Latest CVE Feed
-
9.8
CRITICALCVE-2022-42491
Several OS command injection vulnerabilities exist in the m2m binary of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulner... Read more
- Published: Jan. 26, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-42484
An OS command injection vulnerability exists in the httpd logs/view.cgi functionality of FreshTomato 2022.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.... Read more
- Published: Jan. 30, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-42245
Dreamer CMS 4.0.01 is vulnerable to SQL Injection.... Read more
Affected Products : dreamer_cms- Published: Nov. 17, 2022
- Modified: Apr. 29, 2025
-
9.8
CRITICALCVE-2022-42307
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.... Read more
Affected Products : netbackup- Published: Oct. 03, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-42154
An arbitrary file upload vulnerability in the component /apiadmin/upload/attach of 74cmsSE v3.13.0 allows attackers to execute arbitrary code via a crafted PHP file.... Read more
Affected Products : 74cmsse- Published: Oct. 17, 2022
- Modified: May. 14, 2025
-
9.8
CRITICALCVE-2022-42041
The d8s-file-system package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package. The affected version is 0.1.0.... Read more
Affected Products : d8s-file-system- Published: Oct. 11, 2022
- Modified: May. 19, 2025
-
9.8
CRITICALCVE-2022-42167
Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetFirewallCfg.... Read more
- Published: Oct. 17, 2022
- Modified: May. 15, 2025
-
9.8
CRITICALCVE-2022-41951
OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in `Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName`. With this method, an att... Read more
Affected Products : oroplatform- Published: Nov. 27, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-42037
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0.... Read more
Affected Products : d8s-asns- Published: Oct. 11, 2022
- Modified: May. 20, 2025
-
9.8
CRITICALCVE-2022-42064
Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell.... Read more
Affected Products : online_diagnostic_lab_management_system- Published: Oct. 14, 2022
- Modified: May. 14, 2025
-
9.8
CRITICALCVE-2022-41903
Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operator... Read more
- Published: Jan. 17, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41900
TensorFlow is an open source platform for machine learning. The security vulnerability results in FractionalMax(AVG)Pool with illegal pooling_ratio. Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the ... Read more
Affected Products : tensorflow- Published: Nov. 18, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41923
Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In s... Read more
Affected Products : spring_security_core- Published: Nov. 23, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41793
An out-of-bounds write vulnerability exists in the CSR format title functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger ... Read more
Affected Products : open_babel- Published: Jul. 21, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41922
`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27.... Read more
Affected Products : yii- Published: Nov. 23, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41778
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-DataCollect service port without proper verification. An attacker could provide malicious serialized objects to execute arb... Read more
Affected Products : infrasuite_device_master- Published: Jan. 13, 2023
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41781
Broken Access Control vulnerability in Permalink Manager Lite plugin <= 2.2.20 on WordPress.... Read more
Affected Products : permalink_manager_lite- Published: Nov. 18, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41786
Missing Authorization vulnerability in WP Job Portal WP Job Portal – A Complete Job Board.This issue affects WP Job Portal – A Complete Job Board: from n/a through 2.0.1. ... Read more
Affected Products : wp_job_portal- Published: Jan. 17, 2024
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-41705
Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.... Read more
Affected Products : badaso- Published: Nov. 25, 2022
- Modified: Apr. 29, 2025
-
9.8
CRITICALCVE-2022-41731
IBM Watson Knowledge Catalog on Cloud Pak for Data 4.5.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IB... Read more
- Published: Feb. 12, 2023
- Modified: Nov. 21, 2024