Latest CVE Feed
-
8.8
HIGHCVE-2022-21745
In WIFI Firmware, there is a possible memory corruption due to a use after free. This could lead to remote escalation of privilege, when devices are connecting to the attacker-controllable Wi-Fi hotspot, with no additional execution privileges needed. Use... Read more
- Published: Jun. 06, 2022
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2022-21744
In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges ne... Read more
- Published: Jul. 06, 2022
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2022-21743
In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS... Read more
- Published: May. 03, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21742
Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services.... Read more
Affected Products : rtl8156_firmware rtl8156b_firmware rtl8153_firmware rtl8153b_firmware rtl8154_firmware rtl8154b_firmware rtl8152b_firmware rtl8156 rtl8156b rtl8153 +4 more products- Published: Jun. 20, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21732
Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negativ... Read more
Affected Products : tensorflow- Published: Feb. 03, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2022-21723
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malforme... Read more
- Published: Jan. 27, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2022-21722
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain... Read more
- Published: Jan. 27, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-21721
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use ne... Read more
Affected Products : next.js- Published: Jan. 28, 2022
- Modified: Nov. 21, 2024
-
5.0
MEDIUMCVE-2022-21718
Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. A vulnerability in versions prior to `17.0.0-alpha.6`, `16.0.6`, `15.3.5`, `14.2.4`, and `13.6.6` allows renderers to obtain access to a bluetooth devi... Read more
Affected Products : electron- Published: Mar. 22, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2022-21715
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A cross-site scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4 prior to version 4.1.8. Attackers can do XSS attacks if a potential victim is using ... Read more
Affected Products : codeigniter- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-21713
Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data ... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2022-21711
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or info... Read more
Affected Products : elfspirit- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2022-21710
ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the... Read more
- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21708
graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow pa... Read more
Affected Products : graphql-go- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2022-21707
wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare t... Read more
Affected Products : host_runtime- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-21706
Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vuln... Read more
- Published: Feb. 26, 2022
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2022-21705
Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit thi... Read more
Affected Products : october- Published: Feb. 23, 2022
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2022-21704
log4js-node is a port of log4js to node.js. In affected versions default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information... Read more
- Published: Jan. 19, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-21703
Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-21702
Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute ... Read more
- Published: Feb. 08, 2022
- Modified: Nov. 21, 2024