Vulnerability Summary for the Week of June 20, 2022

This article is contributed. See the original author and article here.

Rails::Html::Sanitizer — Rails::Html::Sanitizer
  # Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer’s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:“`ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [“select”, “style”]“`see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:“`<%= sanitize @comment.body, tags: [“select”, “style”] %>“`see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:“`ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [“select”, “style”]“`or“`ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [“select”, “style”])“`All users overriding the allowed tags by any of the above mechanisms to include both “select” and “style” should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user). 2022-06-24 not yet calculated CVE-2022-32209
MISC abb — multiple_products
  Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2, REX640 PCL3 allows an authenticated attacker to launch an attack against the user database file and try to take control of an affected system node. 2022-06-21 not yet calculated CVE-2022-1596
MISC adminer_login — adminer_login
  A vulnerability has been found in Adminer Login 1.4.4 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. 2022-06-20 not yet calculated CVE-2017-20066
N/A
N/A
N/A aio-libs — aiohttp
  ** DISPUTED ** AIOHTTP 3.8.1 can report a “ValueError: Invalid IPv6 URL” outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application. 2022-06-23 not yet calculated CVE-2022-33124
MISC algo_communication_products — 8373_ip_zone_paging_adapter_firmware
  Algo Communication Products Ltd. 8373 IP Zone Paging Adapter Firmware 1.7.6 allows attackers to perform a directory traversal via a web request sent to /fm-data.lua. 2022-06-23 not yet calculated CVE-2022-31395
MISC apache — multiple_products
  Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files. 2022-06-22 not yet calculated CVE-2022-32549
CONFIRM apache — tomcat
  In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability. 2022-06-23 not yet calculated CVE-2022-34305
CONFIRM
MLIST apache — www-data
  The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash). 2022-06-24 not yet calculated CVE-2022-2104
MISC apple — iphone
  ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to execute commands remotely. Exploit details have been disclosed to the public. The existence and implications of this vulnerability are doubted by Apple even though multiple public videos demonstrating the attack exist. Upgrading to version 13.0 migt be able to address this issue. It is recommended to upgrade affected devices. 2022-06-25 not yet calculated CVE-2019-25071
N/A
N/A
N/A argoproj — argo-cd
  Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. The fix for this vulnerability is available in versions 2.3.5, 2.2.10, 2.1.16, and later. There are no known workarounds. Users are recommended to upgrade. 2022-06-25 not yet calculated CVE-2022-31016
CONFIRM atlasvpn
— atlasvpn
  AtlasVPN – Privilege Escalation Lack of proper security controls on named pipe messages can allow an attacker with low privileges to send a malicious payload and gain SYSTEM permissions on a windows computer where the AtlasVPN client is installed. 2022-06-21 not yet calculated CVE-2022-23171
MISC autodesk — autocad
  A maliciously crafted JT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. 2022-06-21 not yet calculated CVE-2022-27867
MISC autodesk — autocad
  Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27871
MISC autodesk — autocad
  A maliciously crafted TGA file in Autodesk AutoCAD 2023 may be used to write beyond the allocated buffer while parsing TGA file. This vulnerability may be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27870
MISC autodesk — autocad
  A maliciously crafted TIFF file in Autodesk AutoCAD 2023 can be forced to read and write beyond allocated boundaries when parsing the TIFF file. This vulnerability can be exploited to execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27869
MISC autodesk — autocad
  A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. 2022-06-21 not yet calculated CVE-2022-27868
MISC autodesk — navisworks
  A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code. 2022-06-21 not yet calculated CVE-2022-27872
MISC bosch — ethernet_switch_pra-es8p2s
  The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 runs its web server with root privilege. In combination with CVE-2022-23534 this could give an attacker root access to the switch. 2022-06-23 not yet calculated CVE-2022-32535
CONFIRM bosch — ethernet_switch_pra-es8p2s
  The user access rights validation in the web server of the Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 was insufficient. This would allow a non-administrator user to obtain administrator user access rights. 2022-06-23 not yet calculated CVE-2022-32536
CONFIRM bosch — ethernet_switch_pra-es8p2s
  The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 and earlier was found to be vulnerable to command injection through its diagnostics web interface. This allows execution of shell commands. 2022-06-23 not yet calculated CVE-2022-32534
CONFIRM c_rehash — multiple_products
  In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze). 2022-06-21 not yet calculated CVE-2022-2068
CONFIRM
CONFIRM
CONFIRM
CONFIRM campcodes — simple_bakery_shop_management_system
  Multiple cross-site scripting (XSS) vulnerabilities in /bsms/?page=manage_account of Simple Bakery Shop Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username or Full Name fields. 2022-06-23 not yet calculated CVE-2022-32987
MISC
MISC cisco — adaptive_security_device_manager_(asdm)
  A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device. 2022-06-22 not yet calculated CVE-2022-20651
CISCO cisco — adaptive_security_device_manager_(asdm)
  A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM) images and the validation of those images by Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker with administrative privileges to upload an ASDM image that contains malicious code to a device that is running Cisco ASA Software. This vulnerability is due to insufficient validation of the authenticity of an ASDM image during its installation on a device that is running Cisco ASA Software. An attacker could exploit this vulnerability by installing a crafted ASDM image on the device that is running Cisco ASA Software and then waiting for a targeted user to access that device using ASDM. A successful exploit could allow the attacker to execute arbitrary code on the machine of the targeted user with the privileges of that user on that machine. Notes: To successfully exploit this vulnerability, the attacker must have administrative privileges on the device that is running Cisco ASA Software. Potential targets are limited to users who manage the same device that is running Cisco ASA Software using ASDM. Cisco has released and will release software updates that address this vulnerability. 2022-06-24 not yet calculated CVE-2022-20829
CISCO cisco — catalyst_2940_series_switches
  ** Unsupported When Assigned ** Cisco Catalyst 2940 Series Switches provided by Cisco Systems, Inc. contain a reflected cross-site scripting vulnerability regarding error page generation. An arbitrary script may be executed on the web browser of the user who is using the product. The affected firmware is prior to 12.2(50)SY released in 2011, and Cisco Catalyst 2940 Series Switches have been retired since January 2015. 2022-06-20 not yet calculated CVE-2022-31734
MISC
MISC cisco — firepower_software_for_adptive_security_appliancew_(asa)_firepower_module
  A vulnerability in the CLI parser of Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected ASA FirePOWER module as the root user. This vulnerability is due to improper handling of undefined command parameters. An attacker could exploit this vulnerability by using a crafted command on the CLI or by submitting a crafted HTTPS request to the web-based management interface of the Cisco ASA that is hosting the ASA FirePOWER module. Note: To exploit this vulnerability, the attacker must have administrative access to the Cisco ASA. A user who has administrative access to a particular Cisco ASA is also expected to have administrative access to the ASA FirePOWER module that is hosted by that Cisco ASA. 2022-06-24 not yet calculated CVE-2022-20828
CISCO cloudflare — warp_for_windows
  Cloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0. 2022-06-23 not yet calculated CVE-2022-2147
CONFIRM codesys — gateway_server
  In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password. 2022-06-24 not yet calculated CVE-2022-31802
CONFIRM codesys — gateway_server
  The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition. 2022-06-24 not yet calculated CVE-2022-31804
CONFIRM codesys — gateway_server
  In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact. 2022-06-24 not yet calculated CVE-2022-31803
CONFIRM codesys — multiple_products Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32141
CONFIRM codesys — multiple_products
  In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32136
CONFIRM codesys — multiple_products
  In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller. 2022-06-24 not yet calculated CVE-2022-31806
CONFIRM codesys — multiple_products
  Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-1965
CONFIRM codesys — multiple_products
  In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32137
CONFIRM codesys — multiple_products
  In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. 2022-06-24 not yet calculated CVE-2022-31805
CONFIRM codesys — multiple_products
  Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required. 2022-06-24 not yet calculated CVE-2022-32140
CONFIRM codesys — multiple_products
  Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required. 2022-06-24 not yet calculated CVE-2022-32142
CONFIRM codesys — multiple_products
  In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required 2022-06-24 not yet calculated CVE-2022-32143
CONFIRM codesys — multiple_products
  In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite. 2022-06-24 not yet calculated CVE-2022-32138
CONFIRM codesys — multiple_products
  In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required. 2022-06-24 not yet calculated CVE-2022-32139
CONFIRM comodo — antivirus
  Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder. 2022-06-21 not yet calculated CVE-2022-34008
MISC
MISC concretecms — concrete
  Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 allow traversal in /index.php/ccm/system/file/upload which could result in an Arbitrary File Delete exploit. This was remediated by sanitizing /index.php/ccm/system/file/upload to ensure Concrete doesn’t allow traversal and by changing isFullChunkFilePresent to have an early false return when input doesn’t match expectations.Concrete CMS Security team ranked this 5.8 with CVSS v3.1 vector AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H. Credit to Siebene for reporting. 2022-06-24 not yet calculated CVE-2022-30117
MISC
MISC
MISC concretecms — concretecms
  Title for CVE: XSS in /dashboard/system/express/entities/forms/save_control/[GUID]: old browsers only.Description: When using Internet Explorer with the XSS protection disabled, editing a form control in an express entities form for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 can allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. 2022-06-24 not yet calculated CVE-2022-30118
MISC
MISC
MISC concretecms — concretecms
  XSS in /dashboard/reports/logs/view – old browsers only. When using Internet Explorer with the XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 2 with CVSS v3.1 Vector AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N. Thanks zeroinside for reporting. 2022-06-24 not yet calculated CVE-2022-30119
MISC
MISC
MISC concretecms — concretecms
  XSS in /dashboard/blocks/stacks/view_details/ – old browsers only. When using an older browser with built-in XSS protection disabled, insufficient sanitation where built urls are outputted can be exploited for Concrete 8.5.7 and below as well as Concrete 9.0 through 9.0.2 to allow XSS. This cannot be exploited in modern-day web browsers due to an automatic input escape mechanism. Concrete CMS Security team ranked this vulnerability 3.1with CVSS v3.1 Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N. Sanitation has been added where built urls are output. Credit to Credit to Bogdan Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) for reporting 2022-06-24 not yet calculated CVE-2022-30120
