 1 Ibm 2 Aix, Vios 2023-08-08 7.8 HIGH 8.6 HIGH
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396
CVE-2022-24921 3 Debian, Golang, Netapp 3 Debian Linux, Go, Astra Trident 2023-08-08 5.0 MEDIUM 7.5 HIGH
regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.
CVE-2022-23232 1 Netapp 1 Storagegrid 2023-08-08 4.0 MEDIUM 4.9 MEDIUM
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are susceptible to a vulnerability which when successfully exploited could allow disabled, expired, or locked external user accounts to access S3 data to which they previously had access. StorageGRID 11.6.0 obtains the user account status from Active Directory or Azure and will block S3 access for disabled user accounts during the subsequent background synchronization. User accounts that are expired or locked for Active Directory or Azure, or user accounts that are disabled, expired, or locked in identity sources other than Active Directory or Azure must be manually removed from group memberships or have their S3 keys manually removed from Tenant Manager in all versions of StorageGRID (formerly StorageGRID Webscale).
CVE-2022-25623 1 Symantec 1 Management Agent 2023-08-08 7.2 HIGH 7.8 HIGH
The Symantec Management Agent is susceptible to a privilege escalation vulnerability. A low privilege local account can be elevated to the SYSTEM level through registry manipulations.
CVE-2022-24447 1 Zohocorp 1 Manageengine Key Manager Plus 2023-08-08 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in Zoho ManageEngine Key Manager Plus before 6200. A service exposed by the application allows a user, with the level Operator, to access stored SSL certificates and associated key pairs during export.
CVE-2022-24305 1 Zohocorp 1 Manageengine Sharepoint Manager Plus 2023-08-08 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine SharePoint Manager Plus before 4329 is vulnerable to a sensitive data leak that leads to privilege escalation.
CVE-2022-25010 1 Stepmania 1 Stepmania 2023-08-08 6.4 MEDIUM 9.1 CRITICAL
The component /rootfs in RageFile of Stepmania v5.1b2 and below allows attackers access to the entire file system.
CVE-2022-22321 1 Ibm 1 Mq 2023-08-08 2.1 LOW 5.5 MEDIUM
IBM MQ Appliance 9.2 CD and 9.2 LTS local messaging users stored with a password hash that provides insufficient protection. IBM X-Force ID: 218368.
CVE-2022-24446 1 Zohocorp 1 Manageengine Key Manager Plus 2023-08-08 3.5 LOW 4.3 MEDIUM
An issue was discovered in Zoho ManageEngine Key Manager Plus 6.1.6. A user, with the level Operator, can see all SSH servers (and user information) even if no SSH server or user is associated to the operator.
CVE-2022-26157 1 Cherwell 1 Cherwell Service Management 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. The ASP.NET_Sessionid cookie is not protected by the Secure flag. This makes it prone to interception by an attacker if traffic is sent over unencrypted channels.
CVE-2022-26159 1 Ametys 1 Ametys 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.
CVE-2022-24986 1 Kde 1 Kcron 2023-08-08 4.6 MEDIUM 7.8 HIGH
KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.
CVE-2022-24442 1 Jetbrains 1 Youtrack 2023-08-08 7.5 HIGH 9.8 CRITICAL
JetBrains YouTrack before 2021.4.40426 was vulnerable to SSTI (Server-Side Template Injection) via FreeMarker templates.
CVE-2022-24336 1 Jetbrains 1 Teamcity 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
In JetBrains TeamCity before 2021.2.1, an unauthenticated attacker can cancel running builds via an XML-RPC request to the TeamCity server.
CVE-2022-24687 1 Hashicorp 1 Consul 2023-08-08 3.5 LOW 6.5 MEDIUM
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, and 1.11.2 clusters with at least one Ingress Gateway allow a user with service:write to register a specifically-defined service that can cause Consul servers to panic. Fixed in 1.9.15, 1.10.8, and 1.11.3.
