Latest CVE Feed
-
4.3
MEDIUMCVE-2022-28777
Improper access control vulnerability in Samsung Members prior to version 13.6.08.5 allows local attacker to execute call function without CALL_PHONE permission.... Read more
Affected Products : members- Published: Apr. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29612
SAP NetWeaver, ABAP Platform and SAP Host Agent - versions KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, 8.04, KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, 8.04, SAPHOSTAGENT 7.22, allows an authenticated user to misus... Read more
- Published: Jun. 14, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2006-4067
Cross-site scripting (XSS) vulnerability in cake/libs/error.php in CakePHP before 1.1.7.3363 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected back in a 404 ("Not Found") error page. NOTE: some of these detail... Read more
- Published: Aug. 10, 2006
- Modified: Apr. 03, 2025
-
4.3
MEDIUMCVE-2018-17464
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.... Read more
- Published: Nov. 14, 2018
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29243
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names... Read more
- Published: May. 31, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-26070
When handling a mismatched pre-authentication cookie, the application leaks the internal error message in the response, which contains the Splunk Enterprise local system path. The vulnerability impacts Splunk Enterprise versions before 8.1.0.... Read more
Affected Products : splunk- Published: May. 06, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29048
A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.... Read more
- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28252
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memo... Read more
- Published: May. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-26051
Operation restriction bypass vulnerability in Portal of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Portal.... Read more
Affected Products : garoon- Published: Jul. 04, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29905
The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.... Read more
Affected Products : mediawiki- Published: Apr. 29, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2657
The Multivendor Marketplace Solution for WooCommerce WordPress plugin before 3.8.12 is lacking authorisation and CSRF in multiple AJAX actions, which could allow any authenticated users, such as subscriber to call them and suspend vendors (reporter by the... Read more
Affected Products : multivendor_marketplace_solution_for_woocommerce_-_wc_marketplace- Published: Sep. 05, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29441
Cross-Site Request Forgery (CSRF) vulnerability in Private Messages For WordPress plugin <= 2.1.10 at WordPress allows attackers to send messages.... Read more
Affected Products : private_messages- Published: Jun. 15, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28147
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.... Read more
Affected Products : continuous_integration_with_toad_edge- Published: Mar. 29, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2450
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.... Read more
Affected Products : resmush.it_image_optimizer- Published: Nov. 14, 2022
- Modified: Apr. 30, 2025
-
4.3
MEDIUMCVE-2022-31684
Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where... Read more
Affected Products : reactor_netty- Published: Oct. 19, 2022
- Modified: May. 09, 2025
-
4.3
MEDIUMCVE-2022-30115
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not usi... Read more
- Published: Jun. 02, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29974
AMI (aka American Megatrends) NTFS driver 1.0.0 (fixed in late 2021 or early 2022) has a buffer overflow. This driver is, for example, used in certain ASUS devices.... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Dec. 12, 2024
-
4.3
MEDIUMCVE-2022-25773
This advisory addresses a file placement vulnerability that could allow assets to be uploaded to unintended directories on the server. * Improper Limitation of a Pathname to a Restricted Directory: A vulnerability exists in the asset upload functional... Read more
Affected Products : mautic- Published: Feb. 26, 2025
- Modified: Feb. 26, 2025
- Vuln Type: Path Traversal
-
4.3
MEDIUMCVE-2022-27803
Improper input validation vulnerability in Space of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Space.... Read more
Affected Products : garoon- Published: Jul. 04, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-27820
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.... Read more
Affected Products : zed_attack_proxy- Published: Mar. 24, 2022
- Modified: Nov. 21, 2024