MISC
MISC
MISC concretecms — concretecms
  Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520. 2022-06-24 not yet calculated CVE-2022-21829
MISC
MISC
MISC deep-get-set — deep-get-set All versions of package deep-get-set are vulnerable to Prototype Pollution via the ‘deep’ function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666) 2022-06-24 not yet calculated CVE-2022-21231
CONFIRM dell — bios
  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26864
MISC dell — bios
  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26863
MISC dell — bios
  Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. 2022-06-23 not yet calculated CVE-2022-26862
MISC dell — wms
  Dell WMS 3.6.1 and below contains a Path Traversal vulnerability in Device API. A remote attacker could potentially exploit this vulnerability, to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application. 2022-06-24 not yet calculated CVE-2022-29097
CONFIRM dell — wyse_management_suite
  Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in saveGroupConfigurations page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user’s web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. 2022-06-24 not yet calculated CVE-2022-29096
CONFIRM devolutions — remote_desktop_manager
  A path traversal issue in entry attachments in Devolutions Remote Desktop Manager before 2022.2 allows attackers to create or overwrite files in an arbitrary location. 2022-06-21 not yet calculated CVE-2022-33995
MISC diffy — diffy
  The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string. 2022-06-23 not yet calculated CVE-2022-33127
MISC
MISC discourse — discourse_chat_plugin
  discourse-chat is a chat plugin for the Discourse application. Versions prior to 0.4 are vulnerable to an exposure of sensitive information, where an attacker who knows the message ID for a channel they do not have access to can view that message using the chat message lookup endpoint, primarily affecting direct message channels. There are no known workarounds for this issue, and users are advised to update the plugin. 2022-06-21 not yet calculated CVE-2022-31095
CONFIRM django-navbar-client — django-navbar-client The django-navbar-client package of v0.9.50 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32996
MISC
MISC
MISC dominion — dominion_voting_systems_imagecast_x The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media. 2022-06-24 not yet calculated CVE-2022-1739
MISC dominion — dominion_voting_systems_imagecast_x
  The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization. 2022-06-24 not yet calculated CVE-2022-1747
MISC dominion — dominion_voting_systems_imagecast_x
  The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1741
MISC dominion — dominion_voting_systems_imagecast_x
  The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device. 2022-06-24 not yet calculated CVE-2022-1740
MISC dominion — dominion_voting_systems_imagecast_x
  The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment. 2022-06-24 not yet calculated CVE-2022-1746
MISC dominion — dominion_voting_systems_imagecast_x
  The tested version of Dominion Voting System ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS. 2022-06-24 not yet calculated CVE-2022-1743
MISC dominion — dominion_voting_systems_imagecast_x
  The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1742
MISC dominion — dominion_voting_systems_imagecast_x
  The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions. 2022-06-24 not yet calculated CVE-2022-1745
MISC dominion — dominion_voting_systems_imagecast_x
  Applications on the tested version of Dominion Voting Systems ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code. 2022-06-24 not yet calculated CVE-2022-1744
MISC dradispro — dradis_professional_edition Dradis Professional Edition before 4.3.0 allows attackers to change an account password via reusing a password reset token. 2022-06-24 not yet calculated CVE-2022-30028
MISC eagleget — downloader
  A local privilege escalation vulnerability was identified within the “luminati_net_updater_win_eagleget_com” service in EagleGet Downloader version 2.1.5.20 Stable. This issue allows authenticated non-administrative user to escalate their privilege and conduct code execution as a SYSTEM privilege. 2022-06-24 not yet calculated CVE-2020-21046
MISC
MISC eg350_eg_rgos
  RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulnerability via the function get_alarmAction at /alarm_pi/alarmService.php. 2022-06-25 not yet calculated CVE-2022-33128
MISC elefantcms — elefantcms
  A vulnerability was found in Elefant CMS 1.3.12-RC. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /designer/add/layout. The manipulation leads to code injection. The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20064
MISC
MISC elefantcms — elefantcms
  A vulnerability was found in Elefant CMS 1.3.12-RC and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20062
MISC
MISC elefantcms — elefantcms
  A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20061
MISC
MISC elefantcms — elefantcms
  A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20060
MISC
MISC elefantcms — elefantcms
  A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20059
MISC
MISC elefantcms — elefantcms
  A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20058
MISC
MISC elefantcms — elefantcms
  A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20057
MISC
MISC elefantcms — elefantcms
  A vulnerability was found in Elefant CMS 1.3.12-RC. It has been classified as critical. Affected is an unknown function of the file /filemanager/upload/drop of the component File Upload. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-20 not yet calculated CVE-2017-20063
MISC
MISC erpnext — erpnext
  In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. 2022-06-22 not yet calculated CVE-2022-23056
MISC
MISC erpnext — erpnext
  ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover. 2022-06-22 not yet calculated CVE-2022-23058
MISC
MISC erpnext — erpnext
  In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users. 2022-06-22 not yet calculated CVE-2022-23055
MISC
MISC erpnext — erpnext
  In ERPNext, versions v12.0.9–v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile. 2022-06-22 not yet calculated CVE-2022-23057
MISC
MISC espressif — bluetooth_meth_sdk
  ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware. 2022-06-25 not yet calculated CVE-2022-24893
CONFIRM ethereum — solidity Ethereum Solidity v0.8.14 contains an assertion failure via SMTEncoder::indexOrMemberAssignment() at SMTEncoder.cpp. 2022-06-23 not yet calculated CVE-2022-33069
MISC excellium — raytion Raytion 7.2.0 allows reflected Cross-site Scripting (XSS). 2022-06-25 not yet calculated CVE-2022-29931
MISC eyoucms — eyoucms
  A stored cross-site scripting (XSS) vulnerability in eyoucms v1.5.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL field under the login page. 2022-06-24 not yet calculated CVE-2022-33122
MISC ffmpeg — ffmpeg A vulnerability classified as critical has been found in FFmpeg 2.0. Affected is the function read_var_block_data. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125015
MISC
MISC ffmpeg — ffmpeg A vulnerability, which was classified as problematic, has been found in FFmpeg 2.0. Affected by this issue is the function output_frame of the file libavcodec/h264.c. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125006
MISC
MISC ffmpeg — ffmpeg
  A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is an unknown functionality of the component HEVC Video Decoder. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125014
MISC
MISC ffmpeg — ffmpeg
  A vulnerability classified as critical was found in FFmpeg 2.0. This vulnerability affects the function rpza_decode_stream. The manipulation leads to memory corruption. The attack can be initiated remotely. The name of the patch is Fixes Invalid Writes. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125017
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been rated as problematic. This issue affects the function ff_init_buffer_info of the file utils.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125016
MISC
MISC ffmpeg — ffmpeg
  A vulnerability, which was classified as problematic, was found in FFmpeg 2.0. This affects the function decode_nal_unit of the component Slice Segment Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125019
N/A
N/A ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function msrle_decode_frame of the file libavcodec/msrle.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125013
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is an unknown function of the file libavcodec/dxtroy.c. The manipulation leads to integer coercion error. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125012
MISC
MISC ffmpeg — ffmpeg
  A vulnerability has been found in FFmpeg 2.0 and classified as critical. This vulnerability affects the function decode_update_thread_context. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125020
N/A
N/A ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function decode_frame of the file libavcodec/ansi.c. The manipulation leads to integer coercion error. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125011
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function cmv_process_header. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125021
N/A
N/A ffmpeg — ffmpeg
  A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function add_yblock of the file libavcodec/snow.h. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125009
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function decode_slice_header of the file libavcodec/h64.c. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125010
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is the function shorten_decode_frame of the component Bitstream Buffer. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125022
N/A
N/A ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been declared as problematic. Affected by this vulnerability is the function truemotion1_decode_header of the component Truemotion1 Handler. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125023
N/A
N/A ffmpeg — ffmpeg
  A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125008
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function lag_decode_frame. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125024
N/A
N/A ffmpeg — ffmpeg
  A vulnerability classified as problematic was found in FFmpeg 2.0. Affected by this vulnerability is the function intra_pred of the file libavcodec/hevcpred_template.c. The manipulation leads to memory corruption. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125007
MISC
MISC ffmpeg — ffmpeg
  A vulnerability, which was classified as problematic, was found in FFmpeg 2.0. This affects the function decode_vol_header of the file libavcodec/mpeg4videodec.c. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125005
MISC
MISC ffmpeg — ffmpeg
  A vulnerability has been found in FFmpeg 2.0 and classified as problematic. This vulnerability affects the function decode_hextile of the file libavcodec/vmnc.c. The manipulation leads to memory corruption. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125004
MISC
MISC ffmpeg — ffmpeg
  A vulnerability classified as problematic has been found in FFmpeg 2.0. This affects the function decode_pulses. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125025
N/A
N/A ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0 and classified as problematic. This issue affects the function get_siz of the file libavcodec/jpeg2000dec.c. The manipulation leads to memory corruption. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125003
MISC
MISC ffmpeg — ffmpeg
  A vulnerability was found in FFmpeg 2.0. It has been classified as problematic. Affected is the function dnxhd_init_rc of the file libavcodec/dnxhdenc.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. 2022-06-18 not yet calculated CVE-2014-125002
MISC
MISC ffmpeg — ffmpeg
  A vulnerability, which was classified as problematic, has been found in FFmpeg 2.0. Affected by this issue is the function decode_slice_header. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. 2022-06-19 not yet calculated CVE-2014-125018
N/A
N/A flatpress — flatpress
  A stored cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content. 2022-06-23 not yet calculated CVE-2021-41432
MISC fujitsu — eternus_centricstor_cs8000
  An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands. 2022-06-20 not yet calculated CVE-2022-31794
