Total
4572 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-34647 | 1 Ninjaforms | 1 Ninja Forms | 2022-10-27 | 4.0 MEDIUM | 6.5 MEDIUM |
The Ninja Forms WordPress plugin is vulnerable to sensitive information disclosure via the bulk_export_submissions function found in the ~/includes/Routes/Submissions.php file, in versions up to and including 3.5.7. This allows authenticated attackers to export all Ninja Forms submissions data via the /ninja-forms-submissions/export REST API which can include personally identifiable information. | |||||
CVE-2021-33013 | 1 Myscada | 1 Mypro | 2022-10-27 | 5.0 MEDIUM | 7.5 HIGH |
mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information. | |||||
CVE-2022-22535 | 1 Sap | 1 Erp Human Capital Management | 2022-10-27 | 4.0 MEDIUM | 6.5 MEDIUM |
SAP ERP HCM Portugal - versions 600, 604, 608, does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts. | |||||
CVE-2020-19038 | 1 Halo | 1 Halo | 2022-10-26 | 6.4 MEDIUM | 9.1 CRITICAL |
File Deletion vulnerability in Halo 0.4.3 via delBackup. | |||||
CVE-2021-24635 | 1 Bootstrapped | 1 Visual Link Preview | 2022-10-25 | 5.5 MEDIUM | 5.4 MEDIUM |
The Visual Link Preview WordPress plugin before 2.2.3 does not enforce authorisation on several AJAX actions and has the CSRF nonce displayed for all authenticated users, allowing any authenticated user (such as subscriber) to call them and 1) Get and search through title and content of Draft post, 2) Get title of a password-protected post as well as 3) Upload an image from an URL | |||||
CVE-2021-22149 | 1 Elastic | 1 Enterprise Search | 2022-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization via an alternate route. Using this vulnerability, an authenticated attacker could utilize API keys belonging to higher privileged users. | |||||
CVE-2021-24978 | 1 B4after | 1 Osmapper | 2022-10-25 | 5.0 MEDIUM | 5.3 MEDIUM |
The OSMapper WordPress plugin through 2.1.5 contains an AJAX action to delete a plugin related post type named 'map' and is registered with the wp_ajax_nopriv prefix, making it available to unauthenticated users. There is no authorisation, CSRF and checks in place to ensure that the post to delete is a map one. As a result, unauthenticated user can delete arbitrary posts from the blog | |||||
CVE-2021-21437 | 1 Otrs | 2 Itsmconfigurationmanagement, Otrscisincustomerfrontend | 2022-10-24 | 4.0 MEDIUM | 4.3 MEDIUM |
Agents are able to see linked Config Items without permissions, which are defined in General Catalog. This issue affects: OTRSCIsInCustomerFrontend 7.0.15 and prior versions, ITSMConfigurationManagement 7.0.24 and prior versions | |||||
CVE-2021-24977 | 1 Use Any Font Project | 1 Use Any Font | 2022-10-24 | 5.8 MEDIUM | 6.1 MEDIUM |
The Use Any Font | Custom Font Uploader WordPress plugin before 6.2.1 does not have any authorisation checks when assigning a font, allowing unauthenticated users to sent arbitrary CSS which will then be processed by the frontend for all users. Due to the lack of sanitisation and escaping in the backend, it could also lead to Stored XSS issues | |||||
CVE-2021-24988 | 1 Wprssaggregator | 1 Wp Rss Aggregator | 2022-10-24 | 3.5 LOW | 5.4 MEDIUM |
The WP RSS Aggregator WordPress plugin before 4.19.3 does not sanitise and escape data before outputting it in the System Info admin dashboard, which could lead to a Stored XSS issue due to the wprss_dismiss_addon_notice AJAX action missing authorisation and CSRF checks, allowing any authenticated users, such as subscriber to call it and set a malicious payload in the addon parameter. | |||||
CVE-2021-24790 | 1 Contact Form Advanced Database Project | 1 Contact Form Advanced Database | 2022-10-24 | 4.0 MEDIUM | 4.3 MEDIUM |
The Contact Form Advanced Database WordPress plugin through 1.0.8 does not have any authorisation as well as CSRF checks in its delete_cf7_data and export_cf7_data AJAX actions, available to any authenticated users, which could allow users with a role as low as subscriber to call them. The delete_cf7_data would lead to arbitrary metadata deletion, as well as PHP Object Injection if a suitable gadget chain is present in another plugin, as user data is passed to the maybe_unserialize() function without being first validated. | |||||
