Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-30014 | Lumidek Associates Simple Food Website 1.0 is vulnerable to Cross Site Request Forgery (CSRF) which allows anyone to takeover admin/moderater account. | Unknown | N/A | n/a | |
CVE-2022-30015 | In Simple Food Website 1.0, a moderation can put the Cross Site Scripting Payload in any of the fields on http://127.0.0.1:1234/food/admin/all_users.php like Full Username, etc .This causes stored xss. | Unknown | N/A | n/a | |
CVE-2022-30016 | Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info. | Unknown | N/A | n/a | |
CVE-2022-30017 | Rescue Dispatch Management System 1.0 suffers from Stored XSS, leading to admin account takeover via cookie stealing. | Unknown | N/A | n/a | |
CVE-2022-30018 | Mobotix Control Center (MxCC) through 2.5.4.5 has Insufficiently Protected Credentials, Storing Passwords in a Recoverable Format via the MxCC.ini config file. The credential storage method in this software enables an attacker/user of the machine to gain admin access to the software and gain access to recordings/recording locations. | Unknown | N/A | n/a | |
CVE-2022-3002 | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | Unknown | N/A | yetiforcecompany | |
CVE-2022-30023 | Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 is vulnerable to Command Injection via the Ping function. | Unknown | N/A | n/a | |
CVE-2022-30024 | A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected. | Unknown | N/A | n/a | |
CVE-2022-30025 | SQL injection in "/Framewrk/Home.jsp" file (POST method) in tCredence Analytics iDEAL Wealth and Funds - 1.0 iallows authenticated remote attackers to inject payload via "v" parameter. | Unknown | N/A | n/a | |
CVE-2022-30028 | Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token. | Unknown | N/A | n/a | |
CVE-2022-30033 | Tenda TX9 Pro V22.03.02.10 is vulnerable to Buffer Overflow via the functtion setIPv6Status() in httpd module. | Unknown | N/A | n/a | |
CVE-2022-30034 | Flower, a web UI for the Celery Python RPC framework, all versions as of 05-02-2022 is vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes. | Unknown | N/A | n/a | |
CVE-2022-30036 | MA Lighting grandMA2 Light has a password of root for the root account. NOTE: The vendor's position is that the product was designed for isolated networks. Also, the successor product, grandMA3, is not affected by this vulnerability. | Unknown | N/A | n/a | |
CVE-2022-30037 | XunRuiCMS v4.3.3 to v4.5.1 vulnerable to PHP file write and CMS PHP file inclusion, allows attackers to execute arbitrary php code, via the add function in cron.php. | Unknown | N/A | n/a | |
CVE-2022-3004 | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | Unknown | N/A | yetiforcecompany | |
CVE-2022-30040 | Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability lies in rootfs_ In / goform / setsystimecfg of / bin / tdhttpd in ubif file system, attackers can access http://ip/goform/SetSysTimeCfg, and by setting the ntpserve parameter, the stack buffer overflow can be caused to achieve the effect of router denial of service. | Unknown | N/A | n/a | |
CVE-2022-30045 | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read. | Unknown | N/A | n/a | |
CVE-2022-30047 | Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability in /mdiy/dict/listExcludeApp URI via orderBy parameter. | Unknown | N/A | n/a | |
CVE-2022-30048 | Mingsoft MCMS 5.2.7 was discovered to contain a SQL injection vulnerability in /mdiy/dict/list URI via orderBy parameter. | Unknown | N/A | n/a | |
CVE-2022-30049 | A Server-Side Request Forgery (SSRF) in Rebuild v2.8.3 allows attackers to obtain the real IP address and scan Intranet information via the fileurl parameter. | Unknown | N/A | n/a | |
CVE-2022-3005 | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | Unknown | N/A | yetiforcecompany | |
CVE-2022-30050 | Gnuboard 5.55 and 5.56 is vulnerable to Cross Site Scripting (XSS) via bbs/member_confirm.php. | Unknown | N/A | n/a | |
CVE-2022-30052 | In Home Clean Service System 1.0, the password parameter is vulnerable to SQL injection attacks. | Unknown | N/A | n/a | |
CVE-2022-30053 | In Toll Tax Management System 1.0, the id parameter appears to be vulnerable to SQL injection attacks. | Unknown | N/A | n/a | |
CVE-2022-30054 | In Covid 19 Travel Pass Management 1.0, the code parameter is vulnerable to SQL injection attacks. | Unknown | N/A | n/a | |
CVE-2022-30055 | Prime95 30.7 build 9 suffers from a Buffer Overflow vulnerability that could lead to Remote Code Execution. | Unknown | N/A | n/a | |
CVE-2022-30057 | Shopwind <=v3.4.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability. | Unknown | N/A | n/a | |
CVE-2022-30058 | Shopwind <=v3.4.2 was discovered to contain a Arbitrary File Download vulnerability via the neirong parameter at \backend\controllers\DbController.php. | Unknown | N/A | n/a | |
CVE-2022-30059 | Shopwind <=v3.4.2 was discovered to contain a Arbitrary File Delete vulnerability via the neirong parameter at \backend\controllers\DbController.php. | Unknown | N/A | n/a | |