MISC
MISC
MISC fujitsu — eternus_centricstor_cs8000
  An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands. 2022-06-20 not yet calculated CVE-2022-31795
MISC
MISC
MISC gitee — oneblog
  OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the parameter entryUrls. 2022-06-23 not yet calculated CVE-2022-34011
MISC gitee — oneblog
  OneBlog v2.3.4 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Logo parameter under the Link module. 2022-06-23 not yet calculated CVE-2022-34013
MISC gitee — oneblog
  Insecure permissions in OneBlog v2.3.4 allows low-level administrators to reset the passwords of high-level administrators who hold greater privileges. 2022-06-23 not yet calculated CVE-2022-34012
MISC glpi — glp-inventory-plugin
  ### Impact A plugin public script can be used to read content of system files. ### Patches Upgrade to version 1.0.2. ### Workarounds `b/deploy/index.php` file can be deleted if deploy feature is not used. 2022-06-20 not yet calculated CVE-2022-31062
CONFIRM gmbh — multiple_products
  An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. 2022-06-21 not yet calculated CVE-2022-31800
CONFIRM gmbh — multiple_products
  An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. 2022-06-21 not yet calculated CVE-2022-31801
CONFIRM gnome — gimp
  An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30 allows attackers to trigger an unhandled exception via a crafted XCF file, causing a Denial of Service (DoS). 2022-06-24 not yet calculated CVE-2022-32990
MISC google — go
  Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. 2022-06-23 not yet calculated CVE-2022-29526
MISC
MISC
MISC got — got
  The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. 2022-06-18 not yet calculated CVE-2022-33987
MISC
MISC
MISC habitica — habitica
  In habitica versions v4.119.0 through v4.232.2 are vulnerable to DOM XSS via the login page. 2022-06-22 not yet calculated CVE-2022-23077
CONFIRM
MISC habitica — habitica
  In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page. 2022-06-22 not yet calculated CVE-2022-23078
CONFIRM
MISC harfbuzz — harfbuzz
  An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33068
MISC
MISC hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical has been found in Hindu Matrimonial Script. This affects an unknown part of the file /admin/countrymanagement.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20069
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability was found in Hindu Matrimonial Script. It has been classified as critical. This affects an unknown part of the file /admin/payment.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20075
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability, which was classified as critical, was found in Hindu Matrimonial Script. This affects an unknown part of the file /admin/reports.php. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20081
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical was found in Hindu Matrimonial Script. Affected by this vulnerability is an unknown functionality of the file /admin/photo.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20079
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script A vulnerability classified as critical has been found in Hindu Matrimonial Script. Affected is an unknown function of the file /admin/featured.php. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20078
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability, which was classified as critical, has been found in Hindu Matrimonial Script. This issue affects some unknown processing of the file /admin/renewaldue.php. The manipulation leads to improper privilege management. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20071
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability was found in Hindu Matrimonial Script and classified as critical. Affected by this issue is some unknown functionality of the file /admin/newsletter1.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20074
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability was found in Hindu Matrimonial Script. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/. The manipulation of the argument username/password with the input ‘or”=’ leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20067
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/usermanagement.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20068
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability classified as critical was found in Hindu Matrimonial Script. This vulnerability affects unknown code of the file /admin/communitymanagement.php. The manipulation leads to improper privilege management. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20070
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability, which was classified as critical, has been found in Hindu Matrimonial Script. Affected by this issue is some unknown functionality of the file /admin/googleads.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20080
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability, which was classified as critical, was found in Hindu Matrimonial Script. Affected is an unknown function of the file /admin/generalsettings.php. The manipulation leads to improper privilege management. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20072
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability has been found in Hindu Matrimonial Script and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/cms.php. The manipulation leads to improper privilege management. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20073
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. This issue affects some unknown processing of the file /admin/success_story.php. The manipulation leads to improper privilege management. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20077
N/A
N/A hindu_matrimonial_script — hindu_matrimonial_script
  A vulnerability was found in Hindu Matrimonial Script. It has been declared as critical. This vulnerability affects unknown code of the file /admin/searchview.php. The manipulation leads to improper privilege management. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-21 not yet calculated CVE-2017-20076
N/A
N/A hpe — multiple_products
  A remote authentication bypass vulnerability was discovered in HPE Cray Legacy Shasta System Solutions; HPE Slingshot; and HPE Cray EX supercomputers versions: Prior to node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27; All Slingshot versions prior to 1.7.2; All versions of node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27. HPE has provided a software update to resolve this vulnerability in HPE Cray Legacy Shasta System Solutions, HPE Slingshot, and HPE Cray EX Supercomputers. 2022-06-24 not yet calculated CVE-2022-28620
MISC hpe — version_control_repository_manager
  A potential security vulnerability has been identified in the installer of HPE Version Control Repository Manager. The vulnerability could allow local escalation of privilege. HPE has made the following software update to resolve the vulnerability in HPE Version Control Repository Manager installer 7.6.14.0. 2022-06-24 not yet calculated CVE-2022-28619
MISC hyland — onbase_application_server
  The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are vulnerable to a username enumeration vulnerability. An attacker can obtain valid users based on the response returned for invalid and valid users by sending a POST login request to the /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory integrated systems. 2022-06-21 not yet calculated CVE-2022-23342
MISC
MISC ibm — cognos_analytics
  IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a low level user to obtain sensitive information from the details of the ‘Cloud Storage’ page for which they should not have access. IBM X-Force ID: 202682. 2022-06-24 not yet calculated CVE-2021-29768
CONFIRM
XF ibm — cognos_analytics
  IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238. 2022-06-24 not yet calculated CVE-2021-38945
CONFIRM
XF ibm — curam_social_program_management
  IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 218281. 2022-06-20 not yet calculated CVE-2022-22317
CONFIRM
XF ibm — curam_social_program_management
  IBM Curam Social Program Management 8.0.0 and 8.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. 2022-06-20 not yet calculated CVE-2022-22318
CONFIRM
XF ibm — jazz_team_server IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208345. 2022-06-24 not yet calculated CVE-2021-38871
XF
CONFIRM ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim’s click actions and possibly launch further attacks against the victim. IBM X-Force ID: 206091. 2022-06-24 not yet calculated CVE-2021-29865
XF
CONFIRM ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 194891. 2022-06-24 not yet calculated CVE-2021-20355
XF
CONFIRM ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 209057. 2022-06-24 not yet calculated CVE-2021-38879
CONFIRM
XF ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 199149. 2022-06-24 not yet calculated CVE-2021-20551
CONFIRM
XF ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 198931. 2022-06-24 not yet calculated CVE-2021-20544
XF
CONFIRM ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim’s Web browser within the security context of the hosting site. IBM X-Force ID: 198929. 2022-06-24 not yet calculated CVE-2021-20543
XF
CONFIRM ibm — jazz_team_server
  IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. 2022-06-24 not yet calculated CVE-2021-20421
CONFIRM
XF ibm — multiple_products IBM CICS TX Standard and Advanced 11.1 could allow a remote attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 227980. 2022-06-24 not yet calculated CVE-2022-31767
CONFIRM
CONFIRM
XF ibm — multiple_products IBM Planning Analytics 2.0 and IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214349. 2022-06-24 not yet calculated CVE-2021-39047
XF
CONFIRM
CONFIRM ibm — multiple_products
  IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may terminate abnormally when executing specially crafted SQL statements by an authenticated user. IBM X-Force ID: 2219740. 2022-06-24 not yet calculated CVE-2022-22389
XF
CONFIRM ibm — multiple_products
  IBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an information disclosure caused by improper privilege management when table function is used. IBM X-Force ID: 221973. 2022-06-24 not yet calculated CVE-2022-22390
CONFIRM
XF ibm — qradar_wincollect_agent
  IBM QRadar WinCollect Agent 10.0 and 10.0.1 could allow an attacker to obtain sensitive information due to missing best practices. IBM X-Force ID: 213549. 2022-06-21 not yet calculated CVE-2021-39006
CONFIRM
XF ibm — robotic_process
  IBM Robotic Process Automation 21.0.1 and 21.0.2 could allow a user with psychical access to the system to obtain sensitive information due to insufficiently protected access tokens. IBM X-Force ID: 229198. 2022-06-24 not yet calculated CVE-2022-33953
CONFIRM
XF ibm — robotic_process_automation
  IBM Robotic Process Automation 21.0.2 could allow a local user to obtain sensitive web service configuration credentials from system memory. IBM X-Force ID: 223026. 2022-06-20 not yet calculated CVE-2022-22414
XF
CONFIRM ibm — robotic_process_automation
  IBM Robotic Process Automation 21.0.1 and 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227124. 2022-06-24 not yet calculated CVE-2022-22502
XF
CONFIRM ideaco — idealms IdeaLMS 2022 allows reflected Cross Site Scripting (XSS) via the IdeaLMS/Class/Assessment/ PATH_INFO. 2022-06-21 not yet calculated CVE-2022-31786
MISC ideaco — ideatms
  IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO 2022-06-23 not yet calculated CVE-2022-31787
MISC
MISC illumina — lrm  LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network. 2022-06-24 not yet calculated CVE-2022-1517
MISC illumina — lrm 
  LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit. 2022-06-24 not yet calculated CVE-2022-1519
MISC illumina — lrm 
  LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data. 2022-06-24 not yet calculated CVE-2022-1521
MISC illumina — lrm 
  LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials. 2022-06-24 not yet calculated CVE-2022-1524
MISC illumina — lrm 
  LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure. 2022-06-24 not yet calculated CVE-2022-1518
MISC instagram — alpine_phototile_for_instagram_plugin
  A vulnerability, which was classified as problematic, has been found in Alpine PhotoTile for Instagram Plugin 1.2.7.7. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. 2022-06-23 not yet calculated CVE-2017-20087