CVE-2022-25809 1 Amazon 2 Echo Dot, Echo Dot Firmware 2023-08-08 9.0 HIGH 9.8 CRITICAL
Improper Neutralization of audio output from 3rd and 4th Generation Amazon Echo Dot devices allows arbitrary voice command execution on these devices via a malicious skill (in the case of remote attackers) or by pairing a malicious Bluetooth device (in the case of physically proximate attackers), aka an "Alexa versus Alexa (AvA)" attack.
CVE-2022-25643 1 Seatd Project 1 Seatd 2023-08-08 9.3 HIGH 9.8 CRITICAL
seatd-launch in seatd 0.6.x before 0.6.4 allows removing files with escalated privileges when installed setuid root. The attack vector is a user-supplied socket pathname.
CVE-2022-25402 1 Hospital Management System Project 1 Hospital Management System 2023-08-08 6.4 MEDIUM 9.1 CRITICAL
An incorrect access control issue in HMS v1.0 allows unauthenticated attackers to read and modify all PHP files.
CVE-2022-25363 1 Watchguard 1 Fireware 2023-08-08 4.0 MEDIUM 6.5 MEDIUM
WatchGuard Firebox and XTM appliances allow an authenticated remote attacker with unprivileged credentials to modify privileged management user credentials. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
CVE-2022-25355 1 Ec-cube 1 Ec-cube 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
EC-CUBE 3.0.0 to 3.0.18-p3 and EC-CUBE 4.0.0 to 4.1.1 improperly handle HTTP Host header values, which may lead a remote unauthenticated attacker to direct the vulnerable version of EC-CUBE to send an Email with some forged reissue-password URL to EC-CUBE users.
CVE-2022-21142 1 Appleple 1 A-blog Cms 2023-08-08 6.8 MEDIUM 9.8 CRITICAL
Authentication bypass vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.74, Ver.2.9.x series versions prior to Ver.2.9.39, Ver.2.10.x series versions prior to Ver.2.10.43, and Ver.2.11.x series versions prior to Ver.2.11.41 allows a remote unauthenticated attacker to bypass authentication under the specific condition.
CVE-2022-22308 1 Ibm 1 Planning Analytics 2023-08-08 6.8 MEDIUM 7.8 HIGH
IBM Planning Analytics 2.0 is vulnerable to a Remote File Include (RFI) attack. User input could be passed into file include commands and the web application could be tricked into including remote files with malicious code. IBM X-Force ID: 216891.
CVE-2022-25375 2 Debian, Linux 2 Debian Linux, Linux Kernel 2023-08-08 2.1 LOW 5.5 MEDIUM
An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.
CVE-2021-45081 1 Cobbler Project 1 Cobbler 2023-08-08 4.3 MEDIUM 5.9 MEDIUM
An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
CVE-2022-25366 1 Cryptomator 1 Cryptomator 2023-08-08 4.6 MEDIUM 7.8 HIGH
Cryptomator through 1.6.5 allows DYLIB injection because, although it has the flag 0x1000 for Hardened Runtime, it has the com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables entitlements. An attacker can exploit this by creating a malicious .dylib file that can be executed via the DYLD_INSERT_LIBRARIES environment variable.
CVE-2022-0543 2 Debian, Redis 2 Debian Linux, Redis 2023-08-08 10.0 HIGH 10.0 CRITICAL
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
CVE-2022-25335 1 Rigoblock 1 Drago 2023-08-08 5.0 MEDIUM 7.5 HIGH
RigoBlock Dragos through 2022-02-17 lacks the onlyOwner modifier for setMultipleAllowances. This enables token manipulation, as exploited in the wild in February 2022. NOTE: although 2022-02-17 is the vendor's vulnerability announcement date, the vulnerability will not be remediated until a major protocol upgrade occurs.
CVE-2022-25318 1 Cerebrate-project 1 Cerebrate 2023-08-08 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.
