Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2022-0499

    The Sermon Browser WordPress plugin through 0.45.22 does not have CSRF checks in place when uploading Sermon files, and does not validate them in any way, allowing attackers to make a logged in admin upload arbitrary files such as PHP ones.... Read more

    Affected Products : sermon_browser
    • Published: Mar. 28, 2022
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2022-0497

    A vulnerbiility was found in Openscad, where a .scad file with no trailing newline could cause an out-of-bounds read during parsing of annotations.... Read more

    Affected Products : openscad
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-0496

    A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import().... Read more

    Affected Products : openscad
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2022-0495

    The library automation system product KOHA developed by Parantez Teknoloji before version 19.05.03 has an unauthenticated SQL Injection vulnerability. This has been fixed in the version 19.05.03.01.... Read more

    Affected Products : koha_library_automation
    • Published: Sep. 21, 2022
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2022-0494

    A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiali... Read more

    Affected Products : linux_kernel debian_linux
    • Published: Mar. 25, 2022
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2022-0493

    The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a fla... Read more

    Affected Products : string_locator
    • Published: Mar. 28, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-0492

    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the name... Read more

    • Published: Mar. 03, 2022
    • Modified: Nov. 21, 2024
  • 5.7

    MEDIUM
    CVE-2022-0489

    An issue has been discovered in GitLab CE/EE affecting all versions starting with 8.15 . It was possible to trigger a DOS by using the math feature with a specific formula in issue comments.... Read more

    Affected Products : gitlab
    • Published: Apr. 01, 2022
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2022-0488

    An issue has been discovered in GitLab CE/EE affecting all versions starting with version 8.10. It was possible to trigger a timeout on a page with markdown by using a specific amount of block-quotes.... Read more

    Affected Products : gitlab
    • Published: Mar. 28, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-0487

    A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel ver... Read more

    • Published: Feb. 04, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-0486

    Improper file permissions in the CommandPost, Collector, Sensor, and Sandbox components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected files and enable escalation of privileges equivale... Read more

    Affected Products : deception network
    • Published: May. 17, 2022
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2022-0485

    A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. ... Read more

    Affected Products : enterprise_linux libnbd
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2022-0484

    Lack of validation of URLs causes Mirantis Container Cloud Lens Extension before v3.1.1 to open external programs other than the default browser to perform sign on to a new cluster. An attacker could host a webserver which serves a malicious Mirantis Cont... Read more

    Affected Products : container_cloud_lens_extension
    • Published: Feb. 04, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-0483

    Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis VSS Doctor (Windows) before build 53... Read more

    Affected Products : windows vss_doctor
    • Published: Feb. 11, 2022
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2022-0482

    Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.... Read more

    Affected Products : easyappointments
    • Published: Mar. 09, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2022-0481

    NULL Pointer Dereference in Homebrew mruby prior to 3.2.... Read more

    Affected Products : mruby
    • Published: Feb. 04, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2022-0480

    A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.... Read more

    Affected Products : linux_kernel enterprise_linux
    • Published: Aug. 29, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2022-0479

    The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perfor... Read more

    Affected Products : popup_builder
    • Published: Mar. 28, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2022-0478

    The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/editing events, which could allow users with a role as lo... Read more

    • Published: Mar. 14, 2022
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2022-0477

    An issue has been discovered in GitLab affecting all versions starting from 11.9 before 14.5.4, all versions starting from 14.6.0 before 14.6.4, all versions starting from 14.7.0 before 14.7.1. GitLab was not correctly handling bulk requests to delete exi... Read more

    Affected Products : gitlab
    • Published: Apr. 25, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 294289 Results