N/A
N/A inventree — inventree
  Denial of Service in GitHub repository inventree/inventree prior to 0.8.0. 2022-06-20 not yet calculated CVE-2022-2134
CONFIRM
MISC jenkins — agent_server_parameter_plugin
  Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34183
CONFIRM jenkins — beaker_builder_plugin
  A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34207
CONFIRM jenkins — beaker_builder_plugin
  A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34208
CONFIRM jenkins — convertigo_mobile_platform_plugin
  A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34201
CONFIRM jenkins — convertigo_mobile_platform_plugin
  A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34200
CONFIRM jenkins — convertigo_mobile_platform_plugin
  Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34199
CONFIRM jenkins — crx_content_package_deployer_plugin Jenkins CRX Content Package Deployer Plugin 1.9 and earlier does not escape the name and description of CRX Content Package Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34184
CONFIRM jenkins — date_parameter_lugin Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34185
CONFIRM jenkins — dynamic_extended_choice_parameter_plugin Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34186
CONFIRM jenkins — eadonly_parameter_plugin Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34194
CONFIRM jenkins — easyqa_plugin Jenkins EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34202
CONFIRM jenkins — easyqa_plugin A cross-site request forgery (CSRF) vulnerability in Jenkins EasyQA Plugin 1.0 and earlier allows attackers to connect to an attacker-specified HTTP server. 2022-06-23 not yet calculated CVE-2022-34203
CONFIRM jenkins — easyqa_plugin
  A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server. 2022-06-23 not yet calculated CVE-2022-34204
CONFIRM jenkins — embeddable_build_status_plugin Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a ‘link’ query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34178
CONFIRM jenkins — embeddable_build_status_plugin
  Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34179
CONFIRM jenkins — embeddable_build_status_plugin
  Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for “unprotected” status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build. 2022-06-23 not yet calculated CVE-2022-34180
CONFIRM jenkins — filesystem_list_paraeter_plugin
  Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34187
CONFIRM jenkins — hidden_parameter_plugin Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34188
CONFIRM jenkins — image_tag_parameter_plugin
  Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34189
CONFIRM jenkins — jenkins Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view. 2022-06-23 not yet calculated CVE-2022-34175
CONFIRM jenkins — jenkins
  In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of ‘tooltip’ parameters, resulting in a cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34172
CONFIRM jenkins — jenkins
  In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2022-06-23 not yet calculated CVE-2022-34173
CONFIRM jenkins — jianliao_notification_plugin A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34206
CONFIRM jenkins — jianliao_notification_plugin
  A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34205
CONFIRM jenkins — junit_plugin
  Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. 2022-06-23 not yet calculated CVE-2022-34176
CONFIRM jenkins — maven_metadata_plugin_for_jenkins_ci_server_plugin
  Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34190
CONFIRM jenkins — multiple_products In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2022-06-23 not yet calculated CVE-2022-34170
CONFIRM jenkins — multiple_products In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. 2022-06-23 not yet calculated CVE-2022-34174
CONFIRM jenkins — multiple_products
  In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the ‘title’ attribute of ‘l:ionicon’ (until Jenkins 2.334) and ‘alt’ attribute of ‘l:icon’ (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34171
CONFIRM jenkins — nested_view_plugin
  Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability. 2022-06-23 not yet calculated CVE-2022-34182
CONFIRM jenkins — ns-nd_integration_performance_publisher_plugin
  Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34191
CONFIRM jenkins — ontrack_jenkins_plugin Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34192
CONFIRM jenkins — package_version_plugin Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34193
CONFIRM jenkins — pipeline_input_step_plugin
  Jenkins Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier archives files uploaded for `file` parameters for Pipeline `input` steps on the controller as part of build metadata, using the parameter name without sanitization as a relative path inside a build-related directory, allowing attackers able to configure Pipelines to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content. 2022-06-23 not yet calculated CVE-2022-34177
CONFIRM jenkins — repository_connector_plugin
  Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34195
CONFIRM jenkins — rest_list_parameter_plugin Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34196
CONFIRM jenkins — sauce_ondemand_plugin
  Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34197
CONFIRM jenkins — stash_branch_parameter_plugin
  Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. 2022-06-23 not yet calculated CVE-2022-34198
CONFIRM jenkins — threadfix_plugin A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34209
CONFIRM jenkins — threadfix_plugin A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34210
CONFIRM jenkins — vrealize_orchestrator_plugin
  A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34211
CONFIRM jenkins — vrealize_orchestrator_plugin
  A missing permission check in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request to an attacker-specified URL. 2022-06-23 not yet calculated CVE-2022-34212
CONFIRM jenkins — xunit_plugin
  Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn’t exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory. 2022-06-23 not yet calculated CVE-2022-34181
CONFIRM jenkins — squash_tm_publisher_(squash4jenkins)_plugin
  Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. 2022-06-23 not yet calculated CVE-2022-34213
CONFIRM jerryscript — jerryscript
  There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_type in JerryScript 2.4.0 2022-06-20 not yet calculated CVE-2021-41683
MISC jerryscript — jerryscript
  There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0 2022-06-20 not yet calculated CVE-2021-41682
MISC jflyfox — jfinal_cms
  Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module. 2022-06-23 not yet calculated CVE-2022-33113
MISC jflyfox — jfinal_cms
  Jfinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via the attrVal parameter at /jfinal_cms/system/dict/list. 2022-06-23 not yet calculated CVE-2022-33114
MISC jung — smart_visu_server
  A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20082
N/A
N/A jung — smart_visu_server
  A vulnerability, which was classified as critical, was found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. Affected is an unknown function of the component SSH Server. The manipulation leads to backdoor. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20083
N/A
N/A jung — smart_visu_server
  A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-22 not yet calculated CVE-2017-20084
N/A
N/A knot_resolver — knot_resolver Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters. 2022-06-20 not yet calculated CVE-2022-32983
MISC
MISC krcert/cc — maxboard
  Stored XSS and SQL injection vulnerability in MaxBoard could lead to occur Remote Code Execution, which could lead to information exposure and privilege escalation. 2022-06-23 not yet calculated CVE-2021-26636
MISC laiketui — laiketui
  Laiketui 3.5.0 is affected by an arbitrary file upload vulnerability that can allow an attacker to execute arbitrary code. 2022-06-23 not yet calculated CVE-2021-40954
MISC laiketui — laiketui
  LaiKetui v3.5.0 has SQL injection in the background through the menu management function, and sensitive data can be obtained. 2022-06-23 not yet calculated CVE-2021-40956
MISC laiketui — laiketui
  SQL injection exists in LaiKetui v3.5.0 the background administrator list. 2022-06-23 not yet calculated CVE-2021-40955
MISC libdwarf — libdwarf
  There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b. 2022-06-23 not yet calculated CVE-2022-34299
MISC
MISC libjpeg-turbo — libjpeg-turbo
  The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c. 2022-06-18 not yet calculated CVE-2021-46822
MISC
MISC libjxl — libjxl
  libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc. 2022-06-19 not yet calculated CVE-2022-34000
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c. 2022-06-23 not yet calculated CVE-2022-33034
MISC libredwg — libredwg
  There is an Assertion `int decode_preR13_entities(BITCODE_RL, BITCODE_RL, unsigned int, BITCODE_RL, BITCODE_RL, Bit_Chain *, Dwg_Data *’ failed at dwg2dxf: decode.c:5801 in libredwg v0.12.4.4608. 2022-06-23 not yet calculated CVE-2022-33024
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c. 2022-06-23 not yet calculated CVE-2022-33025
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a double-free via the function dwg_read_file at dwg.c. 2022-06-23 not yet calculated CVE-2022-33033
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a heap-buffer-overflow via the function decode_preR13_section_hdr at decode_r11.c. 2022-06-23 not yet calculated CVE-2022-33032
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c. 2022-06-23 not yet calculated CVE-2022-33028
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function dwg_add_handleref at dwg.c. 2022-06-23 not yet calculated CVE-2022-33027
MISC libredwg — libredwg
  LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c. 2022-06-23 not yet calculated CVE-2022-33026
MISC linux — kernel
  drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. 2022-06-18 not yet calculated CVE-2022-33981
MISC
MISC
MISC
MISC lrzip — lrzip Lrzip v0.651 was discovered to contain multiple invalid arithmetic shifts via the functions get_magic in lrzip.c and Predictor::init in libzpaq/libzpaq.cpp. These vulnerabilities allow attackers to cause a Denial of Service via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33067
MISC maccmspro — maccms10
  maccms10 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field. 2022-06-21 not yet calculated CVE-2022-31303
MISC maccmspro — maccms8 maccms8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Server Group text field. 2022-06-21 not yet calculated CVE-2022-31302
MISC mahara — mahara In Mahara 21.04 before 21.04.6, 21.10 before 21.10.4, and 22.04.2, files can sometimes be downloaded through thumb.php with no permission check. 2022-06-20 not yet calculated CVE-2022-33913
CONFIRM mantisbt — mantisbt
  An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute. 2022-06-24 not yet calculated CVE-2022-33910
CONFIRM
MISC
MISC mautic — mautic
  A cross-site scripting (XSS) vulnerability in the web tracking component of Mautic before 4.3.0 allows remote attackers to inject executable javascript 2022-06-20 not yet calculated CVE-2022-25772
MISC mcafee — consumer_product_removal_tool
  Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file. 2022-06-20 not yet calculated CVE-2022-1823
CONFIRM mcafee — consumer_product_removal_tool
  An uncontrolled search path vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local attacker to perform a sideloading attack by using a specific file name. This could result in the user gaining elevated permissions and being able to execute arbitrary code as there were insufficient checks on the executable being signed by McAfee. 2022-06-20 not yet calculated CVE-2022-1824
CONFIRM melag{_ftp_server — melag_ftp_server
  MELAG FTP Server 2.2.0.4 allows an attacker to use the CWD command to break out of the FTP servers root directory and operate on the entire operating system, while the access restrictions of the user running the FTP server apply. 2022-06-24 not yet calculated CVE-2021-41636
MISC melag{_ftp_server — melag_ftp_server
  A user enumeration vulnerability in MELAG FTP Server 2.2.0.4 allows an attacker to identify valid FTP usernames. 2022-06-24 not yet calculated CVE-2021-41634
MISC melag{_ftp_server — melag_ftp_server
