Lesson Learned #269: Unable to connect – Is unavailable or does not exist – Connection Time out

Lesson Learned #269: Unable to connect – Is unavailable or does not exist – Connection Time out

This article is contributed. See the original author and article here.

Today, I worked on a service request that your customer is facing the following error message: During handling of the above exception, another exception occurred: Traceback (most recent call last): File “src/pymssql/_pymssql.pyx”, line 653, in pymssql._pymssql.connect pymssql._pymssql.OperationalError: (20009, b’DB-Lib error message 20009, severity 9:nUnable to connect: Adaptive Server is unavailable or does not exist (servername.database.windows.net)nNet-Lib error during Connection timed out (110)nDB-Lib error message 20009, severity 9:nUnable to connect: Adaptive Server is unavailable or does not exist (servername.database.windows.net)nNet-Lib error during Connection timed out (110)n’)


 


It is a python application using pymssql library running in Ubuntu 18.04. Our customer reported that previous connections were fine  and this issue suddenly happened. 


 


After checking the port 1433 and redirection ports in Network Security Groups we didn’t see any issue.


 


To check if the ports are available from this machine we ran the command telnet servername.database.windows.net 1433 and we saw  that is not possible to connect.


 


The IP reported is 10.10.1.25. This IP looks like a private link but checking the private link the IP has dynamically changed to 10.10.1.26. In this situation, we checked the DNS server and Local DNS for Private Link and everything is fine, so the next action was to review if we have any configuration in the hosts file of Linux. We found that they have this configuration in their file. 


 


Changing the value of /etc/host file from 10.10.1.25 to 10.10.1.26 everything was started to work correctly and we suggested to discuss with their IT Security team to check why this situation happened or change the private link to static. 


 


Jose_Manuel_Jurado_0-1673182507754.png


 


Enjoy!


 

Azure App Service & ASP.NET Core 3.1 500.30 – One odd cause

This article is contributed. See the original author and article here.

Summary


The problem in this case was, somehow, being caused by the customer’s App Service having the .NET Core 3.1 runtime installed via Site Extension, instead of using the built-in runtime that comes with App Services.


The issue resolved when the Site Extension was removed, and the App Service was stopped and re-started. 


 


Deeper Dive into the Data


This issue showed different symptoms depending on whether the ASP.NET Core app was running in-process or out-of-process. 


 


In-Process


In-process, the symptom was a 500.30 In-Process Start Failure with error code 8007023e. This exception code means “unhandled exception.” Viewing the eventlog.xml in the App Service via Kudu came up with this couplet of events every time:



   
       
        1018
        1
        0
        Keywords
       
        -1368025656
        Application
        [redacted]
       
   
   
       
Application ‘/LM/W3SVC/1365716517/ROOT’ with physical root ‘C:homesitewwwroot’ hit unexpected managed exception, exception code = ‘0xc0000005’. Please check the stderr logs for more information.
        Process Id: 4236.
        File Version: 13.1.22230.29. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: 21d42143378ad6cc4bcbaebfda5f3acddf13aa47
   


    …
   
       
Application ‘/LM/W3SVC/1365716517/ROOT’ with physical root ‘C:homesitewwwroot’ failed to load coreclr. Exception message: CLR worker thread exited prematurely
        Process Id: 4236.
        File Version: 13.1.22230.29. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: 21d42143378ad6cc4bcbaebfda5f3acddf13aa47
   

 


It seems CoreCLR was trying to load and failed with a native access violation exception (c0000005). Very odd. We did not get a dump of this but I wish we had.


 


Out-of-Process


When switching the app to run out-of-process, we encountered a different error. This is from the eventlog.xml:




   
        Application ‘/LM/W3SVC/1365716517/ROOT’ with physical root ‘C:homesitewwwroot’ failed to start process with commandline ‘”dotnet” .[redacted].dll’ with multiple retries. Failed to bind to port ‘31490’. First 30KB characters of captured stdout and stderr logs from multiple retries:
        Process Id: 7032.
        File Version: 13.1.22287.31. Description: IIS ASP.NET Core Module V2 Request Handler. Commit: fbe05294ac5c88be848b4d57d60cb2657874da9b
   

Nothing really useful there.


 


We enabled AspNetCoreModule’s Enhanced Diagnostic Logging and saw that it was timing out while waiting for the app to report itself as started:


[aspnetcorev2_outofprocess.dll] Failed HRESULT returned: 0x8027025a at D:a_work1ssrcServersIISAspNetCoreModuleV2OutOfProcessRequestHandlerserverprocess.cpp:727 

8027025a= E_APPLICATION_ACTIVATION_TIMED_OUT: The app didn’t start in the required time.


 


We also enabled the stdout log via the web.config and found the app had started just fine:


dbug: Microsoft.Extensions.Hosting.Internal.Host[1]
      Hosting starting

dbug: Microsoft.AspNetCore.Server.Kestrel[0]
      No listening endpoints were configured. Binding to http://localhost:5000 by default.
info: Microsoft.Hosting.Lifetime[0]
      Now listening on: http://localhost:5000

info: Microsoft.Hosting.Lifetime[0]
      Application started. Press Ctrl+C to shut down.
info: Microsoft.Hosting.Lifetime[0]
      Hosting environment: Test2
info: Microsoft.Hosting.Lifetime[0]
      Content root path: C:homesitewwwroot
dbug: Microsoft.Extensions.Hosting.Internal.Host[2]
      Hosting started


Turns out the app for some unknown reason was starting on the default localhost:5000. When hosting ASP.NET Core behind IIS and everything is working fine, AspNetCoreModule sets the ASPNETCORE_PORT environment variable to a dynamic port. Kestrel during startup is supposed to poll the value of that variable and use that port to listen on at 127.0.0.1. So in this case something was breaking down either on the environment variable side in ANCM or on the Kestrel side, or in between with the environment itself. Unfortunately we don’t have more data to drill deeper into that because we were tinkering with the App Service based on an observation I made, and the problem appears to have been resolved.

 

Another Observation & Resolution


While perusing the ANCM Enhanced Diagnostic Logging I mentioned earlier, I came across this:

[aspnetcorev2.dll] Initializing logs for ‘C:homeSiteExtensionsAspNetCoreRuntime.3.1.x86ancmaspnetcorev2.dll‘. Process Id: 7632.. File Version: 13.1.22287.31. Description: IIS ASP.NET Core Module V2. Commit: fbe05294ac5c88be848b4d57d60cb2657874da9b.

That struck me as odd because App Services itself provides all the .NET Core runtimes (including no-longer-supported ones like 3.1). So why was ANCM loading from a Site Extension?

In a new, test App Service with a basic ASP.NET Core 3.1 app deployed to it, this is what that log looks like:

[aspnetcorev2.dll] Initializing logs for ‘C:Program Files (x86)IISAsp.Net Core ModuleV2aspnetcorev2.dll‘. Process Id: 7496.. File Version: 13.1.19331.0. Description: IIS ASP.NET Core Module V2. Commit: 62eee6e6d21c95668a9e9529dce6562cc6c9f3bf.

That is where ANCM is normally located.

As a test on one of my own App Services, I installed the latest-available Site Extension for the .NET Core 3.1 runtime. I still had no issues, and I confirmed the ANCM log showed the location of ANCM had changed to the Site Extension one, same as the customer’s. 

 

I, personally, am not familiar with App Service Site Extensions and why the .NET Core runtime is available to use there when it’s already built-in; however, it’s just another copy of the runtime in a different location that theoretically shouldn’t have issues. I will say, in this case the customer had an older version of the runtime installed via the Site Extension, while the latest available was 3.1.32 (the latest build).

 

On the call with the customer, as a test we removed the Site Extension completely, restarted the site, and confirmed ANCM was using the built-in version that comes with App Services. This immediately resolved the issues for both in-process and out-of-process setups.

 

Unfortunately, we likely won’t be able to get more data on this problem and what was happening. I am thinking perhaps the fact that the Site Extension was out-of-date/an older version possibly had something to do with it. Thus, the takeaway here is if you have an app experiencing odd startup issues and if you have a Site Extension installed that contains the runtime for the app you are trying to run, try removing that Site Extension (or maybe update it if it needs to be updated?) and see if your issues go away. Make sure to stop and start the App Service as well, to make sure everything is fully picked-up.

New Year, new Microsoft 365 Core advanced deployment guides for Exchange, SharePoint, and Teams!

New Year, new Microsoft 365 Core advanced deployment guides for Exchange, SharePoint, and Teams!

This article is contributed. See the original author and article here.

New Years’ Resolutions:


  



  1. Work out 3-5 days a week. 

  2. Spend more time with family. 

  3. Deploy Microsoft 365 services to make my company more efficient and secure. 


  


We can’t help you with the first two, but we can help you deploy Microsoft 365 services to improve your company’s efficiency and security with the new Core onboarding advanced deployment guides.  


 


  


Learn how:


 


 


Did you know that thousands of customers use the Core onboarding advanced deployment guides each month? The Microsoft 365 Admin Center features Core advanced deployment guides that simplify moving from On-Premises IT to the Cloud. 


IT Pros can use our core onboarding guides to speed deployment and configure Azure Active Directory, DNS, networking, identity management, and more with advanced deployment guides from Microsoft. 


 


 


Core onboarding involves service provisioning and tenant and identity integration. The Core onboarding advanced deployment guides for onboarding services include:  



 


Here’s how IT Pros can access the Core advanced deployment guides by clicking the purple hammer link in the below tile. 


An image demonstrating how to access the Core onboarding advanced deployment guides in the Training, guides, & assistance section of the Microsoft 365 admin center.An image demonstrating how to access the Core onboarding advanced deployment guides in the Training, guides, & assistance section of the Microsoft 365 admin center.


 


 


Once there, Core Advanced deployment guides are found in the Identity and authentication section.


 


An image demonstrating how to access the Identity and authentication section.An image demonstrating how to access the Identity and authentication section.


 


 


Completing the deployment steps outlined in the Core advanced deployment guides creates a strong foundation upon which additional Microsoft 365 Cloud Services can be deployed successfully and with confidence.


 


Helpful resources


 


Learn about all deployment guides and setup wizards:



Access advanced deployment guides without signing in:



Getting started with advanced deployment guides within the Microsoft 365 admin center:



  • Go to https://admin.microsoft.com/ and log in

  • Once logged in, go to the Home page and look for the Training, guides, & assistance card 

  • Select Advanced deployment guides & assistance

Customer Service voice support channel launches in Canada 

Customer Service voice support channel launches in Canada 

This article is contributed. See the original author and article here.

Since the November 2021 launch in select geographic regions of the native voice channel in Microsoft Dynamics 365 Customer Service, we have been expanding worldwide to satisfy growing customer demand. We are proud to announce that we now support local country regions as well. As of November 30, 2022, the voice support channel is live in Canada. 

Native voice support channel capabilities 

The integrated voice channel allows customer service representatives to communicate with customers on the phone to resolve issues. The Canada launch includes all the features that the voice channel in omnichannel Customer Service environments supports today. 

graphical user interface, application

Self-serve voice support channel with Power Virtual Agents

The Canada general availability launch also integrates Power Virtual Agents. Subject matter experts can build conversational interactive voice response (IVR) bots in just a few clicks to help customers quickly self-serve, reducing contact center operation costs. Learn how to configure Power Virtual Agents bots for voice.

