Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-37051 | An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file. | Unknown | N/A | n/a | |
CVE-2022-37052 | A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject. | Unknown | N/A | n/a | |
CVE-2022-37053 | TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htdocs/upnpinc/gena.php. | Unknown | N/A | n/a | |
CVE-2022-37055 | D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main, | Unknown | N/A | n/a | |
CVE-2022-37056 | D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 is vulnerable to Command Injection via /cgibin, hnap_main, | Unknown | N/A | n/a | |
CVE-2022-37057 | D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Command Injection via cgibin, ssdpcgi_main. | Unknown | N/A | n/a | |
CVE-2022-37059 | Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field | Unknown | N/A | n/a | |
CVE-2022-3706 | Improper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn't have access to that project. | Unknown | N/A | GitLab | |
CVE-2022-37060 | FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path. | Unknown | N/A | n/a | |
CVE-2022-37061 | All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges. | Unknown | N/A | n/a | |
CVE-2022-37062 | All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are affected by an insecure design vulnerability due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains the path of the SQLite users database and download it. A successful exploit could allow the attacker to extract usernames and hashed passwords. | Unknown | N/A | n/a | |
CVE-2022-37063 | All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to Cross Site Scripting (XSS) due to improper input sanitization. An authenticated remote attacker can execute arbitrary JavaScript code in the web management interface. A successful exploit could allow the attacker to insert malicious JavaScript code. | Unknown | N/A | n/a | |
CVE-2022-37066 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateDDNS. | Unknown | N/A | n/a | |
CVE-2022-37067 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanParamsMulti. | Unknown | N/A | n/a | |
CVE-2022-37068 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateMacCloneFinal. | Unknown | N/A | n/a | |
CVE-2022-37069 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateSnat. | Unknown | N/A | n/a | |
CVE-2022-3707 | A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system. | Unknown | N/A | n/a | |
CVE-2022-37070 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList. | Unknown | N/A | n/a | |
CVE-2022-37071 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateOne2One. | Unknown | N/A | n/a | |
CVE-2022-37072 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanLinkspyMulti. | Unknown | N/A | n/a | |
CVE-2022-37073 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanModeMulti. | Unknown | N/A | n/a | |
CVE-2022-37074 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function switch_debug_info_set. | Unknown | N/A | n/a | |
CVE-2022-37075 | TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ip parameter in the function setDiagnosisCfg. | Unknown | N/A | n/a | |
CVE-2022-37076 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the FileName parameter in the function UploadFirmwareFile. | Unknown | N/A | n/a | |
CVE-2022-37077 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the pppoeUser parameter. | Unknown | N/A | n/a | |
CVE-2022-37078 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the lang parameter at /setting/setLanguageCfg. | Unknown | N/A | n/a | |
CVE-2022-37079 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg. | Unknown | N/A | n/a | |
CVE-2022-3708 | The Web Stories plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 1.24.0 due to insufficient validation of URLs supplied via the 'url' parameter found via the /v1/hotlink/proxy REST API Endpoint. This makes it possible for authenticated users to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | Unknown | N/A | ||
CVE-2022-37080 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the command parameter at setting/setTracerouteCfg. | Unknown | N/A | n/a | |
CVE-2022-37081 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the command parameter at setting/setTracerouteCfg. | Unknown | N/A | n/a | |
CVE-2022-37082 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the host_time parameter at the function NTPSyncWithHost. | Unknown | N/A | n/a | |
CVE-2022-37083 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the ip parameter at the function setDiagnosisCfg. | Unknown | N/A | n/a | |
CVE-2022-37084 | TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the sPort parameter at the addEffect function. | Unknown | N/A | n/a | |
CVE-2022-37085 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the AddWlanMacList function. | Unknown | N/A | n/a | |
CVE-2022-37086 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed. | Unknown | N/A | n/a | |
CVE-2022-37087 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetMobileAPInfoById. | Unknown | N/A | n/a | |
CVE-2022-37088 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAP5GWifiById. | Unknown | N/A | n/a | |
CVE-2022-37089 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EditMacList. | Unknown | N/A | n/a | |
CVE-2022-3709 | A stored XSS vulnerability allows admin to super-admin privilege escalation in the Webadmin import group wizard of Sophos Firewall releases older than version 19.5 GA. | Unknown | N/A | Sophos | |
CVE-2022-37090 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID. | Unknown | N/A | n/a | |