CVE-2022-25313 5 Debian, Fedoraproject, Libexpat Project and 2 more 6 Debian Linux, Fedora, Libexpat and 3 more 2023-08-08 4.3 MEDIUM 6.5 MEDIUM
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
CVE-2022-22922 1 Tp-link 2 Tl-wa850re, Tl-wa850re Firmware 2023-08-08 7.5 HIGH 9.8 CRITICAL
TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.
CVE-2022-23319 1 Pcf2bdf Project 1 Pcf2bdf 2023-08-08 4.3 MEDIUM 5.5 MEDIUM
A segmentation fault during PCF file parsing in pcf2bdf versions >=1.05 allows an attacker to trigger a program crash via a specially crafted PCF font file. This crash affects the availability of the software and dependent downstream components.
CVE-2022-22899 1 Coreftp 1 Core Ftp 2023-08-08 2.6 LOW 5.5 MEDIUM
Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.
CVE-2022-24953 1 Pear 1 Crypt Gpg 2023-08-08 5.0 MEDIUM 5.3 MEDIUM
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
CVE-2022-24684 1 Hashicorp 1 Nomad 2023-08-08 4.0 MEDIUM 6.5 MEDIUM
HashiCorp Nomad and Nomad Enterprise 0.9.0 through 1.0.16, 1.1.11, and 1.2.5 allow operators with job-submit capabilities to use the spread stanza to panic server agents. Fixed in 1.0.18, 1.1.12, and 1.2.6.
CVE-2022-23317 1 Helpsystems 1 Cobalt Strike 2023-08-08 5.0 MEDIUM 7.5 HIGH
CobaltStrike <=4.5 HTTP(S) listener does not determine whether the request URL begins with "/", and attackers can obtain relevant information by specifying the URL.
CVE-2022-23992 1 Broadcom 1 Xcom Data Transport 2023-08-08 10.0 HIGH 9.8 CRITICAL
XCOM Data Transport for Windows, Linux, and UNIX 11.6 releases contain a vulnerability due to insufficient input validation that could potentially allow remote attackers to execute arbitrary commands with elevated privileges.
CVE-2022-0582 3 Debian, Fedoraproject, Wireshark 3 Debian Linux, Fedora, Wireshark 2023-08-08 7.5 HIGH 9.8 CRITICAL
Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
CVE-2022-0581 3 Debian, Fedoraproject, Wireshark 3 Debian Linux, Fedora, Wireshark 2023-08-08 5.0 MEDIUM 7.5 HIGH
Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
CVE-2021-45421 1 Emerson 2 Dixell Xweb-500, Dixell Xweb-500 Firmware 2023-08-08 5.0 MEDIUM 7.5 HIGH
** UNSUPPORTED WHEN ASSIGNED ** Emerson Dixell XWEB-500 products are affected by information disclosure via directory listing. A potential attacker can use this misconfiguration to access all the files in the remote directories. Note: the product has not been supported since 2018 and should be removed or replaced.
CVE-2022-24110 1 Accellion 1 Managed File Transfer 2023-08-08 4.0 MEDIUM 6.5 MEDIUM
Kiteworks MFT 7.5 may allow an unauthorized user to reset other users' passwords. This is fixed in version 7.6 and later.
CVE-2022-0117 2 Fedoraproject, Google 2 Fedora, Chrome 2023-08-08 4.3 MEDIUM 6.5 MEDIUM
Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2022-0110 2 Fedoraproject, Google 2 Fedora, Chrome 2023-08-08 4.3 MEDIUM 4.3 MEDIUM
Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2021-4098 1 Google 1 Chrome 2023-08-08 4.3 MEDIUM 7.4 HIGH
Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CVE-2022-23853 1 Kde 2 Kate, Ktexteditor 2023-08-08 6.8 MEDIUM 7.8 HIGH
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.
CVE-2021-39676 1 Google 1 Android 2023-08-08 7.2 HIGH 7.8 HIGH
In writeThrowable of AndroidFuture.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-197228210