CVE-2021-24779 | 1 Wp Debugging Project | 1 Wp Debugging | 2022-10-24 | 4.3 MEDIUM | 6.5 MEDIUM |
The WP Debugging WordPress plugin before 2.11.0 has its update_settings() function hooked to admin_init and is missing any authorisation and CSRF checks, as a result, the settings can be updated by unauthenticated users. | |||||
CVE-2021-21382 | 1 Wire | 1 Restund | 2022-10-21 | 5.5 MEDIUM | 9.6 CRITICAL |
Restund is an open source NAT traversal server. The restund TURN server can be instructed to open a relay to the loopback address range. This allows you to reach any other service running on localhost which you might consider private. In the configuration that we ship (https://github.com/wireapp/ansible-restund/blob/master/templates/restund.conf.j2#L40-L43) the `status` interface of restund is enabled and is listening on `127.0.0.1`.The `status` interface allows users to issue administrative commands to `restund` like listing open relays or draining connections. It would be possible for an attacker to contact the status interface and issue administrative commands by setting `XOR-PEER-ADDRESS` to `127.0.0.1:{{restund_udp_status_port}}` when opening a TURN channel. We now explicitly disallow relaying to loopback addresses, 'any' addresses, link local addresses, and the broadcast address. As a workaround disable the `status` module in your restund configuration. However there might still be other services running on `127.0.0.0/8` that you do not want to have exposed. The `turn` module can be disabled. Restund will still perform STUN and this might already be enough for initiating calls in your environments. TURN is only used as a last resort when other NAT traversal options do not work. One should also make sure that the TURN server is set up with firewall rules so that it cannot relay to other addresses that you don't want the TURN server to relay to. For example other services in the same VPC where the TURN server is running. Ideally TURN servers should be deployed in an isolated fashion where they can only reach what they need to reach to perform their task of assisting NAT-traversal. | |||||
CVE-2020-25629 | 1 Moodle | 1 Moodle | 2022-10-21 | 6.5 MEDIUM | 8.8 HIGH |
A vulnerability was found in Moodle where users with "Log in as" capability in a course context (typically, course managers) may gain access to some site administration capabilities by "logging in as" a System manager. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. This is fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. | |||||
CVE-2022-3501 | 1 Otrs | 1 Otrs | 2022-10-20 | N/A | 7.5 HIGH |
Article template contents with sensitive data could be accessed from agents without permissions. | |||||
CVE-2022-42488 | 1 Openharmony | 1 Openharmony | 2022-10-17 | N/A | 7.8 HIGH |
OpenHarmony-v3.1.2 and prior versions have a Missing permission validation vulnerability in param service of startup subsystem. An malicious application installed on the device could elevate its privileges to the root user, disable security features, or cause DoS by disabling particular services. | |||||
CVE-2022-20430 | 1 Google | 1 Android | 2022-10-12 | N/A | 7.8 HIGH |
There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221233 | |||||
CVE-2022-20432 | 1 Google | 1 Android | 2022-10-12 | N/A | 7.8 HIGH |
There is an missing authorization issue in the system service. Since the component does not have permission check and permission protection,, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221899 | |||||
CVE-2022-20433 | 1 Google | 1 Android | 2022-10-12 | N/A | 7.8 HIGH |
There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221901 | |||||
CVE-2022-20434 | 1 Google | 1 Android | 2022-10-12 | N/A | 7.8 HIGH |
There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242244028 |