Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.3

    MEDIUM
    CVE-2022-1677

    In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or ... Read more

    • Published: Sep. 01, 2022
    • Modified: Nov. 21, 2024
  • 6.6

    MEDIUM
    CVE-2022-1674

    NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application cr... Read more

    Affected Products : fedora vim macos
    • Published: May. 12, 2022
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2022-1673

    The WooCommerce Green Wallet Gateway WordPress plugin before 1.0.2 does not escape the error_envision query parameter before outputting it to the page, leading to a Reflected Cross-Site Scripting vulnerability.... Read more

    Affected Products : woocommerce_green_wallet_gateway
    • Published: Jun. 08, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2022-1672

    The Insights from Google PageSpeed WordPress plugin before 4.0.7 does not verify for CSRF before doing various actions such as deleting Custom URLs, which could allow attackers to make a logged in admin perform such actions via CSRF attacks... Read more

    Affected Products : insights_from_google_pagespeed
    • Published: Jul. 17, 2022
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2022-1671

    A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.... Read more

    • Published: Jul. 26, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2022-1670

    When generating a user invitation code in Octopus Server, the validity of this code can be set for a specific number of users. It was possible to bypass this restriction of validity to create extra user accounts above the initial number of invited users.... Read more

    Affected Products : octopus_server
    • Published: May. 19, 2022
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2022-1669

    A buffer overflow vulnerability has been detected in the firewall function of the device management web portal. The device runs a CGI binary (index.cgi) to offer a management web application. Once authenticated with valid credentials in this web portal, a... Read more

    • Published: May. 24, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2022-1668

    Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-1667

    Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2022-1666

    The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.... Read more

    • Published: Jun. 24, 2022
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2022-1665

    A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can by... Read more

    Affected Products : enterprise_linux
    • Published: Jun. 21, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2022-1664

    Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that includ... Read more

    • Published: May. 26, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2022-1663

    The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request.... Read more

    Affected Products : stop_spam_comments
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1662

    In convert2rhel, there's an ansible playbook named ansible/run-convert2rhel.yml which passes the Red Hat Subscription Manager user password via the CLI to convert2rhel. This could allow unauthorized local users to view the password via the process list wh... Read more

    Affected Products : convert2rhel
    • Published: Jul. 14, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2022-1661

    The affected products are vulnerable to directory traversal, which may allow an attacker to obtain arbitrary operating system files.... Read more

    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2022-1660

    The affected products are vulnerable of untrusted data due to deserialization without prior authorization/authentication, which may allow an attacker to remotely execute arbitrary code.... Read more

    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2022-1659

    Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in th... Read more

    Affected Products : jupiter_x_core jupiterx
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1658

    Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenticated user, including users with the subscriber role, via the abb_remove_plugin AJAX action registered in the framework/admin/control-panel/logic/plugin-ma... Read more

    Affected Products : jupiter
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2022-1657

    Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action ... Read more

    Affected Products : jupiterx jupiter
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-1656

    Vulnerable versions of the JupiterX Theme (<=2.0.6) allow any logged-in user, including subscriber-level users, to access any of the functions registered in lib/api/api/ajax.php, which also grant access to the jupiterx_api_ajax_ actions registered by the ... Read more

    Affected Products : jupiter_x_core jupiterx
    • Published: Jun. 13, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 294713 Results