  When installed as Windows service MELAG FTP Server 2.2.0.4 is run as SYSTEM user, which grants remote attackers to abuse misconfigurations or vulnerabilities with administrative access over the entire host system. 2022-06-24 not yet calculated CVE-2021-41635
MISC melag{_ftp_server — melag_ftp_server
  MELAG FTP Server 2.2.0.4 stores unencrpyted passwords of FTP users in a local configuration file. 2022-06-24 not yet calculated CVE-2021-41639
MISC melag{_ftp_server — melag_ftp_server
  Weak access control permissions in MELAG FTP Server 2.2.0.4 allow the “Everyone” group to read the local FTP configuration file, which includes among other information the unencrypted passwords of all FTP users. 2022-06-24 not yet calculated CVE-2021-41637
MISC melag{_ftp_server — melag_ftp_server
  The authentication checks of the MELAG FTP Server in version 2.2.0.4 are incomplete, which allows a remote attacker to access local files only by using a valid username. 2022-06-24 not yet calculated CVE-2021-41638
MISC mend – mend
  In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Stored XSS. 2022-06-22 not yet calculated CVE-2022-32159
MISC
CONFIRM mend — directus
  In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans. 2022-06-22 not yet calculated CVE-2022-23080
MISC
CONFIRM mend — openlibrary
  In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Reflected XSS. 2022-06-22 not yet calculated CVE-2022-23081
MISC
CONFIRM mend — recipes
  In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23073
MISC
MISC mend — recipes
  In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23074
MISC
MISC mend — recipes
  In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in “Add to Cart” functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the Add to Shopping Cart icon, an XSS payload will trigger. A low privileged attacker will have the victim’s API key and can lead to admin’s account takeover. 2022-06-21 not yet calculated CVE-2022-23072
MISC
CONFIRM mend — recipes
  In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the “Import Recipe” functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information. 2022-06-19 not yet calculated CVE-2022-23071
MISC
MISC meridian_cooperative — utility_software
  Meridian Cooperative Utility Software versions 22.02 and 22.03 allows remote attackers to obtain sensitive information such as name, address, and daily energy usage. 2022-06-24 not yet calculated CVE-2022-29578
MISC mgm — bigbluebutton
  BigBlueButton version 2.4.7 (or earlier) is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality. A threat actor could inject JavaScript payload in his/her username. The payload gets executed in the browser of the victim each time the attacker sends a private message to the victim or when notification about the attacker leaving room is displayed. 2022-06-24 not yet calculated CVE-2022-27238
MISC microweber — microweber
  Cross-site Scripting (XSS) – Reflected in GitHub repository microweber/microweber prior to 1.2.18. 2022-06-22 not yet calculated CVE-2022-2174
CONFIRM
MISC microweber — microweber
  Cross-site Scripting (XSS) – Reflected in GitHub repository microweber/microweber prior to 1.2.17. 2022-06-20 not yet calculated CVE-2022-2130
MISC
CONFIRM minicms — minicms
  A Cross-Site Request Forgery (CSRF) in MiniCMS v1.11 allows attackers to arbitrarily delete local .dat files via clicking on a malicious link. 2022-06-24 not yet calculated CVE-2022-33121
MISC motor-admin — motor-admin
  In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim. 2022-06-22 not yet calculated CVE-2022-23079
MISC
CONFIRM nginx — njs Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c. 2022-06-21 not yet calculated CVE-2022-31306
MISC
MISC nginx — njs
  Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c. 2022-06-21 not yet calculated CVE-2022-31307
MISC
MISC nginx — njs 
  Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c. 2022-06-21 not yet calculated CVE-2022-32414
MISC
MISC nukeviet — nukeviet
  There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02. 2022-06-21 not yet calculated CVE-2022-30874
MISC nuuo — network_video_recorder_nvrsolo NUUO Network Video Recorder NVRsolo v03.06.02 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via login.php. 2022-06-21 not yet calculated CVE-2022-33119
MISC obda_systems — mastro
  XML eXternal Entity (XXE) in OBDA systems’ Mastro 1.0 allows remote attackers to read system files via custom DTDs. 2022-06-21 not yet calculated CVE-2021-40510
MISC
MISC obda_systems — mastro
  OBDA systems’ Mastro 1.0 is vulnerable to XML Entity Expansion (aka “billion laughs”) attack allowing denial of service. 2022-06-21 not yet calculated CVE-2021-40511
MISC
MISC offis — dcmtk
  OFFIS DCMTK’s (All versions prior to 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. 2022-06-24 not yet calculated CVE-2022-2120
MISC offis — dcmtk
  OFFIS DCMTK’s (All versions prior to 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition. 2022-06-24 not yet calculated CVE-2022-2121
MISC offis — dcmtk
  OFFIS DCMTK’s (All versions prior to 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an attacker to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution. 2022-06-24 not yet calculated CVE-2022-2119
MISC online_student_rate_system — online_student_rate_system
  Cross Site Scripting (XSS) vulnerability exists in Online Student Rate System 1.0 via the page parameter on the index.php file 2022-06-24 not yet calculated CVE-2021-39408
MISC online_student_rate_system — online_student_rate_system
  A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated. 2022-06-24 not yet calculated CVE-2021-39409
MISC open_identity_platfor — openam
  The NT auth module in OpenAM before 14.6.6 allows a “replace Samba username attack.” 2022-06-23 not yet calculated CVE-2022-34298
MISC
MISC
MISC opencart
— opencart
  In OpenCart 1.4.7 to 1.5.5.1, implemented anti-traversal code in filemanager.php is ineffective and can be bypassed. 2022-06-24 not yet calculated CVE-2013-1891
MISC
MISC
MISC pain_clown — 74cmsse 74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/index. 2022-06-23 not yet calculated CVE-2022-33092
MISC pain_clown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the key parameter at /freelance/resume_list. 2022-06-23 not yet calculated CVE-2022-33093
MISC pain_clown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/campus/campus_job. 2022-06-23 not yet calculated CVE-2022-33097
MISC pain_clown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/resume/index. 2022-06-23 not yet calculated CVE-2022-33096
MISC pain_clown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/jobfairol/resumelist. 2022-06-23 not yet calculated CVE-2022-33095
MISC pain_clown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /home/job/map. 2022-06-23 not yet calculated CVE-2022-33094
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /job. 2022-06-23 not yet calculated CVE-2022-32125
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company. 2022-06-23 not yet calculated CVE-2022-32126
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/view_be_browsed/total. 2022-06-23 not yet calculated CVE-2022-32127
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/service/increment/add/im. 2022-06-23 not yet calculated CVE-2022-32128
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade. 2022-06-23 not yet calculated CVE-2022-32129
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/down_resume/total/nature. 2022-06-23 not yet calculated CVE-2022-32130
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /index/notice/show. 2022-06-23 not yet calculated CVE-2022-32131
MISC painclown — 74cmsse
  74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /index/jobfairol/show/. 2022-06-23 not yet calculated CVE-2022-32124
MISC phabricator — mediawiki
  In the RSS extension for MediaWiki through 1.38.1, when the $wgRSSAllowLinkTag config variable was set to true, and a new RSS feed was created with certain XSS payloads within its description tags and added to the $wgRSSUrlWhitelist config variable, stored XSS could occur via MediaWiki’s template system whenever that feed was loaded via the rss document tag. 2022-06-25 not yet calculated CVE-2022-34491
MISC
MISC pmb — pmb
  PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see request to index.php. 2022-06-23 not yet calculated CVE-2022-34328
MISC polonel — trudesk
  Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4. 2022-06-20 not yet calculated CVE-2022-2128
MISC
CONFIRM polonel — trudesk
  Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4. 2022-06-20 not yet calculated CVE-2022-2023
CONFIRM
MISC protobuf — protobuf Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. 2022-06-23 not yet calculated CVE-2022-33070
MISC
MISC pure_storage — multiple_products Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to a privilege escalation via the manipulation of environment variables which can be exploited by a logged-in user to escape a restricted shell to an unrestricted shell with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32553
MISC pure_storage — multiple_products
  Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32554
MISC pure_storage — multiple_products
  Pure Storage FlashArray products running Purity//FA 6.2.0 – 6.2.3, 6.1.0 – 6.1.12, 6.0.0 – 6.0.8, 5.3.0 – 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 – 3.2.4, 3.1.0 – 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to a privilege escalation via the manipulation of Python environment variables which can be exploited by a logged-in user to escape a restricted shell to an unrestricted shell with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. 2022-06-23 not yet calculated CVE-2022-32552
MISC pypi — pypi The Togglee package in PyPI version v0.0.8 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34060
MISC
MISC
MISC pypi — pypi The Beginner package in PyPI v0.0.2 to v0.0.4 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33004
MISC
MISC
MISC pypi — pypi The Scoptrial package in PyPI version v0.0.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34057
MISC
MISC pypi — pypi The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32999
MISC
MISC
MISC pypi — pypi The Texercise package in PyPI v0.0.1 to v0.0.12 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34066
MISC
MISC
MISC pypi — pypi The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32997
MISC
MISC
MISC pypi — pypi The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34055
MISC
MISC
MISC pypi — pypi
  The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33003
MISC
MISC
MISC pypi — pypi
  The KGExplore package in PyPI v0.1.1 to v0.1.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33002
MISC
MISC
MISC pypi — pypi
  The ML-Scanner package in PyPI v0.1.0 to v0.1.5 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33000
MISC
MISC
MISC pypi — pypi
  The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-32998
MISC
MISC
MISC pypi — pypi
  The DR-Web-Engine package in PyPI v0.2.0b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34053
MISC
MISC
MISC pypi — pypi
  The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-33001
MISC
MISC
MISC pypi — pypi
  The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34054
MISC
MISC
MISC pypi — pypi
  The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34064
MISC
MISC pypi — pypi
  The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34056
MISC
MISC
MISC pypi — pypi
  The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34059
MISC
MISC
MISC pypi — pypi
  The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34061
MISC
MISC
MISC pypi — pypi
  The Rondolu-YT-Concate package in PyPI v0.1.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. 2022-06-24 not yet calculated CVE-2022-34065
MISC
MISC
MISC pypl — pypl
  ** Reserved ** The pyesasky for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.0-1.4.2. 2022-06-24 not yet calculated CVE-2022-30885
MISC
MISC
MISC python-ldap — python-ldap python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a denial of service condition. 2022-06-18 not yet calculated CVE-2021-46823
MISC
MISC qlik — qlik The GeoAnalytics feature in Qlik Sense April 2020 patch 4 allows SSRF. 2022-06-21 not yet calculated CVE-2021-36761
MISC quectel — rg502q-ea_modem
  The Quectel RG502Q-EA modem before 2022-02-23 allow OS Command Injection. 2022-06-21 not yet calculated CVE-2022-26147
MISC realtek — usb_driver
  Realtek USB driver has a buffer overflow vulnerability due to insufficient parameter length verification in the API function. An unauthenticated LAN attacker can exploit this vulnerability to disrupt services. 2022-06-20 not yet calculated CVE-2022-21742
MISC red_hat — amq_broker_operator
