Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-33245 | Memory corruption in WLAN due to use after free | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33246 | Memory corruption in Audio due to use of out-of-range pointer offset while Initiating a voice call session from user space with invalid session id. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33248 | Memory corruption in User Identity Module due to integer overflow to buffer overflow when a segement is received via qmi http. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3325 | Improper access control in the GitLab CE/EE API affecting all versions starting from 12.8 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. Allowed for editing the approval rules via the API by an unauthorised user. | Unknown | N/A | GitLab | |
CVE-2022-33250 | Transient DOS due to reachable assertion in modem when network repeatedly sent invalid message container for NR to LTE handover. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33251 | Transient DOS due to reachable assertion in Modem because of invalid network configuration. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33252 | Information disclosure due to buffer over-read in WLAN while handling IBSS beacons frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33253 | Transient DOS due to buffer over-read in WLAN while parsing corrupted NAN frames. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33254 | Transient DOS due to reachable assertion in Modem while processing SIB1 Message. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33255 | Information disclosure due to buffer over-read in Bluetooth HOST while processing GetFolderItems and GetItemAttribute Cmds from peer device. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33256 | Memory corruption due to improper validation of array index in Multi-mode call processor. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33257 | Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33258 | Information disclosure due to buffer over-read in modem while reading configuration parameters. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33259 | Memory corruption due to buffer copy without checking the size of input in modem while decoding raw SMS received. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3326 | Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9. | Unknown | N/A | ikus060 | |
CVE-2022-33260 | Memory corruption due to stack based buffer overflow in core while sending command from USB of large size. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33263 | Memory corruption due to use after free in Core when multiple DCI clients register and deregister. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33264 | Memory corruption in modem due to stack based buffer overflow while parsing OTASP Key Generation Request Message. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33265 | Memory corruption due to information exposure in Powerline Communication Firmware while sending different MMEs from a single, unassociated device. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33266 | Memory corruption in Audio due to integer overflow to buffer overflow while music playback of clips like amr,evrc,qcelp with modified content. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33267 | Memory corruption in Linux while sending DRM request. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33268 | Information disclosure due to buffer over-read in Bluetooth HOST while pairing and connecting A2DP. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33269 | Memory corruption due to integer overflow or wraparound in Core while DDR memory assignment. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3327 | Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6. | Unknown | N/A | ikus060 | |
CVE-2022-33270 | Transient DOS due to time-of-check time-of-use race condition in Modem while processing RRC Reconfiguration message. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33271 | Information disclosure due to buffer over-read in WLAN while parsing NMF frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33272 | Transient DOS in modem due to reachable assertion. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33273 | Information disclosure due to buffer over-read in Trusted Execution Environment while QRKS report generation. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33274 | Memory corruption in android core due to improper validation of array index while returning feature ids after license authentication. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33275 | Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33276 | Memory corruption due to buffer copy without checking size of input in modem while receiving WMI_REQUEST_STATS_CMDID command. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33277 | Memory corruption in modem due to buffer copy without checking size of input while receiving WMI command. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33278 | Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33279 | Memory corruption due to stack based buffer overflow in WLAN having invalid WNM frame length. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3328 | Race condition in snap-confine's must_mkdir_and_open_with_perms() | Unknown | N/A | Canonical Ltd. | |
