Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.1

    HIGH
    CVE-2022-1669

    A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a... Read more

    • Published: May. 24, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2022-1668

    Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-1667

    Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2022-1666

    The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2022-1665

    A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can by... Read more

    Affected Products : enterprise_linux
    • Published: Jun. 21, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2022-1664

    Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that includ... Read more

    • Published: May. 26, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2022-1663

    The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request.... Read more

    Affected Products : stop_spam_comments
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1662

    In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list wh... Read more

    Affected Products : convert2rhel
    • Published: Jul. 14, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2022-1661

    The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.... Read more

    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2022-1660

    The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code.... Read more

    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2022-1659

    Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in th... Read more

    Affected Products : jupiter_x_core jupiterx
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1658

    Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenticated user, including users with the subscriber role, via the abb_remove_plugin AJAX action registered in the framework/admin/control-panel/logic/plugin-ma... Read more

    Affected Products : jupiter
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2022-1657

    Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action ... Read more

    Affected Products : jupiterx jupiter
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1656

    Vulnerable versions of the JupiterX Theme (<=2.0.6) allow any logged-in user, including subscriber-level users, to access any of the functions registered in lib/api/api/ajax.php, which also grant access to the jupiterx_api_ajax_ actions registered by the ... Read more

    Affected Products : jupiter_x_core jupiterx
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2022-1655

    An Incorrect Permission Assignment for Critical Resource flaw was found in Horizon on Red Hat OpenStack. Horizon session cookies are created without the HttpOnly flag despite HorizonSecureCookies being set to true in the environmental files, possibly lead... Read more

    Affected Products : openstack
    • Published: Jul. 22, 2022
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2022-1654

    Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 allow any authenticated attacker, including a subscriber or customer-level attacker, to gain administrative privileges via the "abb_uninstall_template" (both) and "jupiterx_core_cp_uninstall_templa... Read more

    Affected Products : jupiter_x_core jupiterx jupiter
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2022-1653

    The Social Share Buttons by Supsystic WordPress plugin before 2.2.4 does not perform CSRF checks in it's ajax endpoints and admin pages, allowing an attacker to trick any logged in user to manipulate or change the plugin settings, as well as create, delet... Read more

    Affected Products : social_share_buttons
    • Published: Jun. 27, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-1652

    Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute ... Read more

    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2022-1651

    A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, caus... Read more

    Affected Products : linux_kernel
    • Published: Jul. 26, 2022
    • Modified: Nov. 21, 2024
  • 9.3

    CRITICAL
    CVE-2022-1650

    Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2. ... Read more

    Affected Products : debian_linux eventsource
    • Published: May. 12, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 294690 Results