Latest CVE Feed
-
4.3
MEDIUMCVE-2022-24906
Nextcloud Deck is a Kanban-style project & personal management tool for Nextcloud, similar to Trello. The full path of the application is exposed to unauthorized users. It is recommended that the Nextcloud Deck app is upgraded to 1.2.11, 1.4.6, or 1.5.4. ... Read more
- Published: May. 20, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29974
AMI (aka American Megatrends) NTFS driver 1.0.0 (fixed in late 2021 or early 2022) has a buffer overflow. This driver is, for example, used in certain ASUS devices.... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Dec. 12, 2024
-
4.3
MEDIUMCVE-2022-29052
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file syst... Read more
Affected Products : google_compute_engine- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29048
A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and earlier allows attackers to connect to an attacker-specified URL.... Read more
- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28889
In Apache Druid 0.22.1 and earlier, the server did not set appropriate headers to prevent clickjacking. Druid 0.23.0 and later prevent clickjacking using the Content-Security-Policy header.... Read more
Affected Products : druid- Published: Jul. 07, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-22959
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a cross site request forgery vulnerability. A malicious actor can trick a user through a cross site request forgery to unintentionally validate a malicious JDBC URI.... Read more
- Published: Apr. 13, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-25318
An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.... Read more
Affected Products : cerebrate- Published: Feb. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2227
Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data und... Read more
Affected Products : gitlab- Published: Jul. 01, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2657
The Multivendor Marketplace Solution for WooCommerce WordPress plugin before 3.8.12 is lacking authorisation and CSRF in multiple AJAX actions, which could allow any authenticated users, such as subscriber to call them and suspend vendors (reporter by the... Read more
Affected Products : multivendor_marketplace_solution_for_woocommerce_-_wc_marketplace- Published: Sep. 05, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2450
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.... Read more
Affected Products : resmush.it_image_optimizer- Published: Nov. 14, 2022
- Modified: Apr. 30, 2025
-
4.3
MEDIUMCVE-2021-46607
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or... Read more
- Published: Feb. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-30115
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not usi... Read more
- Published: Jun. 02, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2172
The LinkWorth WordPress plugin before 3.3.4 does not implement nonce checks, which could allow attackers to make a logged in admin change settings via a CSRF attack.... Read more
Affected Products : linkworth- Published: Aug. 22, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28252
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memo... Read more
- Published: May. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29489
Cross-Site Request Forgery (CSRF) vulnerability in Sucuri Security plugin <= 1.8.33 at WordPress leading to Event log entry creation.... Read more
Affected Products : security- Published: Sep. 16, 2022
- Modified: Feb. 19, 2025
-
4.3
MEDIUMCVE-2022-28718
Operation restriction bypass vulnerability in Bulletin of Cybozu Garoon 4.0.0 to 5.5.1 allow a remote authenticated attacker to alter the data of Bulletin.... Read more
Affected Products : garoon- Published: Jul. 04, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28869
A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the browser did not show full URL, such as port number.... Read more
Affected Products : safe- Published: Apr. 15, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-24904
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 0.7.0 and prior to versions 2.1.15m 2.2.9, and 2.3.4 is vulnerable to a symlink following bug allowing a malicious user with repository write access to... Read more
- Published: May. 20, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29441
Cross-Site Request Forgery (CSRF) vulnerability in Private Messages For WordPress plugin <= 2.1.10 at WordPress allows attackers to send messages.... Read more
Affected Products : private_messages- Published: Jun. 15, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-29613
Due to insufficient input validation, SAP Employee Self Service allows an authenticated attacker with user privileges to alter employee number. On successful exploitation, the attacker can view personal details of other users causing a limited impact on c... Read more
Affected Products : employee_self_service- Published: May. 11, 2022
- Modified: Nov. 21, 2024