CVE-2022-33280 | Memory corruption due to access of uninitialized pointer in Bluetooth HOST while processing the AVRCP packet. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33281 | Memory corruption due to improper validation of array index in computer vision while testing EVA kernel without sending any frames. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33282 | Memory corruption in Automotive Multimedia due to integer overflow to buffer overflow during IOCTL calls in video playback. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33283 | Information disclosure due to buffer over-read in WLAN while WLAN frame parsing due to missing frame length check. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33284 | Information disclosure due to buffer over-read in WLAN while parsing BTM action frame. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33285 | Transient DOS due to buffer over-read in WLAN while parsing WLAN CSA action frames. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33286 | Transient DOS due to buffer over-read in WLAN while processing 802.11 management frames. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33287 | Information disclosure in Modem due to buffer over-read while getting length of Unfragmented headers in an IPv6 packet. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33288 | Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33289 | Memory corruption occurs in Modem due to improper validation of array index when malformed APDU is sent from card. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33290 | Transient DOS in Bluetooth HOST due to null pointer dereference when a mismatched argument is passed. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33291 | Information disclosure in Modem due to buffer over-read while receiving a IP header with malformed length. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33292 | Memory corruption in Qualcomm IPC due to use after free while receiving the incoming packet and reposting it. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33294 | Transient DOS in Modem due to NULL pointer dereference while receiving response of lwm2m registration/update/bootstrap request message. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33295 | Information disclosure in Modem due to buffer over-read while parsing the wms message received given the buffer and its length. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33296 | Memory corruption due to integer overflow to buffer overflow in Modem while parsing Traffic Channel Neighbor List Update message. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33297 | Information disclosure due to buffer overread in Linux sensors | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33298 | Memory corruption due to use after free in Modem while modem initialization. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33299 | Transient DOS due to null pointer dereference in Bluetooth HOST while receiving an attribute protocol PDU with zero length data. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3330 | It was possible for a guest user to read a todo targeting an inaccessible note in Gitlab CE/EE affecting all versions from 15.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1. | Unknown | N/A | GitLab | |
CVE-2022-33300 | Memory corruption in Automotive Android OS due to improper input validation. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33301 | Memory corruption due to incorrect type conversion or cast in audio while using audio playback/capture when crafted address is sent from AGM IPC to AGM. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33302 | Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33303 | Transient DOS due to uncontrolled resource consumption in Linux kernel when malformed messages are sent from the Gunyah Resource Manager message queue. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33304 | Transient DOS due to NULL pointer dereference in Modem while performing pullup for received TCP/UDP packet. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33305 | Transient DOS due to NULL pointer dereference in Modem while sending invalid messages in DCCH. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33306 | Transient DOS due to buffer over-read in WLAN while processing an incoming management frame with incorrectly filled IEs. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33307 | Memory Corruption due to double free in automotive when a bad HLOS address for one of the lists to be mapped is passed. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-33309 | Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes. | Unknown | N/A | Qualcomm, Inc. | |
CVE-2022-3331 | An issue has been discovered in GitLab EE affecting all versions starting from 14.5 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. GitLab's Zentao integration has an insecure direct object reference vulnerability that may be exploited by an attacker to leak Zentao project issues. | Unknown | N/A | GitLab | |
CVE-2022-33311 | Browse restriction bypass vulnerability in Address Book of Cybozu Office 10.0.0 to 10.8.5 allows a remote authenticated attacker to obtain the data of Address Book via unspecified vectors. | Unknown | N/A | Cybozu, Inc. | |
CVE-2022-33312 | Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_cert_file/` API is affected by command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33313 | Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_https_cert_file/` API is affected by command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33314 | Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_sdk_file/` API is affected by command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33315 | Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. | Unknown | N/A | n/a | |
CVE-2022-33316 | Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. | Unknown | N/A | n/a | |
CVE-2022-33317 | Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes. | Unknown | N/A | n/a | |
CVE-2022-33318 | Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server. | Unknown | N/A | n/a | |
CVE-2022-33319 | Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server. | Unknown | N/A | n/a | |
CVE-2022-3332 | A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System. This affects an unknown part of the file router.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-209583. | Unknown | N/A | SourceCodester | |
