Total
4572 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41692 | 1 Dwbooster | 1 Appointment Hour Booking | 2022-11-21 | N/A | 8.8 HIGH |
Missing Authorization vulnerability in Appointment Hour Booking plugin <= 1.3.71 on WordPress. | |||||
CVE-2022-43482 | 1 Codepeople | 1 Appointment Booking Calendar | 2022-11-21 | N/A | 8.8 HIGH |
Missing Authorization vulnerability in Appointment Booking Calendar plugin <= 1.3.69 on WordPress. | |||||
CVE-2022-3920 | 1 Hashicorp | 1 Consul | 2022-11-18 | N/A | 7.5 HIGH |
HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0. | |||||
CVE-2020-25711 | 3 Infinispan, Netapp, Redhat | 3 Infinispan, Active Iq Unified Manager, Data Grid | 2022-11-10 | 4.9 MEDIUM | 6.5 MEDIUM |
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. | |||||
CVE-2021-24730 | 1 Infornweb | 1 Logo Showcase With Slick Slider | 2022-11-09 | 4.0 MEDIUM | 4.3 MEDIUM |
The Logo Showcase with Slick Slider WordPress plugin before 1.2.5 does not have CSRF and authorisation checks in the lswss_save_attachment_data AJAX action, allowing any authenticated users, such as Subscriber, to change title, description, alt text, and URL of arbitrary uploaded media. | |||||
CVE-2022-40223 | 1 Searchwp | 1 Searchwp | 2022-11-09 | N/A | 4.3 MEDIUM |
Nonce token leakage and missing authorization in SearchWP premium plugin <= 4.2.5 on WordPress leading to plugin settings change. | |||||
CVE-2020-14306 | 1 Istio-operator Project | 1 Istio-operator | 2022-11-07 | 6.5 MEDIUM | 8.8 HIGH |
An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | |||||
CVE-2020-25718 | 2 Fedoraproject, Samba | 2 Fedora, Samba | 2022-11-07 | 6.5 MEDIUM | 8.8 HIGH |
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | |||||
CVE-2020-13422 | 1 Openiam | 1 Openiam | 2022-11-05 | 5.5 MEDIUM | 8.1 HIGH |
OpenIAM before 4.2.0.3 does not verify if a user has permissions to perform /webconsole/rest/api/* administrative actions. | |||||
CVE-2021-22147 | 1 Elastic | 1 Elasticsearch | 2022-11-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | |||||
CVE-2022-24669 | 1 Forgerock | 1 Access Management | 2022-10-31 | N/A | 6.5 MEDIUM |
It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services. | |||||
CVE-2021-0518 | 1 Google | 1 Android | 2022-10-28 | 4.9 MEDIUM | 5.5 MEDIUM |
In Wi-Fi, there is a possible leak of location-sensitive data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-176541017 | |||||
CVE-2021-25002 | 1 Tipsacarrier Project | 1 Tipsacarrier | 2022-10-27 | 5.0 MEDIUM | 7.5 HIGH |
The Tipsacarrier WordPress plugin before 1.5.0.5 does not have any authorisation check in place some functions, which could allow unauthenticated users to access Orders data which could be used to retrieve the client full address, name and phone via tracking URL | |||||
CVE-2020-15337 | 1 Zyxel | 1 Cloudcnm Secumanager | 2022-10-27 | N/A | 5.3 MEDIUM |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /registerCpe requests. | |||||
CVE-2022-36836 | 1 Samsung | 2 Charm, Charm Firmware | 2022-10-27 | N/A | 5.5 MEDIUM |
Unprotected provider vulnerability in Charm by Samsung prior to version 1.2.3 allows attackers to read connection state without permission. | |||||
CVE-2020-15338 | 1 Zyxel | 1 Cloudcnm Secumanager | 2022-10-27 | N/A | 5.3 MEDIUM |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /cnr requests. | |||||
CVE-2021-36909 | 1 Webfactoryltd | 1 Wp Reset Pro | 2022-10-27 | 5.5 MEDIUM | 8.1 HIGH |
Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover. | |||||
CVE-2021-36917 | 1 Wpwave | 1 Hide My Wp | 2022-10-27 | 5.0 MEDIUM | 7.5 HIGH |
WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a reset token which can then be used to deactivate the plugin. | |||||
CVE-2021-38486 | 1 Inhandnetworks | 2 Ir615, Ir615 Firmware | 2022-10-27 | 6.0 MEDIUM | 8.5 HIGH |
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected. | |||||
CVE-2021-34648 | 1 Ninjaforms | 1 Ninja Forms | 2022-10-27 | 4.0 MEDIUM | 4.3 MEDIUM |
The Ninja Forms WordPress plugin is vulnerable to arbitrary email sending via the trigger_email_action function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to send arbitrary emails from the affected server via the /ninja-forms-submissions/email-action REST API which can be used to socially engineer victims. |