  A flaw was found in AMQ Broker Operator 7.9.4 installed via UI using OperatorHub where a low-privilege user that has access to the namespace where the AMQ Operator is deployed has access to clusterwide edit rights by checking the secrets. The service account used for building the Operator gives more permission than expected and an attacker could benefit from it. This requires at least an already compromised low-privilege account or insider attack. 2022-06-21 not yet calculated CVE-2022-1833
MISC red_hat — enterprise linux_for_ibm
  A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn’t. These kernel builds don’t have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code. 2022-06-21 not yet calculated CVE-2022-1665
MISC redis — redis Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. 2022-06-23 not yet calculated CVE-2022-33105
MISC
MISC
MISC
MISC salt — saltstack_salt
  An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth. 2022-06-23 not yet calculated CVE-2022-22967
MISC
MISC schneider_electric — geo_scada_mobile
  A CWE-668 Exposure of Resource to Wrong Sphere vulnerability exists that could cause users to be misled, hiding alarms, showing the wrong server connection option or the wrong control request when a mobile device has been compromised by a malicious application. Affected Product: Geo SCADA Mobile (Build 222 and prior) 2022-06-24 not yet calculated CVE-2022-32530
CONFIRM secheron — SEPCOS Control and Protection Relay Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed. 2022-06-24 not yet calculated CVE-2022-2102
MISC secheron — SEPCOS Control and Protection Relay
  The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool. 2022-06-24 not yet calculated CVE-2022-1666
MISC secheron — SEPCOS Control and Protection Relay
  An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories. 2022-06-24 not yet calculated CVE-2022-2103
MISC secheron — SEPCOS Control and Protection Relay
  Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters. 2022-06-24 not yet calculated CVE-2022-2105
MISC secheron — SEPCOS Control and Protection Relay
  Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script 2022-06-24 not yet calculated CVE-2022-1667
MISC secheron — SEPCOS Control and Protection Relay
  Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH. 2022-06-24 not yet calculated CVE-2022-1668
MISC securylight — ispyconnet_ispy
  iSpyConnect iSpy v7.2.2.0 is vulnerable to path traversal. 2022-06-21 not yet calculated CVE-2022-29774
MISC
MISC securylight — ispyconnet_ispy
  iSpyConnect iSpy v7.2.2.0 allows attackers to bypass authentication via a crafted URL. 2022-06-21 not yet calculated CVE-2022-29775
MISC
MISC shina_systems — sihas_sgw-300
  There is no account authentication and permission check logic in the firmware and existing apps of SiHAS’s SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device. 2022-06-23 not yet calculated CVE-2021-26637
MISC siemens — simatic_wincc_oa
  A vulnerability has been identified in SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated. 2022-06-21 not yet calculated CVE-2022-33139
MISC solarview_compact — solarview An arbitrary file upload vulnerability /images/background/1.php in of SolarView Compact 6.0 allows attackers to execute arbitrary code via a crafted php file. 2022-06-21 not yet calculated CVE-2022-31374
MISC solarview_compact — solarview
  SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Solar_AiConf.php. 2022-06-21 not yet calculated CVE-2022-31373
MISC sourcecodester — online_railway_reseration_system
  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/reservations/view_details.php. 2022-06-21 not yet calculated CVE-2022-33048
MISC sourcecodester — online_railway_reseration_system
  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/?page=user/manage_user. 2022-06-21 not yet calculated CVE-2022-33049
MISC sourcecodester — online_railway_reseration_system
  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/trains/manage_train.php. 2022-06-21 not yet calculated CVE-2022-33055
MISC sourcecodester — online_railway_reseration_system
  Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /orrs/admin/schedules/manage_schedule.php. 2022-06-21 not yet calculated CVE-2022-33056
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/prisons/view_prison.php:4 2022-06-24 not yet calculated CVE-2022-32405
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/prisons/manage_prison.php:4 2022-06-24 not yet calculated CVE-2022-32402
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_record.php:4 2022-06-24 not yet calculated CVE-2022-32403
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_inmate.php:3 2022-06-24 not yet calculated CVE-2022-32404
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/crimes/view_crime.php:4 2022-06-24 not yet calculated CVE-2022-32399
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/cells/manage_cell.php:4 2022-06-24 not yet calculated CVE-2022-32398
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/visits/view_visit.php:4 2022-06-24 not yet calculated CVE-2022-32397
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/manage_privilege.php:4 2022-06-24 not yet calculated CVE-2022-32401
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/visits/manage_visit.php:4 2022-06-24 not yet calculated CVE-2022-32396
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/user/manage_user.php:4. 2022-06-24 not yet calculated CVE-2022-32400
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/crimes/manage_crime.php:4 2022-06-24 not yet calculated CVE-2022-32395
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/inmates/view_inmate.php:3 2022-06-24 not yet calculated CVE-2022-32394
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/cells/view_cell.php:4 2022-06-24 not yet calculated CVE-2022-32393
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/actions/manage_action.php:4 2022-06-24 not yet calculated CVE-2022-32392
MISC
MISC sourcecodester — prison_management_system
  Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the ‘id’ parameter at /pms/admin/actions/view_action.php:4 2022-06-24 not yet calculated CVE-2022-32391
MISC
MISC sourcecodester — school_file_management_system
  Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Firtstname parameter to the Update Account form in student_profile.php. 2022-06-23 not yet calculated CVE-2021-29055
MISC
MISC sourcecodester — school_file_management_system
  Cross Site Scripting (XSS) vulnerability in sourcecodester School File Management System 1.0 via the Lastname parameter to the Update Account form in student_profile.php. 2022-06-23 not yet calculated CVE-2021-46824
MISC
MISC
MISC srsolutions — usertakeover_plugin
  The UserTakeOver plugin before 4.0.1 for ILIAS allows an attacker to list all users via the search function. 2022-06-21 not yet calculated CVE-2022-31478
MISC
MISC suse — manager_server
  An Uncontrolled Resource Consumption vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37. 2022-06-22 not yet calculated CVE-2022-21952
CONFIRM suse — multiple_products
  A Observable Response Discrepancy vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to discover valid usernames. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46-1. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37-1. 2022-06-22 not yet calculated CVE-2022-31248
CONFIRM swascan — docebo_community_edition
  ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain an arbitrary file upload vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2022-06-23 not yet calculated CVE-2022-31362
MISC
MISC swascan — docebo_community_edition
  ** UNSUPPORTED WHEN ASSIGNED ** Docebo Community Edition v4.0.5 and below was discovered to contain a SQL injection vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2022-06-23 not yet calculated CVE-2022-31361
MISC
MISC symantec_corporation — smg
  A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access. 2022-06-24 not yet calculated CVE-2021-30651
MISC sysaid — okta_sso
  SysAid – Okta SSO integration – was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter’s value and searching for the AssertionConsumerServiceURL parameter’s value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks. 2022-06-24 not yet calculated CVE-2022-23170
MISC telesoft — vitalpbx
  Missing access control in the backup system of Telesoft VitalPBX before 3.2.1 allows attackers to access the PJSIP and SIP extension credentials, cryptographic keys and voicemails files via unspecified vectors. 2022-06-24 not yet calculated CVE-2022-29330
MISC
MISC tenable — tns An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges. 2022-06-21 not yet calculated CVE-2022-32973
MISC tenable — tns
  An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials. 2022-06-21 not yet calculated CVE-2022-32974
MISC thales — multiple_products
  Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command execution with high privileges. 2022-06-24 not yet calculated CVE-2021-42056
MISC tinyexr — tinyexr
  In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData. 2022-06-23 not yet calculated CVE-2022-34300
MISC titanftp — nextgen
  An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation. 2022-06-19 not yet calculated CVE-2022-34005
MISC titanftp — nextgen
  An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTINUsers as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITYSYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation. 2022-06-19 not yet calculated CVE-2022-34006
MISC totd — totd
  totd before 1.5.3 does not properly randomize mesg IDs. 2022-06-23 not yet calculated CVE-2022-34295
MISC
MISC
MISC
MISC twcert/cc — asus_control_center
  ASUS Control Center is vulnerable to SQL injection. An authenticated remote attacker with general user privilege can inject SQL command to specific API parameters to acquire database schema or access data. 2022-06-20 not yet calculated CVE-2022-26669
MISC twcert/cc — asus_control_center_api
  ASUS Control Center API has a broken access control vulnerability. An unauthenticated remote attacker can call privileged API functions to perform partial system operations or cause partial disrupt of service. 2022-06-20 not yet calculated CVE-2022-26668
MISC twcert/cc — twcert/cc
  NHI’s health insurance web service component has insufficient validation for input string length, which can result in heap-based buffer overflow attack. A remote attacker can exploit this vulnerability to flood the memory space reserved for the program, in order to terminate service without authentication, which requires a system restart to recover service. 2022-06-20 not yet calculated CVE-2021-45918
MISC underscore-99xp — underscore-99xp
  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in underscore-99xp v1.7.2 when the deepValueSearch function is called. 2022-06-24 not yet calculated CVE-2021-40894
MISC union-home — unioncms
  Unioncms v1.0.13 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Default settings. 2022-06-21 not yet calculated CVE-2022-25585
MISC
MISC validate-color — validate-color
  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-color v2.1.0 when handling crafted invalid rgb(a) strings. 2022-06-24 not yet calculated CVE-2021-40892
MISC validate-color — validate-color
  A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-data v0.1.1 when validating crafted invalid emails. 2022-06-24 not yet calculated CVE-2021-40893
MISC vim — vim
  Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2126
MISC
CONFIRM
MLIST vim — vim
  Buffer Over-read in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2124
MISC
CONFIRM
MLIST vim — vim
  Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2183
MISC
CONFIRM vim — vim
  Buffer Over-read in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2175
MISC
CONFIRM vim — vim
  Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. 2022-06-20 not yet calculated CVE-2022-1720
MISC
CONFIRM
MLIST vim — vim
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2125
CONFIRM
MISC vim — vim 
  Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. 2022-06-23 not yet calculated CVE-2022-2182
MISC
CONFIRM vim — vim 
  Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 2022-06-19 not yet calculated CVE-2022-2129
CONFIRM
MISC vmware — spring_cloud_function
  In Spring Cloud Function versions prior to 3.2.6, it is possible for a user who directly interacts with framework provided lookup functionality to cause a denial-of-service condition due to the caching issue in the Function Catalog component of the framework. 2022-06-21 not yet calculated CVE-2022-22979
MISC vmware — spring_data_mongodb
