Search and browse vulnerability records from NVD
Showing 50 of 115433 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 8.1 HIGH |
The F0743 Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, 105, 106, does not check uploaded or downloaded files. This allows an attacker with basic user rights to inject dangerous content or malicious code which could result in critical information being modified or completely compromise the availability of the application. |
0.5% | 2022-01-14 | ||
| 6.1 MEDIUM |
SAP Enterprise Threat Detection (ETD) - version 2.0, does not sufficiently encode user-controlled inputs which may lead to an unauthorized attacker possibly exploit XSS vulnerability. The UIs in ETD are using SAP UI5 standard controls, the UI5 framework provides automated output encoding for its standard controls. This output encoding prevents stored malicious user input from being executed when it is reflected in the UI. |
0.4% | 2022-01-14 | ||
| 4.0 MEDIUM |
The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. |
0.0% | 2022-01-14 | ||
|
CVE-2022-23227
KEV
|
9.8 CRITICAL |
NUUO NVRmini2 through 3.11 allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users because of the lack of handle_import_user.php authentication. When combined with another flaw (CVE-2011-5325), it is possible to overwrite arbitrary files under the web root and achieve code execution as root. |
53.5% | 2022-01-14 | |
| 6.3 MEDIUM |
Missing Authorization vulnerability in snipe snipe/snipe-it.This issue affects snipe/snipe-i before 5.3.8. |
0.2% | 2022-01-13 | ||
| 9.8 CRITICAL |
My Cloud OS 5 was vulnerable to a pre-authenticated stack overflow vulnerability on the FTP service that could be exploited by unauthenticated attackers on the network. Addressed the vulnerability by adding defenses against stack overflow issues. |
1.2% | 2022-01-13 | ||
| 7.7 HIGH |
File and directory permissions have been corrected to prevent unintended users from modifying or accessing resources. It would be more difficult for an authenticated attacker to now traverse through the files and directories. This can only be exploited once an attacker has already found a way to get authenticated access to the device. |
0.1% | 2022-01-13 | ||
|
CVE-2022-23134
KEV
|
3.7 LOW |
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. |
93.1% | 2022-01-13 | |
| 6.3 MEDIUM |
An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts. |
1.0% | 2022-01-13 | ||
| 3.3 LOW |
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level |
0.1% | 2022-01-13 | ||
|
CVE-2022-23131
KEV
|
9.1 CRITICAL |
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default). |
94.0% | 2022-01-13 | |
|
CVE-2022-21919
KEV
|
7.0 HIGH |
Windows User Profile Service Elevation of Privilege Vulnerability |
0.3% | 2022-01-11 | |
|
CVE-2022-21882
KEV
|
7.0 HIGH |
Win32k Elevation of Privilege Vulnerability |
88.5% | 2022-01-11 | |
|
CVE-2022-22265
KEV
|
5.0 MEDIUM |
An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution. |
0.2% | 2022-01-10 | |
| 6.1 MEDIUM |
Kentico Xperience 13.0.44 allows XSS via an XML document to the Media Libraries subsystem. |
0.2% | 2022-01-10 | ||
| 7.5 HIGH |
The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality. |
0.2% | 2022-01-10 | ||
| 7.5 HIGH |
The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality. |
0.2% | 2022-01-10 | ||
| 7.5 HIGH |
The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. |
0.3% | 2022-01-10 | ||
| 4.6 MEDIUM |
Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality. |
0.0% | 2022-01-10 | ||
|
CVE-2021-35247
KEV
|
4.3 MEDIUM |
Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U. |
5.3% | 2022-01-10 | |
| 3.0 LOW |
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events. |
0.3% | 2022-01-07 | ||
| 8.0 HIGH |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hoppscotch hoppscotch/hoppscotch.This issue affects hoppscotch/hoppscotch before 2.1.1. |
0.4% | 2022-01-06 | ||
| 8.2 HIGH |
An issue was discovered in SdHostDriver in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (CommBufferData). |
0.1% | 2022-01-06 | ||
| 8.2 HIGH |
An issue was discovered in IdeBusDxe in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (the status code saved at the CommBuffer+4 location). |
0.1% | 2022-01-05 | ||
| 8.2 HIGH |
An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.1 before 05.16.25, 5.2 before 05.26.25, 5.3 before 05.35.25, 5.4 before 05.43.25, and 5.5 before 05.51.25. A vulnerability exists in the SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer (the CommBuffer+8 location). |
0.1% | 2022-01-05 | ||
|
CVE-2021-44168
KEV
|
3.3 LOW |
A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages. |
1.1% | 2022-01-04 | |
| 7.5 HIGH |
A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system. |
0.3% | 2022-01-03 | ||
| 7.5 HIGH |
Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file |
0.1% | 2021-12-30 | ||
| 6.3 MEDIUM |
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
0.1% | 2021-12-30 | ||
| 7.5 HIGH |
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
0.1% | 2021-12-30 | ||
| 7.5 HIGH |
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
0.3% | 2021-12-30 | ||
| 7.5 HIGH |
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
0.0% | 2021-12-30 | ||
| 7.5 HIGH |
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
0.2% | 2021-12-30 | ||
| 7.8 HIGH |
vim is vulnerable to Use After Free |
0.3% | 2021-12-29 | ||
| 8.2 HIGH |
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size. |
0.3% | 2021-12-27 | ||
| 7.8 HIGH |
vim is vulnerable to Use After Free |
0.3% | 2021-12-27 | ||
| 9.8 CRITICAL |
An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations. |
0.4% | 2021-12-27 | ||
| 8.8 HIGH |
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
0.4% | 2021-12-23 | ||
| 7.8 HIGH |
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature. |
2.1% | 2021-12-23 | ||
| 7.3 HIGH |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason's length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds. |
0.3% | 2021-12-22 | ||
| 4.3 MEDIUM |
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart. |
0.1% | 2021-12-22 | ||
| 9.8 CRITICAL |
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. |
0.3% | 2021-12-22 | ||
| 7.3 HIGH |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victimโs network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victimโs machine. Users are advised to upgrade as soon as possible. There are no known workarounds. |
0.2% | 2021-12-22 | ||
|
CVE-2021-44207
KEV
|
8.1 HIGH |
Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials. |
8.9% | 2021-12-21 | |
| 8.8 HIGH |
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks |
69.5% | 2021-12-21 | ||
| 9.8 CRITICAL |
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure. |
0.9% | 2021-12-20 | ||
|
CVE-2021-22054
KEV
|
7.5 HIGH |
VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. |
93.9% | 2021-12-17 | |
| 7.5 HIGH |
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action. |
0.6% | 2021-12-16 | ||
|
CVE-2021-1048
KEV
|
7.8 HIGH |
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel |
1.3% | 2021-12-15 | |
|
CVE-2021-0920
KEV
|
6.4 MEDIUM |
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel |
0.9% | 2021-12-15 |