CVE-2022-30060 | ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Write via admin/controllers/tp.php | Unknown | N/A | n/a | |
CVE-2022-30061 | ftcms <=2.1 was discovered to be vulnerable to directory traversal attacks via the parameter tp. | Unknown | N/A | n/a | |
CVE-2022-30062 | ftcms <=2.1 was discovered to be vulnerable to Arbitrary File Read via tp.php | Unknown | N/A | n/a | |
CVE-2022-30063 | ftcms <=2.1 was discovered to be vulnerable to code execution attacks . | Unknown | N/A | n/a | |
CVE-2022-30065 | A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function. | Unknown | N/A | n/a | |
CVE-2022-30067 | GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a crafted XCF file, the program will allocate for a huge amount of memory, resulting in insufficient memory or program crash. | Unknown | N/A | n/a | |
CVE-2022-3007 | The vulnerability exists in Syska SW100 Smartwatch due to an improper implementation and/or configuration of Nordic Device Firmware Update (DFU) which is used for performing Over-The-Air (OTA) firmware updates on the Bluetooth Low Energy (BLE) devices. An unauthenticated attacker could exploit this vulnerability by setting arbitrary values to handle on the vulnerable device over Bluetooth. Successful exploitation of this vulnerability could allow the attacker to perform firmware update, device reboot or data manipulation on the target device. | Unknown | N/A | Syska Led Lights Pvt Ltd | |
CVE-2022-30072 | WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via \admin\pages\sections_save.php namesection2 parameters. | Unknown | N/A | n/a | |
CVE-2022-30073 | WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via /admin/users/save.php. | Unknown | N/A | n/a | |
CVE-2022-30075 | In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation. | Unknown | N/A | n/a | |
CVE-2022-30076 | ENTAB ERP 1.0 allows attackers to discover users' full names via a brute force attack with a series of student usernames such as s10000 through s20000. There is no rate limiting. | Unknown | N/A | n/a | |
CVE-2022-30078 | NETGEAR R6200_V2 firmware versions through R6200v2-V1.0.3.12_10.1.11 and R6300_V2 firmware versions through R6300v2-V1.0.4.52_10.0.93 allow remote authenticated attackers to execute arbitrary command via shell metacharacters in the ipv6_fix.cgi ipv6_wan_ipaddr, ipv6_lan_ipaddr, ipv6_wan_length, or ipv6_lan_length parameters. | Unknown | N/A | n/a | |
CVE-2022-30079 | Command injection vulnerability was discovered in Netgear R6200 v2 firmware through R6200v2-V1.0.3.12 via binary /sbin/acos_service that could allow remote authenticated attackers the ability to modify values in the vulnerable parameter. | Unknown | N/A | n/a | |
CVE-2022-3008 | The tinygltf library uses the C library function wordexp() to perform file path expansion on untrusted paths that are provided from the input file. This function allows for command injection by using backticks. An attacker could craft an untrusted path input that would result in a path expansion. We recommend upgrading to 2.6.0 or past commit 52ff00a38447f06a17eab1caa2cf0730a119c751 | Unknown | N/A | syoyo | |
CVE-2022-30083 | EllieGrid Android Application version 3.4.1 is vulnerable to Code Injection. The application appears to evaluate user input as code (remote). | Unknown | N/A | n/a | |
CVE-2022-3010 | The Priva TopControl Suite contains predictable credentials for the SSH service, based on the Serial number. Which makes it possible for an attacker to calculate the login credentials for the Priva TopControll suite. | Unknown | N/A | Priva | |
CVE-2022-30105 | In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root. | Unknown | N/A | n/a | |
CVE-2022-30110 | The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser. | Unknown | N/A | n/a | |
CVE-2022-30111 | Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks. | Unknown | N/A | n/a | |
CVE-2022-30113 | Electronic mall system 1.0_build20200203 is affected vulnerable to SQL Injection. | Unknown | N/A | n/a | |
CVE-2022-30114 | A heap-based buffer overflow in a network service in Fastweb FASTGate MediaAccess FGA2130FWB, firmware version 18.3.n.0482_FW_230_FGA2130, and DGA4131FWB, firmware version up to 18.3.n.0462_FW_261_DGA4131, allows a remote attacker to reboot the device through a crafted HTTP request, causing DoS. | Unknown | N/A | n/a | |
CVE-2022-30115 | Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL. | Unknown | N/A | n/a | |
CVE-2022-30117 | Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concrete doesn’t allow traversal and by changing isFullChunkFilePresent to have an early false return when input doesn't match expectations.Concrete CMS Security team ranked this 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Credit to Siebene for reporting. | Unknown | N/A | n/a | |