  A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized. 2022-06-23 not yet calculated CVE-2022-22980
MISC webkul — krayin_crm
  Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS). 2022-06-21 not yet calculated CVE-2021-41924
MISC wireapp — wire-ios wire-ios is an iOS client for the Wire secure messaging application. Invalid accent colors of Wire communication partners may render the iOS Wire Client partially unusable by causing it to crash multiple times on launch. These invalid accent colors can be used by and sent between Wire users. The root cause was an unnecessary assert statement when converting an integer value into the corresponding enum value, causing an exception instead of a fallback to a default value. This issue is fixed in [wire-ios](https://github.com/wireapp/wire-ios/commit/caa0e27dbe51f9edfda8c7a9f017d93b8cfddefb) and in Wire for iOS 3.100. There is no workaround available, but users may use other Wire clients (such as the [web app](https://app.wire.com)) to continue using Wire, or upgrade their client. 2022-06-23 not yet calculated CVE-2022-31009
MISC
CONFIRM wireapp — wire-webapp
  Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering `@mentions` in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and executed in the context of the victim allowing the attacker to fully control the user account. Wire-desktop clients that are connected to a vulnerable wire-webapp version are also vulnerable to this attack. The issue has been fixed in wire-webapp 2022-05-04-production.0 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-05-04-production.0-v0.29.7-0-a6f2ded or wire-server 2022-05-04 (chart/4.11.0) or later. No known workarounds exist. 2022-06-25 not yet calculated CVE-2022-29168
CONFIRM worddpress — inline_google-maps_wordpress_plugin
  The Inline Google Maps WordPress plugin through 5.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping 2022-06-20 not yet calculated CVE-2022-1829
MISC wordpress — allow_svg_files_wordpress_plugin
  The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to 2022-06-20 not yet calculated CVE-2022-1939
MISC wordpress — better_find_and_replace_wordpress_plugin
  The Better Find and Replace WordPress plugin before 1.3.6 does not properly sanitise, validate and escape various parameters before using them in an SQL statement, leading to an SQL Injection 2022-06-20 not yet calculated CVE-2022-1472
MISC wordpress — capa_protect_wordpress_plugin
  The CaPa Protect WordPress plugin through 0.5.8.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable the applied protection. 2022-06-20 not yet calculated CVE-2022-1832
MISC wordpress — coming_soon_&_maintenance_mode_by_colorlib_wordpress_plugin
  The Coming Soon & Maintenance Mode by Colorlib WordPress plugin before 1.0.99 does not sanitize and escape some settings, allowing high privilege users such as admin to perform Stored Cross-Site Scripting when unfiltered_html is disallowed (for example in multisite setup) 2022-06-20 not yet calculated CVE-2022-1945
MISC wordpress — cross-linker_wordpress_plugin The Cross-Linker WordPress plugin through 3.0.1.9 does not have CSRF check in place when creating Cross-Links, which could allow attackers to make a logged in admin perform such action via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1826
MISC wordpress — custom_share_buttons_with_floating_sidear_wordpress_plugin
  The Custom Share Buttons with Floating Sidebar WordPress plugin before 4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed 2022-06-20 not yet calculated CVE-2022-1717
MISC wordpress — download_manager_plugin
  A vulnerability, which was classified as problematic, was found in Download Manager Plugin 2.8.99. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. 2022-06-24 not yet calculated CVE-2017-20093
MISC
MISC wordpress — events_made_easy_wordpress_plugin
  The Events Made Easy WordPress plugin before 2.2.81 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection 2022-06-20 not yet calculated CVE-2022-1905
MISC wordpress — file_manager_plugin
  A vulnerability was found in File Manager Plugin 3.0.1. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. 2022-06-23 not yet calculated CVE-2017-20091
N/A
N/A wordpress — global_content_blocks_plugin
  A vulnerability was found in Global Content Blocks Plugin 2.1.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. 2022-06-23 not yet calculated CVE-2017-20090
N/A
N/A wordpress — google_analytics_dashboard_plugin
  A vulnerability classified as problematic was found in Google Analytics Dashboard Plugin 2.1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely. 2022-06-24 not yet calculated CVE-2017-20092
MISC
MISC wordpress — gwolle_guestbook_plugin
  A vulnerability was found in Gwolle Guestbook Plugin 1.7.4. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. 2022-06-23 not yet calculated CVE-2017-20089
N/A
N/A wordpress — mail_subscribe_list_wordpress_plugin
  The Mail Subscribe List WordPress plugin before 2.1.4 does not have CSRF check in place when deleting subscribed users, which could allow attackers to make a logged in admin perform such action and delete arbitrary users from the subscribed list 2022-06-20 not yet calculated CVE-2022-1603
MISC wordpress — multi-page_toolkit_wordpress_plugin
  The Multi-page Toolkit WordPress plugin through 2.6 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well 2022-06-20 not yet calculated CVE-2022-1818
MISC wordpress — newsletter_wordpress_plugin
  The Newsletter WordPress plugin before 7.4.6 does not escape and sanitise the preheader_text setting, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfilteredhtml is disallowed 2022-06-20 not yet calculated CVE-2022-1889
MISC wordpress — newstatpress_plugin
  A vulnerability, which was classified as problematic, has been found in NewStatPress Plugin 1.2.4. This issue affects some unknown processing. The manipulation leads to basic cross site scripting (Persistent). The attack may be initiated remotely. Upgrading to version 1.2.5 is able to address this issue. It is recommended to upgrade the affected component. 2022-06-24 not yet calculated CVE-2017-20094
MISC
MISC wordpress — ocean_extra_wordpress_plugin
  The Ocean Extra WordPress plugin before 1.9.5 does not escape generated links which are then used when the OceanWP is active, leading to a Reflected Cross-Site Scripting issue 2022-06-20 not yet calculated CVE-2021-25104
MISC wordpress — pdf24_article_to_pdf_wordpress_plugin
  The PDF24 Article To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1827
MISC wordpress — pdf24_article_to_pdf_wordpress_plugin
  The PDF24 Articles To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1828
MISC wordpress — post_grid,_slider_&_carousel_ultimate_wordpress_plugin The Post Grid, Slider & Carousel Ultimate WordPress plugin before 1.5.0 does not sanitise and escape the Header Title, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. 2022-06-20 not yet calculated CVE-2022-1266
MISC wordpress — print,_pdf,_email_by_printfriendly_wordpress_plugin
  The Print, PDF, Email by PrintFriendly WordPress plugin before 5.2.3 does not sanitise and escape the Custom Button Text settings, which could allow high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed 2022-06-20 not yet calculated CVE-2022-0663
MISC wordpress — rating_by_bestwebsoft_wordpress_plugin
  The Rating by BestWebSoft WordPress plugin through 1.5 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating 2022-06-20 not yet calculated CVE-2021-25121
MISC wordpress — seamless_donations_wordpress_plugin
  The Seamless Donations WordPress plugin before 5.1.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1610
MISC wordpress — siple_ads_manager_plugin
  A vulnerability classified as critical was found in Simple Ads Manager Plugin. This vulnerability affects unknown code. The manipulation leads to code injection. The attack can be initiated remotely. 2022-06-24 not yet calculated CVE-2017-20095
MISC
MISC wordpress — supsystic_popup_plugin A vulnerability was found in Supsystic Popup Plugin 1.7.6 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. 2022-06-20 not yet calculated CVE-2017-20065
N/A
N/A
N/A
N/A wordpress — underconstruction_wordpress_plugin
  The underConstruction WordPress plugin before 1.20 does not have CSRF check in place when deactivating the construction mode, which could allow attackers to make a logged in admin perform such action via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1895
MISC wordpress — underconstructrion_wordpress_plugin
  The underConstruction WordPress plugin before 1.21 does not sanitise or escape the “Display a custom page using your own HTML” setting before outputting it, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiletred_html capability is disallowed. 2022-06-20 not yet calculated CVE-2022-1896
MISC wordpress — vaultpress_plugin
  A vulnerability, which was classified as critical, was found in VaultPress Plugin 1.8.4. This affects an unknown part. The manipulation leads to code injection. It is possible to initiate the attack remotely. 2022-06-23 not yet calculated CVE-2017-20086
N/A
N/A wordpress — very_simple_contact_form_wordpress_plugin
  The Very Simple Contact Form WordPress plugin before 11.6 exposes the solution to the captcha in the rendered contact form, both as hidden input fields and as plain text in the page, making it very easy for bots to bypass the captcha check, rendering the page a likely target for spam bots. 2022-06-20 not yet calculated CVE-2022-1801
MISC wordpress — wordpress_plugin_user_photo In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved. 2022-06-24 not yet calculated CVE-2013-1916
MISC
MISC
MISC wordpress — wp-emial_wordpress_plugin
  The WP-EMail WordPress plugin before 2.69.0 does not protect its log deletion functionality with nonce checks, allowing attacker to make a logged in admin delete logs via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1630
MISC wordpress — wp-filebase_download_manager_plugin
  A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. 2022-06-24 not yet calculated CVE-2017-20097
MISC
MISC wordpress — wp-spamfree_anti-spam_plugin
  A vulnerability classified as problematic has been found in WP-SpamFree Anti-Spam Plugin 2.1.1.4. This affects an unknown part. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. 2022-06-24 not yet calculated CVE-2017-20096
MISC
MISC wordpress — wp-zillow_review_slider_wordpress_plugin
  The WP Zillow Review Slider WordPress plugin before 2.4 does not escape a settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite) 2022-06-20 not yet calculated CVE-2022-1915
MISC wordpress — wplite_wordpress_plugin
  The WPlite WordPress plugin through 1.3.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack 2022-06-20 not yet calculated CVE-2022-1831
MISC wordpress — xml_sitemaps_wordpress_plugin
  The XML Sitemaps WordPress plugin before 4.1.3 does not sanitise and escape a settings before outputting it in the Debug page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-06-20 not yet calculated CVE-2021-25088
MISC wordpress — athahualpa_theme_wordress_plugin
  A vulnerability classified as problematic has been found in Atahualpa Theme. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. 2022-06-23 not yet calculated CVE-2017-20088
N/A
N/A wordpress — athahualpa_theme_wordress_plugin
  A vulnerability has been found in Atahualpa Theme and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely. 2022-06-23 not yet calculated CVE-2017-20085
N/A
N/A wordprss — amazon_einzeltitlelinks_wordpress_plugin
  The Amazon Einzeltitellinks WordPress plugin through 1.3.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping 2022-06-20 not yet calculated CVE-2022-1830
MISC wp-emial_wordpress_plugin
  The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visitor’s IP from certain HTTP headers over PHP’s REMOTE_ADDR, which makes it possible to bypass IP-based anti-spamming restrictions. 2022-06-20 not yet calculated CVE-2022-1614
MISC xi_s&d — smarthomes(smartcare)
  Improper Authentication vulnerability in S&D smarthome(smartcare) application can cause authentication bypass and information exposure. Remote attackers can use this vulerability to take control of the home environment including indoor control. 2022-06-23 not yet calculated CVE-2021-26638
MISC zalando — skipper
  In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. 2022-06-23 not yet calculated CVE-2022-34296
MISC zulip — zulip
  Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds. 2022-06-25 not yet calculated CVE-2022-31017
CONFIRM
VM Backup Tiering with Azure Automation

