Latest CVE Feed
-
7.8
HIGHCVE-2022-21743
In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS... Read more
- Published: May. 03, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21742
Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.... Read more
Affected Products : rtl8156_firmware rtl8156b_firmware rtl8153_firmware rtl8153b_firmware rtl8154_firmware rtl8154b_firmware rtl8152b_firmware rtl8156 rtl8156b rtl8153 +4 more products- Published: Jun. 20, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21732
Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negativ... Read more
Affected Products : tensorflow- Published: Feb. 03, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malforme... Read more
- Published: Jan. 27, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain... Read more
- Published: Jan. 27, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-21721
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use ne... Read more
Affected Products : next.js- Published: Jan. 28, 2022
- Modified: Nov. 21, 2024
-
5.0
MEDIUMCVE-2022-21718
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` allows renderers to obtain access to a bluetooth devi... Read more
Affected Products : electron- Published: Mar. 22, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2022-21715
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A cross-site scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4 prior to version 4.1.8. Attackers can do XSS attacks if a potential victim is using ... Read more
Affected Products : codeigniter- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-21713
Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data ... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2022-21711
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or info... Read more
Affected Products : elfspirit- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2022-21710
ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the... Read more
- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21708
graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow pa... Read more
Affected Products : graphql-go- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2022-21707
wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare t... Read more
Affected Products : host_runtime- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-21706
Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vuln... Read more
- Published: Feb. 26, 2022
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2022-21705
Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit thi... Read more
Affected Products : october- Published: Feb. 23, 2022
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2022-21704
log4js-node is a port of log4js to node.js. In affected versions default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information... Read more
- Published: Jan. 19, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-21703
Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21702
Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute ... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-21701
Istio is an open platform to connect, manage, and secure microservices. In versions 1.12.0 and 1.12.1 Istio is vulnerable to a privilege escalation attack. Users who have `CREATE` permission for `gateways.gateway.networking.k8s.io` objects can escalate th... Read more
Affected Products : istio- Published: Jan. 19, 2022
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2022-21700
Micronaut is a JVM-based, full stack Java framework designed for building JVM web applications with support for Java, Kotlin and the Groovy language. In affected versions sending an invalid Content Type header leads to memory leak in DefaultArgumentConver... Read more
Affected Products : micronaut- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024