CVE-2022-30118 | Title for CVE: XSS in /dashboard/system/express/entities/forms/save_control/[GUID]: old browsers only.Description: When using Internet Explorer with the XSS protection disabled, editing a form control in an express entities form for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 can allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. | Unknown | N/A | n/a | |
CVE-2022-30119 | XSS in /dashboard/reports/logs/view - old browsers only. When using Internet Explorer with the XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. | Unknown | N/A | n/a | |
CVE-2022-3012 | A vulnerability was found in oretnom23 Fast Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file ffos/admin/reports/index.php. The manipulation of the argument date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207422 is the identifier assigned to this vulnerability. | Unknown | N/A | oretnom23 | |
CVE-2022-30120 | XSS in /dashboard/blocks/stacks/view_details/ - old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting | Unknown | N/A | n/a | |
CVE-2022-30121 | The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system. | Unknown | N/A | n/a | |
CVE-2022-30122 | A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack. | Unknown | N/A | n/a | |
CVE-2022-30123 | A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack. | Unknown | N/A | n/a | |
CVE-2022-30124 | An improper authentication vulnerability exists in Rocket.Chat Mobile App <4.14.1.22788 that allowed an attacker with physical access to a mobile device to bypass local authentication (PIN code). | Unknown | N/A | n/a | |
CVE-2022-30126 | In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0 | Unknown | N/A | Apache Software Foundation | |
CVE-2022-30127 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30128 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30129 | Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-3013 | A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423. | Unknown | N/A | SourceCodester | |
CVE-2022-30130 | .NET Framework Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30131 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30132 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30133 | Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30134 | Microsoft Exchange Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30135 | Windows Media Center Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30136 | Windows Network File System Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30137 | Executive Summary An Elevation of Privilege (EOP) vulnerability has been identified within Service Fabric clusters that run Docker containers. Exploitation of this EOP vulnerability requires an attacker to gain remote code execution within a container. All Service Fabric and Docker versions are impacted. | Unknown | N/A | Microsoft | |
CVE-2022-30138 | Windows Print Spooler Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30139 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-3014 | A vulnerability classified as problematic was found in SourceCodester Simple Task Managing System. This vulnerability affects unknown code. The manipulation of the argument student_add leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-207424. | Unknown | N/A | SourceCodester | |
CVE-2022-30140 | Windows iSCSI Discovery Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30142 | Windows File History Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30144 | Windows Bluetooth Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30145 | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30146 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30147 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30148 | Windows Desired State Configuration (DSC) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30149 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-3015 | A vulnerability, which was classified as problematic, has been found in oretnom23 Fast Food Ordering System. This issue affects some unknown processing of the file admin/?page=reports. The manipulation of the argument date leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-207425 was assigned to this vulnerability. | Unknown | N/A | oretnom23 | |
CVE-2022-30150 | Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30151 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30152 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30153 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30154 | Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30155 | Windows Kernel Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30157 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30158 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30159 | Microsoft Office Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-3016 | Use After Free in GitHub repository vim/vim prior to 9.0.0286. | Unknown | N/A | vim | |
CVE-2022-30160 | Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30161 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-30162 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v