VM Backup Tiering with Azure Automation

This article is contributed. See the original author and article here.

Hi folks! My name is Felipe Binotto, Senior Azure Customer Engineer, based in Australia.


 


The purpose of this article is to demonstrate how you can have different Backup Tiers for your VMs and how you can automate the backup configuration leveraging Azure Tags and Azure Automation. 


 


The prerequisites are: 


 



  • Automation Account

    • Az.ResourceGraph module must be installed

    • Az.RecoveryServices module > 5.4.0 must be installed

    • Runtime version 5.1 (it should also work with 7.1 but it was not tested) 





  • Recovery Services Vault with system or user managed identity

    • If you have many Recovery Services Vaults, you should create a user managed identity so it can be used across all of them, and you just have to set permissions to one identity

    • This identity should be assigned Backup Operator and Virtual Machine Contributor roles 





  • Virtual Machine 


Now you are thinking, why do I need multiple Backup Tiers? 


 


Imagine you have two workloads. Workload-1 is business critical, and it can only afford losing up to 4 hours of data and it should be fully recovered in no longer than 24 hours. Backups should be retained for a minimum of 90 days. Workload-2 is important but not that critical so it can afford losing up to 12 hours of data and it should also be fully recovered in no longer than 24 hours. Backups should be retained for a minimum of 30 days.


 


So, what do you do? You create two Backup Policies. One for each workload based on their requirements. Each workload has its own RPO/RTO and retention requirements.


 


Let’s say you have analysed all your workloads and established that most of them will fit in one of the following tiers. 


 




































Tier 



RPO 



RTO 



Retention 



TIER-1 



4 hours 



1 day 



90 days 



TIER-2 



6 hours 



1 day 



60 days 



TIER-3 



12 hours 



1 day 



30 days 



TIER-4 



24 hours 



2 days 



15 days 



 


Note: although we are specifying RTO in this example, the focus is RPO and Retention, because RTO will depend on other factors such as size of backup (the larger the backup the longer it will take to restore) and backup availability (LRS vs ZRS vs GRS).


 


Azure Backup for VMs 


Virtual Machines in Azure can be backed up to Recovery Service Vaults. When you are preparing the VM for backup, you must select a Backup Policy which defines how often the VM should be backed up, what is the retention period and other settings. 


Until recently, you could only configure a Backup Policy to perform the backup once a day. However, now you can use the new Enhanced type of Backup Policy, currently in public preview, to set backups to be performed up to 6 times a day (every 4 hours). 


The figure below provides an example on how an Enhanced Backup Policy would be configured to fulfill the requirements of TIER-1. 


 


 


fbinotto_0-1656034838114.png


 


Backup Policies 


OK, we have defined all the basics. Now let’s create all the required Backup Policies. You can download the script from my Github Repo. This script will iterate through all Recovery Services Vaults in all subscriptions and create three Enhanced and one Standard Backup Policies according to the requirement of each tier. Policies are named as per the Tier names. 


 


The table below provides details about the policies created after the script is executed. 


 



















































Policy Name 



Frequency 



Start Time 



Schedule 



Duration 



Timezone 



Daily retention 



TIER-1 



Hourly 



6:00AM 



4 hours 



24 hours 



UTC 



90 days 



TIER-2 



Hourly 



6:00AM 



6 hours 



24 hours 



UTC 



60 days 



TIER-3 



Hourly 



6:00AM 



12 hours 



24 hours 



UTC 



30 days 



TIER-4 



Daily 



6:00AM 



N/A 



N/A 



UTC 



15 days 



 


You should see the new Backup Policies in each of your Recovery Services Vaults as per the figure below.


 


 


fbinotto_1-1656034838115.png


 


VM Tag 


Next step is to tag the VMs to be backed up. There are a few points to be considered as follows: 



  • VMs without tags will not be backed up 

  • VMs which are already backed up and are not tagged will remain with their existing backup configuration 

  • VMs which are not backed up and are tagged will be backed up 

  • VMs which are backed up and are tagged will have a new Backup Policy assigned if using the incorrect policy. 


We will tag the VMs with a tag named BackupTier. 


The code below will retrieve the VM objects and tag them. 


 


 

$vm = Get-AzVM -Name Workload-1 -ResourceGroupName VMs 
New-AzTag -Tag @{BackupTier='TIER-1'} -ResourceId $vm.id 

 


 


 

$vm = Get-AzVM -Name Workload-2 -ResourceGroupName VMs 
New-AzTag -Tag @{BackupTier='TIER-3'} -ResourceId $vm.id 

 


 


Once you tag the Workload-1 and Workload-2 VMs they will look like the figures below.


 


fbinotto_2-1656034838117.png


 


Azure Automation 


Before we get to the last piece of the puzzle, let me clarify something that may be in your mind. You may be wondering why using Azure Automation and PowerShell instead of using the built-in Azure Policies for Azure Backup. A few reasons for that:


 



  • The Azure Policies for Azure Backup cannot be applied at Management Group level 

  • Depending on the number of subscriptions and tiers you use in your solution, you could end up with hundreds or even thousands of Azure Policy Assignments 

  • The built-in policies must be customized to change an existing backup policy. By default, they just enable backup based on a tag 

  • A policy remediation is required to enable backup for existing VMs and to change the backup policy of VMs when tag values are changed. 


OK, now that we have cleared that up, let’s get started with the Azure Automation account.


 


Now to the last piece of the puzzle. You need to create a new Runbook and copy the code from this script in my Github Repo. 


You need to provide values for the following three variables:


 



  • accountId – the object ID for the Automation Account managed identity 

  • vaultRGName – the resource group name for the Recovery Services Vault 



  • vaultName – the Recovery Services Vault name 


 


The last step is to run the Runbook. Don’t forget about the prerequisites listed in the beginning of the article. It will not work without those in place. 


 


After the runbook completes successfully, you should see the following in the Output tab. 


 


fbinotto_4-1656034838120.png


 


Once you are satisfied the Runbook works as expected, create a schedule based on your requirements and link it to the Runbook. 


A couple last comments about the runbook: 


 



  • If the backup of a VM is in a Soft-Delete state, it will fail, and the reason will be displayed in the Outputs tab 

  • If the VM is using Shared Disks, it will not try to back it up as it is an unsupported scenario 


Feel free to fork the repo or do pull requests if you have new features or bug fixes to be incorporated into the code. 


I hope this was informative to you and thanks for reading. Add your experiences or questions in the comments section.


 


 


Disclaimer 


The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages.