Latest CVE Feed
-
4.3
MEDIUMCVE-2022-23180
The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.7.4 doesn't have authorisation and nonce checks, which could allow any authenticated users, such as subscriber to update and change various settings... Read more
Affected Products : contact_form_\&_lead_form_elementor_builder- Published: Jan. 16, 2024
- Modified: Jun. 16, 2025
-
4.3
MEDIUM- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-21692
OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions anyone with access to the chat environment can write messages disguised as another chat ... Read more
Affected Products : onionshare- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2010-3695
Cross-site scripting (XSS) vulnerability in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allows remote attackers to inject arbitrary web script or HTML via the fm_id parameter in a fetchmail_prefs_save ac... Read more
- Published: Mar. 31, 2011
- Modified: Apr. 11, 2025
-
4.3
MEDIUMCVE-2022-21977
Media Foundation Information Disclosure Vulnerability... Read more
Affected Products : windows_10 windows_8.1 windows_rt_8.1 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 windows_10_1809 windows_10_20h2 +10 more products- Published: Mar. 09, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-23473
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.148, Authorizations are not properly verified when accessing MediaWiki standalone resources. Users with read only permissions for... Read more
Affected Products : tuleap- Published: Dec. 13, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-22243
An XPath Injection vulnerability due to Improper Input Validation in the J-Web component of Juniper Networks Junos OS allows an authenticated attacker to add an XPath command to the XPath stream, which may allow chaining to other unspecified vulnerabiliti... Read more
Affected Products : junos- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-27841
Improper exception handling in Samsung Pass prior to version 3.7.07.5 allows physical attacker to view the screen that is previously running without authentication... Read more
- Published: Apr. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-24906
Nextcloud Deck is a Kanban-style project & personal management tool for Nextcloud, similar to Trello. The full path of the application is exposed to unauthorized users. It is recommended that the Nextcloud Deck app is upgraded to 1.2.11, 1.4.6, or 1.5.4. ... Read more
- Published: May. 20, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-20612
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.... Read more
- Published: Jan. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28268
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnera... Read more
- Published: May. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-23807
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.... Read more
Affected Products : phpmyadmin- Published: Jan. 22, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-25041
OpenEMR v6.0.0 was discovered to contain an incorrect access control issue.... Read more
Affected Products : openemr- Published: Mar. 23, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-20616
Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it'... Read more
Affected Products : credentials_binding- Published: Jan. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28147
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.... Read more
Affected Products : continuous_integration_with_toad_edge- Published: Mar. 29, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-28269
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of Annotation objects that could result in a memory leak in the context of th... Read more
- Published: May. 11, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-20620
Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.... Read more
Affected Products : ssh_agent- Published: Jan. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2227
Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data und... Read more
Affected Products : gitlab- Published: Jul. 01, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-20614
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.... Read more
- Published: Jan. 12, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2011-0005
Cross-site scripting (XSS) vulnerability in the com_search module for Joomla! 1.0.x through 1.0.15 allows remote attackers to inject arbitrary web script or HTML via the ordering parameter to index.php.... Read more
- Published: Jan. 11, 2011
- Modified: Apr. 11, 2025