CVE-2022-33320 | Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes. | Unknown | N/A | n/a | |
CVE-2022-33321 | Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section. | Unknown | N/A | Mitsubishi Electric Corporation | |
CVE-2022-33322 | Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section. | Unknown | N/A | Mitsubishi Electric Corporation | |
CVE-2022-33323 | Active Debug Code vulnerability in robot controller of Mitsubishi Electric Corporation industrial robot MELFA SD/SQ Series and MELFA F-Series allows a remote unauthenticated attacker to gain unauthorized access by authentication bypass through an unauthorized telnet login. As for the affected model names, controller types and firmware versions, see the Mitsubishi Electric's advisory which is listed in [References] section. | Unknown | N/A | Mitsubishi Electric Corporation | |
CVE-2022-33324 | Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions "29" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions "17" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions "05" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions "07" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery. | Unknown | N/A | Mitsubishi Electric Corporation | |
CVE-2022-33325 | Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/clear_tools_log/` API is affected by command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33326 | Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/config_rollback/` API is affected by a command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33327 | Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove_sniffer_raw_log/` API is affected by a command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33328 | Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove/` API is affected by a command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-33329 | Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability. | Unknown | N/A | Robustel | |
CVE-2022-3333 | A vulnerability, which was classified as problematic, was found in Zephyr Project Manager up to 3.2.4. Affected is an unknown function of the file /v1/tasks/create/ of the component REST Call Handler. The manipulation of the argument onanimationstart leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.2.5 is able to address this issue. It is recommended to upgrade the affected component. VDB-209370 is the identifier assigned to this vulnerability. | Unknown | N/A | Zephyr | |
CVE-2022-3334 | The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. | Unknown | N/A | Unknown | |
CVE-2022-3335 | The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. | Unknown | N/A | Unknown | |
CVE-2022-3336 | The Event Monster WordPress plugin before 1.2.0 does not have CSRF check when deleting visitors, which could allow attackers to make logged in admin delete arbitrary visitors via a CSRF attack | Unknown | N/A | Unknown | |
CVE-2022-3337 | It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. This led to bypassing policies and restrictions enforced for enrolled devices by the Zero Trust platform. | Unknown | N/A | Cloudflare | |
CVE-2022-3338 | An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API. | Unknown | N/A | Trellix | |
CVE-2022-3339 | A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO. | Unknown | N/A | Trellix | |
CVE-2022-3340 | XML External Entity (XXE) vulnerability in Trellix IPS Manager prior to 10.1 M8 allows a remote authenticated administrator to perform XXE attack in the administrator interface part of the interface, which allows a saved XML configuration file to be imported. | Unknown | N/A | Trellix | |
CVE-2022-3341 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_main_header() function of libavformat/nutdec.c file. The flaw occurs because the function lacks check of the return value of avformat_new_stream() and triggers the null pointer dereference error, causing an application to crash. | Unknown | N/A | n/a | |
CVE-2022-3342 | The Jetpack CRM plugin for WordPress is vulnerable to PHAR deserialization via the ‘zbscrmcsvimpf’ parameter in the 'zeroBSCRM_CSVImporterLitehtml_app' function in versions up to, and including, 5.3.1. While the function performs a nonce check, steps 2 and 3 of the check do not take any action upon a failed check. These steps then perform a 'file_exists' check on the value of 'zbscrmcsvimpf'. If a phar:// archive is supplied, its contents will be deserialized and an object injected in the execution stream. This allows an unauthenticated attacker to obtain object injection if they are able to upload a phar archive (for instance if the site supports image uploads) and then trick an administrator into performing an action, such as clicking a link. | Unknown | N/A | automattic | |
CVE-2022-3343 | The WPQA Builder WordPress plugin before 5.9.3 (which is a companion plugin used with Discy and Himer Discy WordPress themes) incorrectly tries to validate that a user already follows another in the wpqa_following_you_ajax action, allowing a user to inflate their score on the site by having another user send repeated follow actions to them. | Unknown | N/A | Unknown | |
CVE-2022-3344 | A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0). | Unknown | N/A | n/a | |
CVE-2022-3346 | DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. | Unknown | N/A | github.com/peterzen/goresolver | |
CVE-2022-3347 | DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. | Unknown | N/A | github.com/peterzen/goresolver | |
CVE-2022-3348 | Just like in the previous report, an attacker could steal the account of different users. But in this case, it's a little bit more specific, because it is needed to be an editor in the same app as the victim. | Unknown | N/A | tooljet |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v