CVE-2022-37091 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EditWlanMacList. | Unknown | N/A | n/a | |
CVE-2022-37092 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById. | Unknown | N/A | n/a | |
CVE-2022-37093 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function AddMacList. | Unknown | N/A | n/a | |
CVE-2022-37094 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G. | Unknown | N/A | n/a | |
CVE-2022-37095 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateWanParams. | Unknown | N/A | n/a | |
CVE-2022-37096 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EnableIpv6. | Unknown | N/A | n/a | |
CVE-2022-37097 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPInfoById. | Unknown | N/A | n/a | |
CVE-2022-37098 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateIpv6Params. | Unknown | N/A | n/a | |
CVE-2022-37099 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateSnat. | Unknown | N/A | n/a | |
CVE-2022-3710 | A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases older than version 19.5 GA. | Unknown | N/A | Sophos | |
CVE-2022-37100 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateMacClone. | Unknown | N/A | n/a | |
CVE-2022-37108 | An injection vulnerability in the syslog-ng configuration wizard in Securonix Snypr 6.4 allows an application user with the "Manage Ingesters" permission to execute arbitrary code on remote ingesters by appending arbitrary text to text files that are executed by the system, such as users' crontab files. The patch for this was present in SNYPR version 6.4 Jun 2022 R3_[06170871], but may have been introduced sooner. | Unknown | N/A | n/a | |
CVE-2022-37109 | patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie. | Unknown | N/A | n/a | |
CVE-2022-3711 | A post-auth read-only SQL injection vulnerability allows users to read non-sensitive configuration database contents in the User Portal of Sophos Firewall releases older than version 19.5 GA. | Unknown | N/A | Sophos | |
CVE-2022-37111 | BlueCMS 1.6 has SQL injection in line 132 of admin/article.php | Unknown | N/A | n/a | |
CVE-2022-37112 | BlueCMS 1.6 has SQL injection in line 55 of admin/model.php | Unknown | N/A | n/a | |
CVE-2022-37113 | Bluecms 1.6 has SQL injection in line 132 of admin/area.php | Unknown | N/A | n/a | |
CVE-2022-37122 | Carel pCOWeb HVAC BACnet Gateway 2.1.0, Firmware: A2.1.0 - B2.1.0, Application Software: 2.15.4A Software v16 13020200 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks. | Unknown | N/A | n/a | |
CVE-2022-37123 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi. | Unknown | N/A | n/a | |
CVE-2022-37125 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost. | Unknown | N/A | n/a | |
CVE-2022-37128 | In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end. | Unknown | N/A | n/a | |
CVE-2022-37129 | D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection. | Unknown | N/A | n/a | |
CVE-2022-3713 | A code injection vulnerability allows adjacent attackers to execute code in the Wifi controller of Sophos Firewall releases older than version 19.5 GA. | Unknown | N/A | Sophos | |
CVE-2022-37130 | In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability | Unknown | N/A | n/a | |
CVE-2022-37133 | D-link DIR-816 A2_v1.10CNB04.img reboots the router without authentication via /goform/doReboot. No authentication is required, and reboot is executed when the function returns at the end. | Unknown | N/A | n/a | |
CVE-2022-37134 | D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow. | Unknown | N/A | n/a | |
CVE-2022-37137 | PayMoney 3.3 is vulnerable to Stored Cross-Site Scripting (XSS) during replying the ticket. The XSS can be obtain from injecting under "Message" field with "description" parameter with the specially crafted payload to gain Stored XSS. The XSS then will prompt after that or can be access from the view ticket function. | Unknown | N/A | n/a | |
CVE-2022-37138 | Loan Management System 1.0 is vulnerable to SQL Injection at the login page, which allows unauthorized users to login as Administrator after injecting username form. | Unknown | N/A | n/a | |
CVE-2022-37139 | Loan Management System version 1.0 suffers from a persistent cross site scripting vulnerability. | Unknown | N/A | n/a | |
CVE-2022-3714 | A vulnerability classified as critical has been found in SourceCodester Online Medicine Ordering System 1.0. Affected is an unknown function of the file admin/?page=orders/view_order. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-212346 is the identifier assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2022-37140 | PayMoney 3.3 is vulnerable to Client Side Remote Code Execution (RCE). The vulnerability exists on the reply ticket function and upload the malicious file. A calculator will open when the victim who download the file open the RTF file. | Unknown | N/A | n/a | |
CVE-2022-37144 | The PlexTrac platform prior to API version 1.17.0 does not restrict excessive MFA TOTP submission attempts. An unauthenticated remote attacker in possession of a valid username and password can bruteforce their way past MFA protections to login as the targeted user. | Unknown | N/A | n/a | |
CVE-2022-37145 | The PlexTrac platform prior to version 1.17.0 does not restrict excessive authentication attempts for accounts configured to use the PlexTrac authentication provider. An unauthenticated remote attacker could perform a bruteforce attack on the login page with no time or attempt limitation in an attempt to obtain valid credentials for the platform users configured to use the PlexTrac authentication provider. | Unknown | N/A | n/a | |
CVE-2022-37146 | The PlexTrac platform prior to version 1.28.0 allows for username enumeration via HTTP response times on invalid login attempts for users configured to use the PlexTrac authentication provider. Login attempts for valid, unlocked users configured to use PlexTrac as their authentication provider take significantly longer than those for invalid users, allowing for valid users to be enumerated by an unauthenticated remote attacker. Note that the lockout policy implemented in Plextrac version 1.17.0 makes it impossible to distinguish between valid, locked user accounts and user accounts that do not exist, but does not prevent valid, unlocked users from being enumerated. | Unknown | N/A | n/a | |
CVE-2022-37149 | WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter. | Unknown | N/A | n/a | |
CVE-2022-3715 | A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems. | Unknown | N/A | n/a | |
CVE-2022-37150 | An issue was discovered in Online Diagnostic Lab Management System 1.0. There is a stored XSS vulnerability via firstname, address, middlename, lastname , gender, email, contact parameters. | Unknown | N/A | n/a | |
CVE-2022-37151 | There is an unauthorized access vulnerability in Online Diagnostic Lab Management System 1.0. | Unknown | N/A | n/a | |
CVE-2022-37152 | An issue was discovered in Online Diagnostic Lab Management System 1.0, There is a SQL injection vulnerability via "dob" parameter in "/classes/Users.php?f=save_client" | Unknown | N/A | n/a | |
CVE-2022-37153 | An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php. | Unknown | N/A | n/a | |
CVE-2022-37155 | RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter. | Unknown | N/A | n/a | |
CVE-2022-37158 | RuoYi v3.8.3 has a Weak password vulnerability in the management system. | Unknown | N/A | n/a | |
CVE-2022-37159 | Claroline 13.5.7 and prior is vulnerable to Remote code execution via arbitrary file upload. | Unknown | N/A | n/a | |
CVE-2022-3716 | A vulnerability classified as problematic was found in SourceCodester Online Medicine Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /omos/admin/?page=user/list. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-212347. | Unknown | N/A | SourceCodester | |
CVE-2022-37160 | Claroline 13.5.7 and prior allows an authenticated attacker to elevate privileges via the arbitrary creation of a privileged user. By combining the XSS vulnerability present in several upload forms and a javascript request to the present API, it is possible to trigger the creation of a user with administrative rights by opening an SVG file as an administrator user. | Unknown | N/A | n/a | |
CVE-2022-37161 | Claroline 13.5.7 and prior is vulnerable to Cross Site Scripting (XSS) via SVG file upload. | Unknown | N/A | n/a | |
CVE-2022-37162 | Claroline 13.5.7 and prior is vulnerable to Cross Site Scripting (XSS). An attacker can obtain javascript code execution by adding arbitrary javascript code in the 'Location' field of a calendar event. | Unknown | N/A | n/a | |
CVE-2022-37163 | Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes. | Unknown | N/A | n/a | |
CVE-2022-37164 | Inoda OnTrack v3.4 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes. | Unknown | N/A | n/a | |
CVE-2022-37172 | Incorrect access control in the install directory (C:\msys64) of Msys2 v20220603 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. | Unknown | N/A | n/a | |
CVE-2022-37173 | An issue in the installer of gvim 9.0.0000 allows authenticated attackers to execute arbitrary code via a binary hijacking attack on C:\Program.exe. | Unknown | N/A | n/a | |
CVE-2022-37175 | Tenda ac15 firmware V15.03.05.18 httpd server has stack buffer overflow in /goform/formWifiBasicSet. | Unknown | N/A | n/a | |
CVE-2022-37176 | Tenda AC6(AC1200) v5.0 Firmware v02.03.01.114 and below contains a vulnerability which allows attackers to remove the Wi-Fi password and force the device into open security mode via a crafted packet sent to goform/setWizard. | Unknown | N/A | n/a | |
CVE-2022-37177 | HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. NOTE: this is disputed by the vendor for multiple reasons, e.g., it is inconsistent with CVE ID assignment rules for cloud services, and no product with version V1.0 exists. Furthermore, the rail-fence cipher has been removed, and TLS 1.2 is now used for encryption. | Unknown | N/A | n/a | |
CVE-2022-37178 | An issue was discovered in 72crm 9.0. There is a SQL Injection vulnerability in View the task calendar. | Unknown | N/A | n/a | |
CVE-2022-37181 | 72crm 9.0 has an Arbitrary file upload vulnerability. | Unknown | N/A | n/a | |
CVE-2022-37183 | Piwigo 12.3.0 is vulnerable to Cross Site Scripting (XSS) via /search/1940/created-monthly-list. | Unknown | N/A | n/a | |
CVE-2022-37184 | The application manage_website.php on Garage Management System 1.0 is vulnerable to Shell File Upload. The already authenticated malicious user, can upload a dangerous RCE or LCE exploit file. | Unknown | N/A | n/a | |
CVE-2022-37185 | SQL injection vulnerability exists in the school information query interface (repschoolproj.php) of the EMS 6.2 system of the Office of the Thai Basic Education Commission, which can lead to data leakage. | Unknown | N/A | n/a | |
CVE-2022-37186 | In LemonLDAP::NG before 2.0.15. some sessions are not deleted when they are supposed to be deleted according to the timeoutActivity setting. This can occur when there are at least two servers, and a session is manually removed before the time at which it would have been removed automatically. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v