Azure direct routing and Microsoft calling plans 

The launch of the voice channel in the Canada is supported by Azure Communication Services, with Azure direct routing in preview.  Learn how you can use the telephony carrier of your choice.

The Canada voice support channel is also supported by Microsoft calling plans in public preview. Customers can purchase their own numbers through Azure subscriptions. Check your eligibility and learn how to enable Microsoft calling plans.

As the native voice channel in Dynamics 365 Customer Service continues to expand in regions, languages, and capabilities, subscribe to this blog for the latest updates. Set up your Omnichannel for Customer Service and install the voice channel today. Install voice channel in Omnichannel for Customer Service | Microsoft Learn

Learn more

Read the documentation to learn about the features the voice channel now supports in Canada: Voice channel in Omnichannel for Customer Service | Microsoft Learn

Learn about other supported locations and languages here: Supported cloud locations, languages, and locale codes for voice channel | Microsoft Learn

The post Customer Service voice support channel launches in Canada  appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Direct callback: Because nobody likes to wait on the phone

Direct callback: Because nobody likes to wait on the phone

This article is contributed. See the original author and article here.

Ana is excitedly setting up her new smartphone when the screen goes blank. In dismay, she calls customer service. The estimated wait time is more than 45 minutes, and she is number 7 in the queue because all agents are busy handling holiday call volume. She decides to stay on the line listening to music on hold for 45 minutes. By the time she gets to speak to an agent, she is relieved but a bit angry. Her first support experience with the smartphone manufacturer is less than pleasant, and this is before she even has a chance to discuss her issue. If the company had implemented direct callback, now available in Microsoft Dynamics 365 Customer Service, Ana’s first engagement with it would have been much more reassuring. 

Introducing direct callback in Dynamics 365 Customer Service 

Many customer contact centers face limited agent availability during spikes in call volume. At such times, customer satisfaction drops as wait times are long and abandonment rates increase. Staffing for peak volumes is costly and inefficient. So, what can you do to use agent capacity efficiently while keeping customer satisfaction high and even adding a personal touch? 

The voice channel in Dynamics 365 Customer Service now provides an overflow action known as direct callback. When your organization configures direct callback, customers have the option to receive a call back as soon as an agent is available without having to remain on the phone in the queue. 

Here are some important concepts to know when you are configuring direct callback: 

  • Direct callback is configured as an overflow action in overflow management.  
  • This setting applies to the queue level.  
  • There are two conditions for this overflow actionwait time exceeds n minutes or work item limit exceeds n items. 

Two editable automated messages are available for the customer when your organization enables direct callback: 

  • Offer customer callback: Offers the customer the option to receive a call back instead of waiting on the phone. 
  • Customer callback response: Acknowledges the customer’s choice to be called back and ends the call.

graphical user interface, application

So how does this work? Here are the logical scenario steps: 

  1. The customer calls customer support. 
  1. The direct callback option is triggered by queue overflow conditions where associated action is direct callback (1).
  1. A bot asks if the customer prefers a callback when an agent is available instead of waiting in queue (2).
  1. When the customer presses 1 for yes, the call ends but the work item remains in queue (3).
  1. Once the work item reaches position 1, Dynamics 365 Customer Service initiates a voice call (4).
  1. When the agent accepts the conversation, Dynamics 365 Customer Service calls the customer (5). This preview dialing mode ensures that an agent will be on the call when the customer picks up the phone.

Empower agents to show customers you care 

The next time Ana calls the company’s customer service number at peak demand time, she is offered the option to be called back as soon as an agent is available instead of waiting in the queue. An agent who is aware that Ana called earlier returns her call. This experience builds Ana’s confidence in the smartphone company because she feels that it values her time, and the call back offers personalized attention. In addition to higher CSAT, direct callback also allows organizations to utilize agents more productively with confidence that they are handling peak loads well. 

Learn more

For more information, read the documentation: Use direct callback to manage overflowing queues | Microsoft Learn

Not yet a Dynamics 365 Customer Service customer? Take a tour and get a free trial.

The post Direct callback: Because nobody likes to wait on the phone appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Azure SQL VM: Azure Backup & restore for SQL Server on Azure Virtual Machines [Ep.10] | Data Exposed

This article is contributed. See the original author and article here.

In the next episode in the Azure SQL VM series, join Anna Hoffman, Logan Carrington, and Kartik Pullabhotla as they discuss various options for Azure Backup and restore on SQL Server on Azure Virtual Machines.


 


Watch on Data Exposed


 


Resources:


Back up SQL Server databases to Azure – Azure Backup


Azure SQL Virtual Machine Reimagined Series


 


View/share our latest episodes on Microsoft Learn and YouTube!

CISA Releases Three Industrial Systems Control Advisories

CISA Releases Three Industrial Systems Control Advisories

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Azure Marketplace new offers – January 4, 2023

Azure Marketplace new offers – January 4, 2023

This article is contributed. See the original author and article here.

We continue to expand the Azure Marketplace ecosystem. For this volume, 133 new offers successfully met the onboarding criteria and went live. See details of the new offers below:


 







































































































































































































































































































































































































































































































Get it now in our marketplace


AI Assist.png AI Assist: Aisera’s AI Assist supports service desk teams through ticket automation, classifying and routing tickets and cases to reduce bounce rates and improve resolution times. AI Assist can also recommend similar tickets and cases, knowledge articles, and next-best actions. 
BUI Cyber.png

BUI Cyber MXDR: BUI’s Cyber MXDR service runs on Microsoft security technology and delivers compliance reporting; monitoring for databases, infrastructure, and access; and real-time threat hunting for your IT security landscape. It’s enriched with BUI playbooks and analytics, custom dashboards, and integrations.


Chrome OS.png Chrome OS Change Password Notifier: Support the synchronization of your users’ Chrome OS passwords with their Azure Active Directory passwords. Whenever a user’s Azure Active Directory password is changed, Change Password Notifier informs Chrome OS and triggers an online sign-in if SAML single sign-on password synchronization is activated.
CloudPilot.png

CloudPilot – Application Assessment: Through static code analysis, configuration data, and development team interaction, CloudPilot provides comprehensive reports on scanned applications and their readiness to migrate to cloud environments.


AskforCloud logo.png

Consul on Red Hat Enterprise Linux 9.1: This offer from AskforCloud provides HashiCorp Consul on Red Hat Enterprise Linux 9.1. HashiCorp Consul is an open-source tool for solving networking and security challenges pertaining to microservices and cloud infrastructure.


Cosmo Tech.png

Cosmo Tech Simulation and Bonsai: Cosmo Tech’s 360-degree simulation digital twin platform can predict the possible futures of an organization, facilitating decision-making and solving complex industrial problems. Build resilience to future events by running what-if and how-to scenarios.


DMZedge.png

DMZedge Server NextGen Cloud Edition (PAYG): DMZedge from South River Technologies is a cross-platform reverse proxy server that offers a multi-layered security solution when combined with Cornerstone MFT Server. DMZedge lives outside the corporate firewall, serving as a proxy between authorized end users on the internet and the internal network.


Docker CE.png

Docker CE on CentOS Stream 8 Minimal: This offer from Art Group provides Docker Community Edition on a minimal installation of CentOS Stream 8. Docker CE is an open-source containerization platform that simplifies the distribution and deployment of your applications.


ESG Fusion.png

ESG Fusion by ERM: ESG Fusion from Environmental Resources Management is an AI-enabled service that provides environmental, social, and governance due diligence and screening to help investment professionals make better decisions. ESG Fusion evaluates more than a dozen factors to provide a comprehensive assessment of a company’s ESG risks and opportunities.


Fly.png

Fly (SaaS) for Microsoft 365 Tenant-to-Tenant Migration: Easily move, migrate, or consolidate content between different Microsoft 365 tenants with Fly from AvePoint. Use Fly to quickly respond to mergers, acquisitions, divestitures, or other Microsoft 365 tenant restructuring needs.


Harbor.png

Harbor, Packaged by Bitnami: This offer from Bitnami provides an image of Harbor on a ready-to-run virtual machine. Harbor is an open-source registry to store, sign, and scan content. It adds security, identity, and management functionalities to the open-source Docker distribution.


Ntegral logo.png

Hyper-V Server 2019 on Azure: This offer from Ntegral provides Hyper-V Server 2019 on a Microsoft Azure virtual machine. With Hyper-V running on Azure, you can replicate Hyper-V virtual machines running on-premises, serving as a disaster recovery and backup solution.


InsecureWeb Dark Web Monitoring.png

InsecureWeb Dark Web Monitoring: InsecureWeb can protect your company and clients from cyberattacks and ensure your business data isn’t being distributed on the dark web. InsecureWeb monitors activity happening on hidden websites, in chat rooms, and via peer-to-peer networks, watching for relevant information and indicators of ongoing or future attacks.


Intel.png

Intel NLP Workflow for Azure Machine Learning Platform: This contained environment from Intel provides natural language processing (NLP) training and inferencing using Intel’s optimized software. Users can count on easy-to-use APIs to perform end-to-end NLP training, inferencing, and deployment.


Job Scheduling.png

Job Scheduling Sample v1: This sample brain and simulator for the Bonsai machine learning platform lets you teach an AI to schedule jobs intelligently for a small production line using a FlexSim model. The simulator is a model (sometimes called a digital twin) of a small sheet-metal production line.


AskforCloud logo.png

Kotlin on Red Hat Enterprise Linux 7: This offer from AskforCloud provides Kotlin on Red Hat Enterprise Linux 7. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin on Red Hat Enterprise Linux 9: This offer from AskforCloud provides Kotlin on Red Hat Enterprise Linux 9. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin Programming Language on Debian 10: This offer from AskforCloud provides Kotlin on Debian 10. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin Programming Language on Debian 11: This offer from AskforCloud provides Kotlin on Debian 11. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin Programming Language on Ubuntu Server 18.04 LTS: This offer from AskforCloud provides Kotlin on Ubuntu Server 18.04 LTS. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin Programming Language on Ubuntu Server 20.04 LTS: This offer from AskforCloud provides Kotlin on Ubuntu Server 20.04 LTS. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


AskforCloud logo.png

Kotlin Programming Language on Ubuntu Server 22.04 LTS: This offer from AskforCloud provides Kotlin on Ubuntu Server 22.04 LTS. Kotlin is an open-source statically typed programming language that targets the Java Virtual Machine, along with Android and JavaScript. Kotlin provides many ways to reuse code between multiple platforms for productive programming.


ME Applications (ManageEngine).png

ME Applications Manager – 500 Monitors (No Add-Ons): ManageEngine Applications Manager is an integrated application and server performance monitoring solution that helps organizations ensure high availability and optimal performance of their business-critical applications.


NVIDIA logo.png

NVIDIA RTX Virtual Workstation – RHEL 9: This image from NVIDIA with RTX Virtual Workstation software enables customers to spin up a virtual machine in minutes. Easily configure an NVIDIA GPU-powered instance with the vCPU, memory, and storage you need without having to purchase any physical hardware.


NVIDIA logo.png

NVIDIA RTX Virtual Workstation – Windows Server 2022: This image from NVIDIA with RTX Virtual Workstation software enables customers to easily spin up a virtual machine in minutes. Easily configure an NVIDIA GPU-powered instance with the vCPU, memory, and storage you need without having to purchase any physical hardware.


AskforCloud logo.png

Packer on Red Hat Enterprise Linux 9.1: This offer from AskforCloud provides Packer on Red Hat Enterprise Linux 9.1. Packer is an open-source tool for creating identical machine images for multiple platforms from a single source template.


PostgreSQL.png

PostgreSQL by Kockpit: This offer from Kockpit provides an image of PostgreSQL 15 on Ubuntu 20.04.02 LTS. Use the image to launch a virtual machine with a predefined version of Postgres designed for production environments on Microsoft Azure.


Product Knowledge Graph Builder.png

Product Knowledge Graph Builder: Designed for e-commerce, Product Knowledge Graph Builder from WordLift enriches brands’ content with structured data, making products understandable to search engines and voice assistants. Increase the visibility of your e-commerce products and get rich results from your merchant feeds.


Ntegral logo.png

Red Hat Enterprise Linux 8.0: This offer from Ntegral provides Red Hat Enterprise Linux 8.0 on a Microsoft Azure virtual machine. Red Hat Enterprise Linux has built-in security features such as Security-Enhanced Linux (SELinux) and mandatory access controls to help you combat intrusions and meet regulatory compliance.


Ntegral logo.png

Red Hat Enterprise Linux 8.3: This offer from Ntegral provides Red Hat Enterprise Linux 8.3 on a Microsoft Azure virtual machine. Red Hat Enterprise Linux has built-in security features such as Security-Enhanced Linux (SELinux) and mandatory access controls to help you combat intrusions and meet regulatory compliance.


Rubrik.png

Rubrik: Policy-Based Protection for Microsoft 365: With Rubrik, data is always secure and rapidly available in the event of a ransomware attack, accidental deletion, or corruption. Rubrik orchestrates policy-based protection of Microsoft 365 assets. Search and restore operations cover Exchange Online, OneDrive, SharePoint, and Teams.


AskforCloud logo.png

Rust Programming Language on CentOS 8: This offer from AskforCloud provides Rust on CentOS 8. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on CentOS Stream 8: This offer from AskforCloud provides Rust on CentOS Stream 8. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Debian 10: This offer from AskforCloud provides Rust on Debian 10. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Debian 11: This offer from AskforCloud provides Rust on Debian 11. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Ubuntu Server 22.04 LTS: This offer from AskforCloud provides Rust on Ubuntu Server 22.04 LTS. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Windows Server 2012 R2: This offer from AskforCloud provides Rust on Windows Server 2012 R2. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Windows Server 2016: This offer from AskforCloud provides Rust on Windows Server 2016. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Windows Server 2019: This offer from AskforCloud provides Rust on Windows Server 2019. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


AskforCloud logo.png

Rust Programming Language on Windows Server 2022: This offer from AskforCloud provides Rust on Windows Server 2022. Rust is an open-source programming language that’s fast and memory-efficient. It can power performance-critical services, run on embedded devices, and easily integrate with other languages.


telemedica.png

Telemedica: Telemedica from High-Tech Systems & Software SRL enables doctors to deliver consultations and review patient information from anywhere at any time. Doctors can access consultation histories, patient-submitted files, chat logs, and recommendations or prescribed treatments.


AskforCloud logo.png

Terraform on Red Hat Enterprise Linux 9.1: This offer from AskforCloud provides Terraform on Red Hat Enterprise Linux 9.1. Terraform is an open-source infrastructure-as-code tool created by HashiCorp. With Terraform, users can efficiently build, change, and version infrastructure.


Bansir logo.png

Ubuntu Server 18.04 LTS: This offer from Bansir provides an image of Ubuntu 18.04 LTS (Bionic Beaver) and includes support from Bansir’s team of systems engineers. Ubuntu 18.04 LTS server is lightweight and designed for ease of use, security, and stability.


Bansir logo.png

Ubuntu Server 20.04 LTS: This offer from Bansir provides an image of Ubuntu 20.04 LTS (Focal Fossa) and includes support from Bansir’s team of systems engineers. Ubuntu 20.04 LTS server is lightweight and designed for ease of use, security, and stability.


AskforCloud logo.png

Vault on Red Hat Enterprise Linux 9.1: This offer from AskforCloud provides Vault on Red Hat Enterprise Linux 9.1. Vault is an identity-based encryption management system from HashiCorp. Vault helps organizations reduce the risk of breaches and data exposure with security automation and encryption.


VenueArc.png

VenueArc – Venue Booking & Event Management: VenueArc streamlines booking and event management for performing art centers. Its centralized platform, hosted on Microsoft Azure, fosters collaboration between departments and offers round-the-clock availability. A dedicated support team monitors the program and responds to requests at any time.


VSFTP (1).png

VSFTP on Linux- Red Hat 8.6 Minimal: This offer from Art Group provides VSFTP on a minimal installation of Red Hat Enterprise Linux 8.6. VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (2).png

VSFTP on Linux- Red Hat 9 Minimal: This offer from Art Group provides VSFTP on a minimal installation of Red Hat Enterprise Linux 9. VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (4).png

VSFTP on SUSE Linux Enterprise 12 Minimal: This offer from Art Group provides VSFTP on a minimal installation of SUSE Linux Enterprise 12. VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (5).png

VSFTP on SUSE Linux Enterprise 15 Minimal: This offer from Art Group provides VSFTP on a minimal installation of SUSE Linux Enterprise 15. VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (6).png

VSFTP on Ubuntu 18.04 Minimal: This offer from Art Group provides VSFTP on a minimal installation of Ubuntu 18.04 LTS (Bionic Beaver). VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (7).png

VSFTP on Ubuntu 20.04 Minimal: This offer from Art Group provides VSFTP on a minimal installation of Ubuntu 20.04 LTS (Focal Fossa). VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.


VSFTP (8).png

VSFTP on Ubuntu 22.04 Minimal: This offer from Art Group provides VSFTP on a minimal installation of Ubuntu 22.04 LTS (Jammy Jellyfish). VSFTP is an FTP server for Unix-like systems. In addition to a small system footprint, VSFTP’s advantages include bandwidth throttling and the ability to handle virtual users.



Go further with workshops, proofs of concept, and implementations


Tiger Data Fabric.png Accelerator for Implementing Data Fabric on Azure: Tiger Analytics will set up Tiger Data Fabric, an accelerator for implementing data lakes and data fabric on Microsoft Azure. Tiger Data Fabric has powerful low-code self-service and governance capabilities at its core, enabling quicker data pipeline setup.
ACP Smart.png

ACP Smart Monitoring: 1-Day Implementation: ACP will implement a turnkey infrastructure-monitoring solution in your Microsoft Azure environment. To represent your systems visually, ACP uses different workbook designs and gives you the possibility of a detailed system-specific view. This offer is available in German.


AI Workshop.png

AI Workshop: 3-Day Proof of Concept: In this workshop from Exadel, functional and technical leaders will learn about state-of-the-art AI, AI building blocks, Azure Cognitive Services, and MLOps with Azure Machine Learning Studio. This will be followed by identifying a use case for a three-day proof of concept of an AI solution.


App Modernization.png

Application Modernization: 4-Week Implementation: After a feasibility assessment and a cost analysis, Nebulan will deploy your company’s applications on Microsoft Azure to give you operational efficiency and intelligent scaling. This offer is available only in Spanish.


App of the Future.png

App of the Future: 1-Week Proof of Concept: In this engagement, Atmosera will conduct a design workshop to uncover key objectives, ideate on solutions, and create a rapid prototype or reference architecture for a new cloud-native app on Microsoft Azure. Accelerate your journey to innovation with a modernized application and data landscape.


Azure and OCI.png

Azure and OCI: 3-Month Implementation: System Support Co. Ltd.’s one-stop offer for Oracle Database PaaS on Microsoft Azure includes a pre-migration assessment, a proof of concept, a production migration, and post-migration maintenance. This offer is available only in Japanese.


Azure Governance.png

Azure Governance and Security: 3-Week Implementation: Using cloud computing and service models, Kuralkan Bilisim will train customers how to efficiently govern cloud resources and implement security configurations. This will include modules concerning Azure management groups, Azure Resource Graph, Azure Policy, Azure Backup, and Azure Blueprints.


Azure Landing Zone.png

Azure Landing Zone Implementation: HAFN IT will provide customers with an operational Azure environment that includes basic governance, compliance, security, cost management, and change management features. Based on Terraform from HashiCorp, each Azure landing zone is automated and standardized. This service is available only in German.


Azure Managed Services.png

Azure Managed Services by e& Enterprise Cloud: In this managed service, e& enterprise, formerly known as Etisalat Digital, will take care of your cloud infrastructure while ensuring deployments are secure and meet your regulatory compliance needs. See details for the Standard tier, the Premium tier, and potential add-ons.


Azure Platform.png

Azure Platform: 4-Week Implementation: Fellowmind Enterprise Scale enables automated deployment of Azure through Infrastructure-as-Code methods. In this way, Fellowmind can provide a fast track to Azure. The implementation, based on Microsoft best practices, will be validated with customers.


Azure Virtual Desktop.png

Azure Virtual Desktop: 1-Month Proof of Concept: Hitachi will deliver a proof of concept of Azure Virtual Desktop so you can work remotely, scale out quickly, ensure security with multi-factor authentication and data removal control, and use geographically distant regions to safeguard against disaster. This offer is available only in Japanese.


Business Process.png

Business Process Validation Framework: 5-Week Implementation: Insight will identify core business processes and associated data requirements for your company, then make recommendations for deploying a new business process validation framework on a modern Azure data platform. The aim is to fast-track the creation and maintenance of business process rules and to provide repeatability for future use cases.


Connected Products.png

Connected Products: 6-Hour Workshop: In this workshop concerning IoT products and the changing manufacturing landscape, Cluster Reply will understand your company’s situation, determine how to connect your products, present the advantages of Microsoft Azure, and define a plan for your IoT journey.


Defend Against Threats.png

Defend Against Threats with SIEM Plus XDR: Improve your security posture and uncover risks with BJSS Limited’s cybersecurity workshop. BJSS will inspect your Microsoft 365 cloud and on-premises environments across email, identity, and data, then help you build a business case for a production deployment of Microsoft Sentinel.


IoT Discovery.png

IoT Discovery Workshop for Azure IoT: This workshop from NTT DATA Business Solutions AG will enable you to harness the potential of the Internet of Things and to define a digital strategy. Learn how to connect devices, how to make the best use of Azure IoT, and how to analyze and evaluate acquired data.


Microsoft Purview.png

Microsoft Purview: 4-Week Proof of Concept: Verne Technology Group will deliver a proof of concept of Microsoft Purview so you can monitor and control your organization’s data on a large scale and derive greater value from it. This offer is available only in Spanish.


SAP.png

SAP on Azure Managed Service (4 Weeks): Professionals from Orange Business Services will support you in deploying, migrating, and maintaining SAP applications in a Microsoft Azure environment. Stay focused on your core business and innovate faster with native Azure functionalities and the expertise of Orange Business Services.


Services for Prisma Cloud.png

Services for Prisma Cloud CWP Optimization: Palo Alto Networks will optimize Prisma Cloud workflows, processes, and playbooks within your Microsoft Azure environment. Prisma Cloud offers comprehensive cloud workload protection for virtual machines, containers, Kubernetes apps, serverless functions, and more.


waterunderground.png

waterunderground by InTTrust: 6-Month Implementation: In this engagement, InTTrust will implement its waterunderground sustainability solution, which uses Azure and IoT technologies to monitor quality and quantity trends for underground water. waterunderground also tracks indications of unusual over-pumping and alerts you to water quality changes.


Workshop innovate.png

Workshop: Innovate with Azure AI and Cloud Scale: Talent Business Solutions can support your company’s digital transformation initiatives. In this workshop, Talent Business Solutions will identify areas for innovation using Microsoft AI and cloud solutions. This offer is available only in French.



Contact our partners


Accenture Cloud Foundations Framework for Azure

Advanced Azure Visibility: 2-Week Implementation



Akinon Commerce: B2C and B2B



AL_ACS: Adapter for Azure Blob Storage and SAP



Application Innovation Engagement: 4-Week Assessment



Apporto Secure Virtual Desktops



Azure Cost Optimization: 3-Week Assessment



Azure Sentinel Onboarding: 5-Day Assessment



Azure VMware Solution: 2-Hour Briefing



Azure VMWare Solution Migration



Barracuda Managed Firewall



Campaign Manager Service Platform



Cloud Email Migration Service



Creating a Central Customer Database: 1-Hour Briefing



Discovery for Azure Cloud: 4-Week Assessment



DocuSense



Elitmind Smart Audit Platform



Ethics & Compliance



EY Application Threat Detection and Response for SAP



EY Security Baseline Definition



EY Space for Earth



GS Retail CX Solution



GUI on Debian 10



GUI on Debian 11



Habu



Help Desk from Palladsys



idbox Digital Onboarding



IMPACT – Planning & Reporting



Info-Tech Leave Software



Info-Tech Payroll Software



Innovation Jumpstart: 6-Week App Transformation



Jet Analytics for Dynamics 365



JioThings Smart Sub-Metering



Kairos365FSM



Managed Azure Professional Plan: 4-Week Implementation



MapmyIndia Mappls API Suite



Matrix Products: 1-Day Assessment



Mining Analytics: 3-Week Assessment



Qualify Video QC



QuasarDB Community Edition



rt360 Governance, Risk & Compliance Product Suite



Rx Connect



Rx Edit



Server Cloud Management



ShopSphere Insights



Smart Public Area Solution



Smart Shopping Mall Solution



SoMAX: 12-Month Subscription



Storya: Content Automation for Digital Signage



TCO Assessment for Azure VMware Services



Telestream Cloud Transform



The Reporting Hub



Timed Text Speech



TimeFleX Solutions: Desk Sharing



Timeqode: BPM Platform



Valeri (Social Media Analytics)



VergeLink | IoT-Connectivity for Machine Builders



Wipro Intelligent Volume Optimization and Risk (IVOR)



Work Force Analytics


Workshop: Better AI with Enterprise CDP

Fortinet Releases Security Updates for FortiADC

This article is contributed. See the original author and article here.

Fortinet has released a security advisory to address a vulnerability in multiple versions of FortiADC. This vulnerability may allow a remote attacker “to execute unauthorized code or commands via specifically crafted HTTP requests.”

CISA encourages users and administrators to review Fortinet security advisory FG-IR-22-061 and apply the recommended updates.

Vulnerability Summary for the Week of December 26, 2022

This article is contributed. See the original author and article here.

go — multiple_products
  The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow. 2022-12-27 not yet calculated CVE-2013-10005
MISC
MISC lz4 — lz4_bindings
  LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. 2022-12-27 not yet calculated CVE-2014-125026
MISC
MISC
MISC tbdev — tbdev
. A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The name of the patch is 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147. 2022-12-31 not yet calculated CVE-2014-125027
MISC
MISC
MISC
MISC valtech — idp_test_client
  A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148. 2022-12-31 not yet calculated CVE-2014-125028
MISC
MISC
MISC jwt — jwt
  Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. 2022-12-27 not yet calculated CVE-2015-10004
MISC
MISC
MISC markdown-it — markdown-it
  A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852. 2022-12-27 not yet calculated CVE-2015-10005
MISC
MISC
MISC
MISC golf — golf
  CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests. 2022-12-27 not yet calculated CVE-2016-15005
MISC
MISC
MISC
MISC gorilla — gorilla_handlers
  Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy. 2022-12-27 not yet calculated CVE-2017-20146
MISC
MISC
MISC challenge_website –challenge_website 
  A vulnerability was found in challenge website. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is f1644b1d3502e5aa5284f31ea80d2623817f4d42. It is recommended to apply a patch to fix this issue. The identifier VDB-216989 was assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2017-20150
MISC
MISC
MISC itext — rups
  A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2017-20151
MISC
MISC
MISC aerouk — imageserve
  A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056. 2022-12-30 not yet calculated CVE-2017-20152
MISC
MISC
MISC
MISC aerouk — imageserve
  A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2017-20153
MISC
MISC
MISC
MISC phoenixcoin — phoenixcoin
  A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068. 2022-12-30 not yet calculated CVE-2017-20154
MISC
MISC
MISC
MISC sterc — google_analytics_dashboard_modx
  A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2017-20155
MISC
MISC
MISC
MISC
MISC
MISC exciting — printer 
  A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The name of the patch is 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139. 2022-12-31 not yet calculated CVE-2017-20156
MISC
MISC
MISC
MISC ariadne –component_library A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140. 2022-12-31 not yet calculated CVE-2017-20157
MISC
MISC
MISC
MISC N/A — N/A
  A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability. 2022-12-31 not yet calculated CVE-2017-20159
MISC
MISC
MISC
MISC flitto –express_param
  A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability. 2022-12-31 not yet calculated CVE-2017-20160
MISC
MISC
MISC
MISC
MISC opera –opera_mini_for_android The Opera Mini application 47.1.2249.129326 for Android allows remote attackers to spoof the Location Permission dialog via a crafted web site. 2022-12-26 not yet calculated CVE-2018-16135
MISC archiver — archiver
  Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. 2022-12-27 not yet calculated CVE-2018-25046
MISC
MISC
MISC email_existence — email_existence
  A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2018-25049
MISC
MISC
MISC
MISC harvest — chosen
  A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 is able to address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956. 2022-12-28 not yet calculated CVE-2018-25050
MISC
MISC
MISC
MISC
MISC pomash — pomash 
  A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2018-25051
MISC
MISC
MISC cpan –catalyst_plugin_session
  A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID Handler. The manipulation of the argument sid leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.41 is able to address this issue. The name of the patch is 88d1b599e1163761c9bd53bec53ba078f13e09d4. It is recommended to upgrade the affected component. VDB-216958 is the identifier assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2018-25052
MISC
MISC
MISC
MISC json2html — json2html
  A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959. 2022-12-28 not yet calculated CVE-2018-25053
MISC
MISC
MISC
MISC cilla — cilla
  A vulnerability was found in shred cilla. It has been classified as problematic. Affected is an unknown function of the file cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp of the component Search Handler. The manipulation of the argument details leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is d345e6bc7798bd717a583ec7f545ca387819d5c7. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216960. 2022-12-28 not yet calculated CVE-2018-25054
MISC
MISC
MISC farcry_solr_pro_plugin — farcry_solr_pro_plugin
  A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2018-25055
MISC
MISC
MISC
MISC
MISC yolapi — yolapi
  A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2018-25056
MISC
MISC
MISC simple_php_link_shortener — simple_php_link_shortener
  A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link[“id”] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996. 2022-12-28 not yet calculated CVE-2018-25057
MISC
MISC
MISC twitter_post_fetcher — twitter_post_fetcher
  A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability. 2022-12-29 not yet calculated CVE-2018-25058
MISC
MISC
MISC
MISC
MISC pastebinit — pastebinit
  A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040. 2022-12-30 not yet calculated CVE-2018-25059
MISC
MISC
MISC
MISC
MISC macaron — csrf
  A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2018-25060
MISC
MISC
MISC
MISC rgb2hex — rgb2hex
  A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151. 2022-12-31 not yet calculated CVE-2018-25061
MISC
MISC
MISC
MISC sierra_wireless — aleos
  The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow. 2022-12-26 not yet calculated CVE-2019-11851
CONFIRM
MISC sierra_wireless — mgos
  Sierra Wireless MGOS before 3.15.2 and 4.x before 4.3 allows attackers to read log files via a Direct Request (aka Forced Browsing). 2022-12-26 not yet calculated CVE-2019-13988
MISC
MISC hashicorp — nomad
  HashiCorp Nomad 0.5.0 through 0.9.4 (fixed in 0.9.5) reveals unintended environment variables to the rendering task during template rendering, aka GHSA-6hv3-7c34-4hx8. This applies to nomad/client/allocrunner/taskrunner/template. 2022-12-26 not yet calculated CVE-2019-14802
MISC
CONFIRM citrix — adc/gateway
  In certain Citrix products, information disclosure can be achieved by an authenticated VPN user when there is a configured SSL VPN endpoint. This affects Citrix ADC and Citrix Gateway 13.0-58.30 and later releases before the CTX276688 update. 2022-12-26 not yet calculated CVE-2019-18177
MISC cloud_native_computing — harbor
  Cloud Native Computing Foundation Harbor before 1.10.3 and 2.x before 2.0.1 allows resource enumeration because unauthenticated API calls reveal (via the HTTP status code) whether a resource exists. 2022-12-26 not yet calculated CVE-2019-19030
CONFIRM realtek — audio_drivers
  Realtek Audio Drivers for Windows, as used on the Lenovo ThinkPad X1 Carbon 20A7, 20A8, 20BS, and 20BT before 6.0.8882.1 and 20KH and 20KG before 6.0.8907.1 (and on many other Lenovo and non-Lenovo products), mishandles DLL preloading. 2022-12-26 not yet calculated CVE-2019-19705
MISC tendermint  — core
  Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector. 2022-12-27 not yet calculated CVE-2019-25072
MISC
MISC
MISC goa — goa
  Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory. 2022-12-27 not yet calculated CVE-2019-25073
MISC
MISC
MISC hide_files — hide_files
  A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767. 2022-12-25 not yet calculated CVE-2019-25084
MISC
MISC
MISC
MISC
MISC gnome — gvdb
  A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability. 2022-12-26 not yet calculated CVE-2019-25085
MISC
MISC
MISC iet-ou — open_media_player
  A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2019-25086
MISC
MISC
MISC
MISC
MISC
MISC httpserver — httpserver
  A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: ‘../filedir’. The attack may be initiated remotely. The name of the patch is 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216863. 2022-12-27 not yet calculated CVE-2019-25087
MISC
MISC
MISC oxidized_web — oxidized_web
  A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2019-25088
MISC
MISC
MISC
MISC morgawr — muon
  A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2019-25089
MISC
MISC
MISC
MISC freepbx — arimanager
  A vulnerability was found in FreePBX arimanager up to 13.0.5.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Views Handler. The manipulation of the argument dataurl leads to cross site scripting. The attack may be launched remotely. Upgrading to version 13.0.5.4 is able to address this issue. The name of the patch is 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. It is recommended to upgrade the affected component. VDB-216878 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2019-25090
MISC
MISC
MISC
MISC nsupdate.info — nsupdate.info
  A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file src/nsupdate/settings/base.py of the component CSRF Cookie Handler. The manipulation of the argument CSRF_COOKIE_HTTPONLY leads to cookie without ‘httponly’ flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2019-25091
MISC
MISC
MISC
MISC nakiami — mellivora
  A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry[‘ip’] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955. 2022-12-28 not yet calculated CVE-2019-25092
MISC
MISC
MISC
MISC pilz — pmc_programming_tool
  In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames. 2022-12-26 not yet calculated CVE-2019-9011
MISC nexenta — nexenta_stor
  An issue was discovered in Illumos in Nexenta NexentaStor 4.0.5 and 5.1.2, and other products. The SMB server allows an attacker to have unintended access, e.g., an attacker with WRITE_XATTR can change permissions. This occurs because of a combination of three factors: ZFS extended attributes are used to implement NT named streams, the SMB protocol requires implementations to have open handle semantics similar to those of NTFS, and the SMB server passes along certain attribute requests to the underlying object (i.e., they are not considered to be requests that pertain to the named stream). 2022-12-26 not yet calculated CVE-2019-9579
MISC
MISC jackson-databind — jackson-databind
  A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider. 2022-12-26 not yet calculated CVE-2020-10650
MISC
CONFIRM
MISC
MISC
CONFIRM
MISC sierra_wireless — airlink_mobility_manager
  Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges. 2022-12-26 not yet calculated CVE-2020-11101
MISC
MISC pilz — pmc_programming_tool
  In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user’s password may be changed by an attacker without knowledge of the current password. 2022-12-26 not yet calculated CVE-2020-12067
MISC pilz — pmc_programming_tool
  In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), the password-hashing feature requires insufficient computational effort. 2022-12-26 not yet calculated CVE-2020-12069
MISC shilpi — cape_x_web
  Shilpi CAPExWeb 1.1 allows SQL injection via a servlet/capexweb.cap_sendMail GET request. 2022-12-26 not yet calculated CVE-2020-24600
MISC togglz — togglz
  The console in Togglz before 2.9.4 allows CSRF. 2022-12-26 not yet calculated CVE-2020-28191
CONFIRM
CONFIRM
CONFIRM httpengine.handle — httpengine.handle
  Due to improper santization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. 2022-12-27 not yet calculated CVE-2020-36559
MISC
MISC
MISC
MISC go-unzip — go-unzip
  Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. 2022-12-27 not yet calculated CVE-2020-36560
MISC
MISC
MISC
MISC unzip — unzip
  Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. 2022-12-27 not yet calculated CVE-2020-36561
MISC
MISC
MISC
MISC dht — dht
  Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector. 2022-12-28 not yet calculated CVE-2020-36562
MISC
MISC go-saml — go-saml
  XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input. 2022-12-28 not yet calculated CVE-2020-36563
MISC
MISC nosurf — nosurf
  Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid. 2022-12-27 not yet calculated CVE-2020-36564
MISC
MISC
MISC tar-utils — tar-utils
  Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. 2022-12-27 not yet calculated CVE-2020-36566
MISC
MISC
MISC gin — gin
  Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines. 2022-12-27 not yet calculated CVE-2020-36567
MISC
MISC
MISC revel — revel
  Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation. 2022-12-27 not yet calculated CVE-2020-36568
MISC
MISC
MISC
MISC golang-nanoauth — golang-nanoauth
  Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token. 2022-12-27 not yet calculated CVE-2020-36569
MISC
MISC
MISC panel-builder — panel-builder
  A vulnerability classified as critical has been found in Modern Tribe Panel Builder Plugin. Affected is the function add_post_content_filtered_to_search_sql of the file ModularContent/SearchFilter.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4528d4f855dbbf24e9fc12a162fda84ce3bedc2f. It is recommended to apply a patch to fix this issue. VDB-216738 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2020-36626
MISC
MISC
MISC macaron — i18n
  A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2020-36627
MISC
MISC
MISC calsign — apde
  A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747. 2022-12-25 not yet calculated CVE-2020-36628
MISC
MISC
MISC simbco — httpster
  A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748. 2022-12-25 not yet calculated CVE-2020-36629
MISC
MISC
MISC freepbx — cdr
  A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771. 2022-12-25 not yet calculated CVE-2020-36630
MISC
MISC
MISC
MISC barronwaffles — dwc_network_server_emulator
  A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772. 2022-12-25 not yet calculated CVE-2020-36631
MISC
MISC
MISC
MISC hughsk — flat
  A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2020-36632
MISC
MISC
MISC
MISC
MISC
MISC moodle-block_sitenews — moodle-block_sitenews
  A vulnerability was found in moodle-block_sitenews 1.0. It has been classified as problematic. This affects the function get_content of the file block_sitenews.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.1 is able to address this issue. The name of the patch is cd18d8b1afe464ae6626832496f4e070bac4c58f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216879. 2022-12-27 not yet calculated CVE-2020-36633
MISC
MISC
MISC
MISC
MISC indeed_engineering — util
  A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2020-36634
MISC
MISC
MISC
MISC openmrs — appointment_scheduling_module
  A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.13.0 is able to address this issue. The name of the patch is 34213c3f6ea22df427573076fb62744694f601d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216915. 2022-12-27 not yet calculated CVE-2020-36635
MISC
MISC
MISC
MISC
MISC openmrs — admin_ui_module
  A vulnerability classified as problematic has been found in OpenMRS Admin UI Module up to 1.4.x. Affected is the function sendErrorMessage of the file omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java of the component Account Setup Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 702fbfdac7c4418f23bb5f6452482b4a88020061. It is recommended to upgrade the affected component. VDB-216918 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2020-36636
MISC
MISC
MISC
MISC
MISC wordpress — wordpress
  The Menu Item Visibility Control WordPress plugin through 0.5 doesn’t sanitize and validate the “Visibility logic” option for WordPress menu items, which could allow highly privileged users to execute arbitrary PHP code even in a hardened environment. 2022-12-26 not yet calculated CVE-2021-24942
MISC wordpress — wordpress
  php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php. 2022-12-26 not yet calculated CVE-2021-30134
MISC glob-parent — glob-parent
  The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression. 2022-12-26 not yet calculated CVE-2021-35065
CONFIRM
CONFIRM
MISC fastrack — reflex_2.0_activity_tracker
  fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows an Unauthenticated Remote attacker to send a malicious firmware update via BLE and brick the device. 2022-12-26 not yet calculated CVE-2021-35951
MISC
MISC fastrack — reflex_2.0_activity_tracker
  fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to change the time, date, and month via Bluetooth LE Characteristics on handle 0x0017. 2022-12-26 not yet calculated CVE-2021-35952
MISC
MISC fastrack — reflex_2.0_activity_tracker
  fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows a Remote attacker to cause a Denial of Service (device outage) via crafted choices of the last three bytes of a characteristic value. 2022-12-26 not yet calculated CVE-2021-35953
MISC
MISC fastrack — reflex_2.0_activity_tracker
  fastrack Reflex 2.0 W307S_REFLEX_v90.89 Activity Tracker allows physically proximate attackers to dump the firmware, flash custom malicious firmware, and brick the device via the Serial Wire Debug (SWD) feature. 2022-12-26 not yet calculated CVE-2021-35954
MISC
MISC go — golang.org/x/text
  golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack. 2022-12-26 not yet calculated CVE-2021-38561
MISC
MISC
CONFIRM
MISC philips — vue_pacs
  In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root. 2022-12-26 not yet calculated CVE-2021-39369
MISC
MISC
MISC go-yaml — yaml
  Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. 2022-12-27 not yet calculated CVE-2021-4235
MISC
MISC
MISC web — websockets
  Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable. 2022-12-27 not yet calculated CVE-2021-4236
MISC
MISC goutils — goutils
  Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions. 2022-12-27 not yet calculated CVE-2021-4238
MISC
MISC noise — noise
  The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages. 2022-12-27 not yet calculated CVE-2021-4239
MISC
MISC dns-stats — hedgehog
  A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don’t believe this specific attack is possible without such a compromise of the Data Manager server. 2022-12-25 not yet calculated CVE-2021-4276
MISC
MISC
MISC fredsmith — utils
  A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2021-4277
MISC
MISC cronvel — tree-kit
  A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2021-4278
MISC
MISC
MISC
MISC json-patch — json-patch
  A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2021-4279
MISC
MISC
MISC
MISC
MISC stylerw — styler_praat_scripts
  A vulnerability was found in styler_praat_scripts. It has been classified as problematic. Affected is an unknown function of the file file_segmenter.praat of the component Slash Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The name of the patch is 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216780. 2022-12-25 not yet calculated CVE-2021-4280
MISC
MISC
MISC brave_ux — for-the-badge
  A vulnerability was found in Brave UX for-the-badge and classified as critical. Affected by this issue is some unknown functionality of the file .github/workflows/combine-prs.yml. The manipulation leads to os command injection. The name of the patch is 55b5a234c0fab935df5fb08365bc8fe9c37cf46b. It is recommended to apply a patch to fix this issue. VDB-216842 is the identifier assigned to this vulnerability. 2022-12-26 not yet calculated CVE-2021-4281
MISC
MISC
MISC
MISC freepbx — voicemail
  A vulnerability was found in FreePBX voicemail. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file page.voicemail.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is 12e1469ef9208eda9d8955206e78345949236ee6. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216871. 2022-12-27 not yet calculated CVE-2021-4282
MISC
MISC
MISC
MISC freepbx — voicemail
  A vulnerability was found in FreeBPX voicemail. It has been rated as problematic. Affected by this issue is some unknown functionality of the file views/ssettings.php of the component Settings Handler. The manipulation of the argument key leads to cross site scripting. The attack may be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is ffce4882016076acd16fe0f676246905aa3cb2f3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216872. 2022-12-27 not yet calculated CVE-2021-4283
MISC
MISC
MISC
MISC openmrs — html_form_entry_ui_framework_integration_module
  A vulnerability classified as problematic has been found in OpenMRS HTML Form Entry UI Framework Integration Module up to 1.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 811990972ea07649ae33c4b56c61c3b520895f07. It is recommended to upgrade the affected component. The identifier VDB-216873 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2021-4284
MISC
MISC
MISC
MISC
MISC
MISC nagiosenterprises — ncpa
  A vulnerability classified as problematic was found in Nagios NCPA. This vulnerability affects unknown code of the file agent/listener/templates/tail.html. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.4.0 is able to address this issue. The name of the patch is 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. It is recommended to upgrade the affected component. VDB-216874 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2021-4285
MISC
MISC
MISC
MISC
MISC cocagne — pysrp
  A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875. 2022-12-27 not yet calculated CVE-2021-4286
MISC
MISC
MISC
MISC
MISC refirm_labs — binwalk
  A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 is able to address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876. 2022-12-27 not yet calculated CVE-2021-4287
MISC
MISC
MISC
MISC
MISC openmrs — module-referenceapplication
  A vulnerability was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/userApp.gsp. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 35f81901a4cb925747a9615b8706f5079d2196a1. It is recommended to upgrade the affected component. The identifier VDB-216881 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2021-4288
MISC
MISC
MISC
MISC
MISC openmrs — module-referenceapplication
  A vulnerability classified as problematic was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. Affected by this vulnerability is the function post of the file omod/src/main/java/org/openmrs/module/referenceapplication/page/controller/UserAppPageController.java of the component User App Page. The manipulation of the argument AppId leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 0410c091d46eed3c132fe0fcafe5964182659f74. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216883. 2022-12-27 not yet calculated CVE-2021-4289
MISC
MISC
MISC
MISC
MISC
MISC dhbw — fallstudie
  A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907. 2022-12-27 not yet calculated CVE-2021-4290
MISC
MISC
MISC openmrs — admin_ui_module
  A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916. 2022-12-27 not yet calculated CVE-2021-4291
MISC
MISC
MISC
MISC
MISC openmrs — admin_ui_module
  A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2021-4292
MISC
MISC
MISC
MISC
MISC openshift — osin
  A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987. 2022-12-28 not yet calculated CVE-2021-4294
MISC
MISC
MISC
MISC onc_code-validator-api — onc_code-validator-api
  A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability. 2022-12-29 not yet calculated CVE-2021-4295
MISC
MISC
MISC
MISC
MISC w3c_unicorn –w3c_unicorn
  A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019. 2022-12-29 not yet calculated CVE-2021-4296
MISC
MISC
MISC
MISC multiple_products — multiple_products
  An issue was discovered in illumos before f859e7171bb5db34321e45585839c6c3200ebb90, OmniOS Community Edition r151038, OpenIndiana Hipster 2021.04, and SmartOS 20210923. A local unprivileged user can cause a deadlock and kernel panic via crafted rename and rmdir calls on tmpfs filesystems. Oracle Solaris 10 and 11 is also affected. 2022-12-26 not yet calculated CVE-2021-43395
CONFIRM
CONFIRM
CONFIRM
MISC
MISC
MISC
MISC
CONFIRM
CONFIRM heimdal — heimdal
  Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. 2022-12-26 not yet calculated CVE-2021-44758
MISC
CONFIRM mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis. 2022-12-26 not yet calculated CVE-2021-44854
MISC mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature. 2022-12-26 not yet calculated CVE-2021-44855
MISC mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value. 2022-12-26 not yet calculated CVE-2021-44856
MISC control_web_panel/control_web_panel — control_web_panel/control_web_panel
  In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, attackers can make a crafted request to api/?api=add_server&DHCP= to add an authorized_keys text file in the /resources/ folder. 2022-12-26 not yet calculated CVE-2021-45466
MISC
MISC control_web_panel/control_web_panel — control_web_panel/control_web_panel
  In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter. 2022-12-26 not yet calculated CVE-2021-45467
MISC
MISC metersphere — metersphere
  MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere’s origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds. 2022-12-28 not yet calculated CVE-2022-23544
MISC
MISC alpine — alpine
  Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows URL access filter bypass. This issue has been fixed in version 1.10.4. There are no known workarounds. 2022-12-28 not yet calculated CVE-2022-23553
MISC
MISC
MISC alpine — alpine
  Alpine is a scaffolding library in Java. Alpine prior to version 1.10.4 allows Authentication Filter bypass. The AuthenticationFilter relies on the request URI to evaluate if the user is accessing the swagger endpoint. By accessing a URL with a path such as /api/foo;%2fapi%2fswagger the contains condition will hold and will return from the authentication filter without aborting the request. Note that the principal object will not be assigned and therefore the issue wont allow user impersonation. This issue has been fixed in version 1.10.4. There are no known workarounds. 2022-12-28 not yet calculated CVE-2022-23554
MISC
MISC
MISC authentik — authentik
  authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provided. The vulnerability allows an attacker that knows different invitation flows names (e.g. `enrollment-invitation-test` and `enrollment-invitation-admin`) via either different invite links or via brute forcing to signup via a single invitation url for any valid invite link received (it can even be a url for a third flow as long as it’s a valid invite) as the token used in the `Invitations` section of the Admin interface does NOT change when a different `enrollment flow` is selected via the interface and it is NOT bound to the selected flow, so it will be valid for any flow when used. This issue is patched in authentik 2022.11.4,2022.10.4 and 2022.12.0. Only configurations that use invitations and have multiple enrollment flows with invitation stages that grant different permissions are affected. The default configuration is not vulnerable, and neither are configurations with a single enrollment flow. As a workaround, fixed data can be added to invitations which can be checked in the flow to deny requests. Alternatively, an identifier with high entropy (like a UUID) can be used as flow slug, mitigating the attack vector by exponentially decreasing the possibility of discovering other flows. 2022-12-28 not yet calculated CVE-2022-23555
MISC general_electric — inet/inet_ii
  Certain General Electric Renewable Energy products have inadequate encryption strength. This affects iNET and iNET II before 8.3.0. 2022-12-26 not yet calculated CVE-2022-24116
MISC general_electric — inet/inet_ii
  Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6. 2022-12-26 not yet calculated CVE-2022-24117
MISC general_electric — inet/inet_ii
  Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6. 2022-12-26 not yet calculated CVE-2022-24118
MISC general_electric — inet/inet_ii
  Certain General Electric Renewable Energy products have a hidden feature for unauthenticated remote access to the device configuration shell. This affects iNET and iNET II before 8.3.0. 2022-12-26 not yet calculated CVE-2022-24119
MISC general_electric — inet/inet_ii
  Certain General Electric Renewable Energy products store cleartext credentials in flash memory. This affects iNET and iNET II before 8.3.0. 2022-12-26 not yet calculated CVE-2022-24120
MISC aws — sdk
  The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. 2022-12-27 not yet calculated CVE-2022-2582
MISC
MISC golang — golang
  A race condition can cause incorrect HTTP request routing. 2022-12-27 not yet calculated CVE-2022-2583
MISC
MISC golang — dagpb
  The dag-pb codec can panic when decoding invalid blocks. 2022-12-27 not yet calculated CVE-2022-2584
MISC
MISC devolutions –remote_desktop_manager
  Weak password derivation for export in Devolutions Remote Desktop Manager before 2022.1 allows information disclosure via a password brute-force attack. An error caused base64 to be decoded. 2022-12-26 not yet calculated CVE-2022-26964
CONFIRM directus — directus
  In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true. 2022-12-26 not yet calculated CVE-2022-26969
MISC
CONFIRM
MISC
MISC
MISC open-xchange — app_suite
  OX App Suite through 8.2 allows XSS because BMFreehand10 and image/x-freehand are not blocked. 2022-12-26 not yet calculated CVE-2022-29852
MISC
CONFIRM open-xchange — app_suite
  OX App Suite through 8.2 allows XSS via a certain complex hierarchy that forces use of Show Entire Message for a huge HTML e-mail message. 2022-12-26 not yet calculated CVE-2022-29853
MISC
CONFIRM emerson — deltav_distributed_control_system
  Emerson DeltaV Distributed Control System (DCS) has insufficient verification of firmware integrity (an inadequate checksum approach, and no signature). This affects versions before 14.3 of DeltaV M-series, DeltaV S-series, DeltaV P-series, DeltaV SIS, and DeltaV CIOC/EIOC/WIOC IO cards. 2022-12-26 not yet calculated CVE-2022-30260
MISC
MISC reprise_software — rlm_license_administration
  XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field. 2022-12-29 not yet calculated CVE-2022-30519
MISC go-yaml — go-yaml
  Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. 2022-12-27 not yet calculated CVE-2022-3064
MISC
MISC
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class=”deep-link-app” for a /#!!&app=%2e./ URI. 2022-12-26 not yet calculated CVE-2022-31469
CONFIRM
MISC rockwell_automation — studio_5000_logix_emulate_software
  A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software. Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. 2022-12-27 not yet calculated CVE-2022-3156
MISC golang — golang
  DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. 2022-12-28 not yet calculated CVE-2022-3346
MISC
MISC golang — golang
  DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain. 2022-12-28 not yet calculated CVE-2022-3347
MISC
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can access or modify system files or other files that are critical to the application, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-34669
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause truncation errors when casting a primitive to a primitive of smaller size causes data to be lost in the conversion, which may lead to denial of service or information disclosure. 2022-12-30 not yet calculated CVE-2022-34670
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-34671
MISC nvidia — control_panel
  NVIDIA Control Panel for Windows contains a vulnerability where an unauthorized user or an unprivileged regular user can compromise the security of the software by gaining privileges, reading sensitive information, or executing commands. 2022-12-30 not yet calculated CVE-2022-34672
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-34673
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where a helper function maps more physical pages than were requested, which may lead to undefined behavior or an information leak. 2022-12-30 not yet calculated CVE-2022-34674
MISC nvidia — gpu_display_driver
  NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34675
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-34676
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged regular user can cause an integer to be truncated, which may lead to denial of service or data tampering. 2022-12-30 not yet calculated CVE-2022-34677
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause a null-pointer dereference, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34678
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34679
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an integer truncation can lead to an out-of-bounds read, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34680
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler, where improper input validation of a display-related data structure may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34681
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34682
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-34683
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an off-by-one error may lead to data tampering or information disclosure. 2022-12-30 not yet calculated CVE-2022-34684
MISC hazelcast — hazelcast/hazelcast_jet
  The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3. 2022-12-29 not yet calculated CVE-2022-36437
MISC password_manager — password_manager
  Password Manager for IIS 2.0 has a cross-site scripting (XSS) vulnerability via the /isapi/PasswordManager.dll ResultURL parameter. 2022-12-26 not yet calculated CVE-2022-36664
MISC
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature. 2022-12-26 not yet calculated CVE-2022-37307
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages. 2022-12-26 not yet calculated CVE-2022-37308
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name. 2022-12-26 not yet calculated CVE-2022-37309
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI. 2022-12-26 not yet calculated CVE-2022-37310
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large location request parameter to the redirect servlet. 2022-12-26 not yet calculated CVE-2022-37311
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet. 2022-12-26 not yet calculated CVE-2022-37312
CONFIRM
MISC open-xchange — app_suite
  OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record. 2022-12-26 not yet calculated CVE-2022-37313
CONFIRM
MISC enlightenment –enlightenment_sys
  enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring. 2022-12-25 not yet calculated CVE-2022-37706
MISC
MISC
MISC esri — arcgis
  There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets). 2022-12-28 not yet calculated CVE-2022-38202
CONFIRM esri — arcgis
  Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212. 2022-12-29 not yet calculated CVE-2022-38203
MISC esri — arcgis
  There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. 2022-12-29 not yet calculated CVE-2022-38204
MISC esri — arcgis
  In some non-default installations of Esri Portal for ArcGIS versions 10.9.1 and below, a directory traversal issue may allow a remote, unauthenticated attacker to traverse the file system and lead to the disclosure of sensitive data (not customer-published content). 2022-12-29 not yet calculated CVE-2022-38205
MISC esri — arcgis
  There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser. 2022-12-29 not yet calculated CVE-2022-38206
MISC esri — arcgis
  There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and 10.7.1 which may allow a remote remote, unauthenticated attacker to create a crafted link which when clicked which could execute arbitrary JavaScript code in the victim’s browser. 2022-12-29 not yet calculated CVE-2022-38207
MISC esri — arcgis
  There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks. 2022-12-29 not yet calculated CVE-2022-38208
MISC esri — arcgis
  There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser. 2022-12-29 not yet calculated CVE-2022-38209
MISC esri — arcgis
  There is a reflected HTML injection vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser. 2022-12-29 not yet calculated CVE-2022-38210
CONFIRM esri — arcgis
  Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.9.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212. 2022-12-29 not yet calculated CVE-2022-38211
CONFIRM esri — arcgis
  Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.8.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38203. 2022-12-29 not yet calculated CVE-2022-38212
MISC wordpress — wordpress
  The Kwayy HTML Sitemap WordPress plugin before 4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-3835
MISC wordpress — wordpress
  The Login for Google Apps WordPress plugin before 3.4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-3840
MISC huawei — aslan_childrens_watch
  Huawei Aslan Children’s Watch has an improper input validation vulnerability. Successful exploitation may cause the watch’s application service abnormal. 2022-12-28 not yet calculated CVE-2022-39012
MISC wordpress — wordpress
  The Broken Link Checker WordPress plugin before 1.11.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) 2022-12-28 not yet calculated CVE-2022-3922
MISC intelbras — wifiber_120ac_inmesh
  Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute. 2022-12-25 not yet calculated CVE-2022-40005
MISC
MISC wordpress — wordpress
  The Paytium: Mollie payment forms & donations WordPress plugin through 4.3.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4042
MISC wordpress — wordpress
  The Return Refund and Exchange For WooCommerce WordPress plugin before 4.0.9 does not validate attachment files to be uploaded via an AJAX action available to unauthenticated users, which could allow them to upload arbitrary files such as PHP and lead to RCE 2022-12-26 not yet calculated CVE-2022-4047
MISC wordpress — wordpress
  The Eventify™ WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4110
MISC wordpress — wordpress
  The IWS WordPress plugin through 1.0 does not properly escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection. 2022-12-26 not yet calculated CVE-2022-4117
MISC wordpress — wordpress
  The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain 2022-12-26 not yet calculated CVE-2022-4120
MISC squid — squid
  An issue was discovered in Squid 4.9 through 4.17 and 5.0.6 through 5.6. Due to inconsistent handling of internal URIs, there can be Exposure of Sensitive Information about clients using the proxy via an HTTPS request to an internal cache manager URL. This is fixed in 5.7. 2022-12-25 not yet calculated CVE-2022-41317
MISC
MISC
CONFIRM
MISC squid — squid
  A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7. 2022-12-25 not yet calculated CVE-2022-41318
MISC
MISC
MISC
CONFIRM wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4150
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id GET parameter before concatenating it to an SQL query in export-images-data.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4151
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5, Contest Gallery Pro WordPress plugin before 19.1.5 do not escape the option_id POST parameter before concatenating it to an SQL query in edit-options.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4152
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the upload[] POST parameter before concatenating it to an SQL query in get-data-create-upload-v10.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4153
MISC
MISC wordpress — wordpress
  The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4154
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4155
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4156
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4157
MISC
MISC huawei — multiple_products
  There is an insufficient authentication vulnerability in some Huawei band products. Successful exploit could allow the attacker to spoof then connect to the band. 2022-12-28 not yet calculated CVE-2022-41579
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4158
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4159
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4160
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_start POST parameter before concatenating it to an SQL query in copy-gallery-images.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4161
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4162
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_deactivate and cg_activate POST parameters before concatenating it to an SQL query in 2_deactivate.php and 4_activate.php, respectively. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4163
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_multiple_files_for_post POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4164
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4165
MISC
MISC wordpress — wordpress
  The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the addCountS POST parameter before concatenating it to an SQL query in 4_activate.php. This may allow malicious users with at least author privilege to leak sensitive information from the site’s database. 2022-12-26 not yet calculated CVE-2022-4166
MISC
MISC mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users. 2022-12-26 not yet calculated CVE-2022-41765
MISC mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup. 2022-12-26 not yet calculated CVE-2022-41767
MISC xstream — xstream
  XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable. 2022-12-28 not yet calculated CVE-2022-41966
MISC
MISC hyperadev — dragonfly
  Dragonfly is a Java runtime dependency management library. Dragonfly v0.3.0-SNAPSHOT does not configure DocumentBuilderFactory to prevent XML external entity (XXE) attacks. This issue is patched in 0.3.1-SNAPSHOT. As a workaround, since Dragonfly only parses XML `SNAPSHOT` versions are being resolved, this vulnerability may be avoided by not trying to resolve `SNAPSHOT` versions. 2022-12-28 not yet calculated CVE-2022-41967
MISC
MISC wordpress — wordpress
  The Sliderby10Web WordPress plugin before 1.2.53 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4197
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure. 2022-12-30 not yet calculated CVE-2022-42254
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-42255
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-42256
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service. 2022-12-30 not yet calculated CVE-2022-42257
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service, data tampering, or information disclosure. 2022-12-30 not yet calculated CVE-2022-42258
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to denial of service. 2022-12-30 not yet calculated CVE-2022-42259
MISC wordpress — wordpress
  The Simple Basic Contact Form WordPress plugin before 20221201 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4226
MISC nvidia — gpu_display_driver
  NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-42260
MISC nvidia — vgpu_manager
  NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service. 2022-12-30 not yet calculated CVE-2022-42261
MISC nvidia — vgpu_manager
  NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service. 2022-12-30 not yet calculated CVE-2022-42262
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure. 2022-12-30 not yet calculated CVE-2022-42263
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service. 2022-12-30 not yet calculated CVE-2022-42264
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure or data tampering. 2022-12-30 not yet calculated CVE-2022-42265
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can cause exposure of sensitive information to an actor that is not explicitly authorized to have access to that information, which may lead to limited information disclosure. 2022-12-30 not yet calculated CVE-2022-42266
MISC nvidia — gpu_display_driver NVIDIA GPU Display Driver for Windows contains a vulnerability where a regular user can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. 2022-12-30 not yet calculated CVE-2022-42267
MISC nvidia — trusted_os
  NVIDIA Trusted OS contains a vulnerability in an SMC call handler, where failure to validate untrusted input may allow a highly privileged local attacker to cause information disclosure and compromise integrity. The scope of the impact can extend to other components. 2022-12-30 not yet calculated CVE-2022-42269
MISC wordpress — wordpress
  The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting 2022-12-26 not yet calculated CVE-2022-4227
MISC nvidia — multiple_products
  NVIDIA distributions of Linux contain a vulnerability in nvdla_emu_task_submit, where unvalidated input may allow a local attacker to cause stack-based buffer overflow in kernel code, which may lead to escalation of privileges, compromised integrity and confidentiality, and denial of service. 2022-12-30 not yet calculated CVE-2022-42270
MISC wordpress — wordpress
  The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id. 2022-12-26 not yet calculated CVE-2022-4239
MISC wordpress — wordpress
  The WP Google Review Slider WordPress plugin before 11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4242
MISC wordpress — wordpress
  The ImageInject WordPress plugin through TODO does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). 2022-12-26 not yet calculated CVE-2022-4243
MISC wordpress — wordpress
  The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack 2022-12-26 not yet calculated CVE-2022-4266
MISC wordpress — wordpress
  The Bulk Delete Users by Email WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting 2022-12-26 not yet calculated CVE-2022-4267
MISC wordpress — wordpress
  The Plugin Logic WordPress plugin through 1.0.7 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin 2022-12-26 not yet calculated CVE-2022-4268
MISC
MISC

samba — kerberos/ad_dc

heimdal — heimdal

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has “a similar bug.” 2022-12-25 not yet calculated CVE-2022-42898
CONFIRM
MISC
MISC
CONFIRM
CONFIRM
CONFIRM
CONFIRM zkteco — multiple_products
  Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210). 2022-12-25 not yet calculated CVE-2022-42953
MISC
MISC apache — kylin
  In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. 2022-12-30 not yet calculated CVE-2022-43396
MISC curl — curl
  A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded. 2022-12-23 not yet calculated CVE-2022-43551
MISC
MISC simmeth — lieferantenmanager
  An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure. 2022-12-25 not yet calculated CVE-2022-44015
MISC simmeth — lieferantenmanager
  An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim’s account after the victim logged out – /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout. 2022-12-25 not yet calculated CVE-2022-44017
MISC sourcecodester — sanitization_management_system
  SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection. 2022-12-30 not yet calculated CVE-2022-44137
MISC huawei — aslan_children_watch
  Huawei Aslan Children’s Watch has a path traversal vulnerability. Successful exploitation may allow attackers to access or modify protected system resources. 2022-12-28 not yet calculated CVE-2022-44564
MISC apache — kylin
  Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request. 2022-12-30 not yet calculated CVE-2022-44621
MISC heimdal — heimdal Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). 2022-12-25 not yet calculated CVE-2022-44640
CONFIRM slixmpp — slixmpp
  Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp. 2022-12-25 not yet calculated CVE-2022-45197
MISC
MISC
MISC
CONFIRM dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated request of MQTT credentials. An attacker can obtain encrypted MQTT credentials by sending a specific crafted packet to the vulnerable interface (the credentials cannot be directly exploited). 2022-12-27 not yet calculated CVE-2022-45423
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated request of AES crypto key. An attacker can obtain the AES crypto key by sending a specific crafted packet to the vulnerable interface. 2022-12-27 not yet calculated CVE-2022-45424
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of using of hard-coded cryptographic key. An attacker can obtain the AES crypto key by exploiting this vulnerability. 2022-12-27 not yet calculated CVE-2022-45425
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unrestricted download of file. After obtaining the permissions of ordinary users, by sending a specific crafted packet to the vulnerable interface, an attacker can download arbitrary files. 2022-12-27 not yet calculated CVE-2022-45426
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files. 2022-12-27 not yet calculated CVE-2022-45427
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of sensitive information leakage. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can obtain the debugging information. 2022-12-27 not yet calculated CVE-2022-45428
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of server-side request forgery (SSRF). An Attacker can access internal resources by concatenating links (URL) that conform to specific rules. 2022-12-27 not yet calculated CVE-2022-45429
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated enable or disable SSHD service. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could enable or disable the SSHD service. 2022-12-27 not yet calculated CVE-2022-45430
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated restart of remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated restart of remote DSS Server. 2022-12-27 not yet calculated CVE-2022-45431
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated search for devices. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could unauthenticated search for devices in range of IPs from remote DSS Server. 2022-12-27 not yet calculated CVE-2022-45432
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results. 2022-12-27 not yet calculated CVE-2022-45433
MISC dahua — multiple_products
  Some Dahua software products have a vulnerability of unauthenticated un-throttled ICMP requests on remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could exploit the victim server to launch ICMP request attack to the designated target host. 2022-12-27 not yet calculated CVE-2022-45434
MISC hillstone — firewall
  https://www.hillstonenet.com.cn/ Hillstone Firewall SG-6000 <= 5.0.4.0 is vulnerable to Incorrect Access Control. There is a permission bypass vulnerability in the Hillstone WEB application firewall. An attacker can enter the background of the firewall with super administrator privileges through a configuration error in report.m. 2022-12-27 not yet calculated CVE-2022-45778
MISC huawei — aslan_children_watch
  Huawei Aslan Children’s Watch has an improper authorization vulnerability. Successful exploit could allow the attacker to access certain file. 2022-12-28 not yet calculated CVE-2022-45874
MISC planet_estream — planet_estream
  Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter). 2022-12-25 not yet calculated CVE-2022-45889
MISC planet_estream — planet_estream
  In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter). 2022-12-25 not yet calculated CVE-2022-45890
MISC planet_estream — planet_estream
  Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList). 2022-12-25 not yet calculated CVE-2022-45891
MISC planet_estream — planet_estream
  In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username. 2022-12-25 not yet calculated CVE-2022-45892
MISC planet_estream — planet_estream
  Planet eStream before 6.72.10.07 allows a low-privileged user to gain access to administrative and high-privileged user accounts by changing the value of the ON cookie. A brute-force attack can calculate a value that provides permanent access. 2022-12-25 not yet calculated CVE-2022-45893
MISC planet_estream — planet_estream
  GetFile.aspx in Planet eStream before 6.72.10.07 allows .. directory traversal to read arbitrary local files. 2022-12-25 not yet calculated CVE-2022-45894
MISC planet_estream — planet_estream
  Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure). 2022-12-25 not yet calculated CVE-2022-45895
MISC planet_estream — planet_estream
  Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution. 2022-12-25 not yet calculated CVE-2022-45896
MISC h3c_firewall — h3c_firewall
  h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability. 2022-12-27 not yet calculated CVE-2022-45963
MISC authentik — authentik
  authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4. 2022-12-28 not yet calculated CVE-2022-46172
MISC elrondnetwork — elrond-go
  Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn’t found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50. 2022-12-28 not yet calculated CVE-2022-46173
MISC
MISC
MISC amazon — elastic_file_system
  efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later. 2022-12-28 not yet calculated CVE-2022-46174
MISC
MISC
MISC metersphere — metersphere
  MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds. 2022-12-29 not yet calculated CVE-2022-46178
MISC liuos — liuos
  LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to “” (no quotes) to null the variable and force credential checks. 2022-12-28 not yet calculated CVE-2022-46179
MISC
MISC gotify — gotify
  Gotify server is a simple server for sending and receiving messages in real-time per WebSocket. Versions prior to 2.2.2 contain an XSS vulnerability that allows authenticated users to upload .html files. An attacker could execute client side scripts **if** another user opened a link. The attacker could potentially take over the account of the user that clicked the link. The Gotify UI won’t natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify. The vulnerability has been fixed in version 2.2.2. As a workaround, you can block access to non image files via a reverse proxy in the `./image` directory. 2022-12-29 not yet calculated CVE-2022-46181
MISC
MISC
MISC dedecms — dedecms
  dedecms <=V5.7.102 is vulnerable to SQL Injection. In sys_ sql_ n query.php there are no restrictions on the sql query. 2022-12-27 not yet calculated CVE-2022-46442
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the user_edit_page parameter in the wifi_captive_portal function. 2022-12-30 not yet calculated CVE-2022-46580
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.nslookup_target parameter in the tools_nslookup function. 2022-12-30 not yet calculated CVE-2022-46581
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the login_name parameter in the do_graph_auth (sub_4061E0) function. 2022-12-30 not yet calculated CVE-2022-46582
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reboot_type parameter in the wizard_ipv6 (sub_41C380) function. 2022-12-30 not yet calculated CVE-2022-46583
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_deny (sub_415D7C) function. 2022-12-30 not yet calculated CVE-2022-46584
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the REMOTE_USER parameter in the get_access (sub_45AC2C) function. 2022-12-30 not yet calculated CVE-2022-46585
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow (sub_415B00) function. 2022-12-30 not yet calculated CVE-2022-46586
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function. 2022-12-30 not yet calculated CVE-2022-46588
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_option parameter in the tools_netstat (sub_41E730) function. 2022-12-30 not yet calculated CVE-2022-46589
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the cameo.cameo.netstat_rsname parameter in the tools_netstat (sub_41E730) function. 2022-12-30 not yet calculated CVE-2022-46590
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the reject_url parameter in the reject (sub_41BD60) function. 2022-12-30 not yet calculated CVE-2022-46591
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the set_sta_enrollee_pin_5g function. 2022-12-30 not yet calculated CVE-2022-46592
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the do_sta_enrollee_wifi function. 2022-12-30 not yet calculated CVE-2022-46593
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the update_file_name parameter in the auto_up_fw (sub_420A04) function. 2022-12-30 not yet calculated CVE-2022-46594
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the del_num parameter in the icp_delete_img (sub_41DEDC) function. 2022-12-30 not yet calculated CVE-2022-46596
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the sys_service parameter in the setup_wizard_mydlink (sub_4104B8) function. 2022-12-30 not yet calculated CVE-2022-46597
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a command injection vulnerability via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_5g function. 2022-12-30 not yet calculated CVE-2022-46598
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setlogo_num parameter in the icp_setlogo_img (sub_41DBF4) function. 2022-12-30 not yet calculated CVE-2022-46599
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_24g function. 2022-12-30 not yet calculated CVE-2022-46600
MISC trendnet — tew755AP_1.13B01
  TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setbg_num parameter in the icp_setbg_img (sub_41DD68) function. 2022-12-30 not yet calculated CVE-2022-46601
MISC huawei — ws7100-20
  There is a denial of service vulnerability in the Wi-Fi module of the HUAWEI WS7100-20 Smart WiFi Router.Successful exploit could cause a denial of service (DoS) condition. 2022-12-28 not yet calculated CVE-2022-46740
MISC trueconf_server — trueconf_server
  A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 allows a low-privileged database user to execute arbitrary SQL commands as the database administrator, resulting in execution of arbitrary code. 2022-12-27 not yet calculated CVE-2022-46763
MISC
MISC trueconf_server — trueconf_server
  A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution. 2022-12-27 not yet calculated CVE-2022-46764
MISC
MISC usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. 2022-12-27 not yet calculated CVE-2022-4691
MISC
CONFIRM usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. 2022-12-27 not yet calculated CVE-2022-4694
CONFIRM
MISC usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.0. 2022-12-27 not yet calculated CVE-2022-4695
CONFIRM
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47115
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the SYSPS parameter at /goform/SysToolChangePwd. 2022-12-30 not yet calculated CVE-2022-47116
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47117
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47118
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the ssid parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47119
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47120
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47121
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd_5g parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47122
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47123
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47124
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47125
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47126
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wrlPwd parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47127
MISC tenda — a15
  Tenda A15 V15.13.07.13 was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet. 2022-12-30 not yet calculated CVE-2022-47128
MISC ikus060 — rdiffweb
  Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4719
MISC
CONFIRM ikus060 — rdiffweb
  Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4720
CONFIRM
MISC ikus060 — rdiffweb
  Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4721
CONFIRM
MISC ikus060 — rdiffweb
  Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4722
MISC
CONFIRM ikus060 — rdiffweb
  Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4723
MISC
CONFIRM ikus060 — rdiffweb
  Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5. 2022-12-27 not yet calculated CVE-2022-4724
MISC
CONFIRM aws — sdk
  A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4725
MISC
MISC
MISC
MISC sourcecodester — sanitization_management_system A vulnerability classified as critical was found in SourceCodester Sanitization Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216739. 2022-12-27 not yet calculated CVE-2022-4726
MISC openmrs — appointment_scheduling_module
  A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4727
MISC
MISC
MISC
MISC graphite — web
  A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4728
MISC
MISC
MISC
MISC graphite — web
  A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743. 2022-12-27 not yet calculated CVE-2022-4729
MISC
MISC
MISC
MISC graphite — web
  A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744. 2022-12-27 not yet calculated CVE-2022-4730
MISC
MISC
MISC
MISC myapnea — myapnea
  A vulnerability, which was classified as problematic, was found in myapnea up to 29.0.x. Affected is an unknown function of the component Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 29.1.0 is able to address this issue. The name of the patch is 99934258530d761bd5d09809bfa6c14b598f8d18. It is recommended to upgrade the affected component. VDB-216750 is the identifier assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2022-4731
MISC
MISC
MISC
MISC microweber — microweber
  Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2. 2022-12-27 not yet calculated CVE-2022-4732
CONFIRM
MISC openemr — openemr
  Cross-site Scripting (XSS) – Stored in GitHub repository openemr/openemr prior to 7.0.0.2. 2022-12-27 not yet calculated CVE-2022-4733
MISC
CONFIRM usememos — memos
  Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository usememos/memos prior to 0.9.1. 2022-12-27 not yet calculated CVE-2022-4734
CONFIRM
MISC asrashley — dash-live
  A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. It is recommended to apply a patch to fix this issue. VDB-216766 is the identifier assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2022-4735
MISC
MISC
MISC
MISC venganzas_del_pasado — venganzas_del_pasado
  A vulnerability was found in Venganzas del Pasado and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument the_title leads to cross site scripting. The attack may be launched remotely. The name of the patch is 62339b2ec445692c710b804bdf07aef4bd247ff7. It is recommended to apply a patch to fix this issue. VDB-216770 is the identifier assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2022-4736
MISC
MISC
MISC
MISC sourcecodester — blood_management_system
  A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2022-4737
MISC
MISC sourcecodester — blood_management_system
  A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability. 2022-12-25 not yet calculated CVE-2022-4738
MISC
MISC sourcecodester — blood_management_system
  A vulnerability classified as critical was found in SourceCodester School Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216775. 2022-12-25 not yet calculated CVE-2022-4739
MISC
MISC kkfileview — kkfileview
  A vulnerability, which was classified as problematic, has been found in kkFileView. Affected by this issue is the function setWatermarkAttribute of the file /picturesPreview. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216776. 2022-12-25 not yet calculated CVE-2022-4740
MISC
MISC
MISC docconv — docconv
  A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779. 2022-12-25 not yet calculated CVE-2022-4741
MISC
MISC
MISC
MISC
MISC json-pointer — json-pointer
  A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes (‘prototype pollution’). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability. 2022-12-26 not yet calculated CVE-2022-4742
MISC
MISC
MISC
MISC flatpress — flatpress
  A vulnerability was found in FlatPress. It has been classified as critical. This affects the function doItemActions of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component File Delete Handler. The manipulation of the argument deletefile leads to path traversal. The name of the patch is 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. It is recommended to apply a patch to fix this issue. The identifier VDB-216861 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4748
MISC
MISC
MISC
MISC flatpress — flatpress
  A vulnerability was found in FlatPress and classified as problematic. This issue affects the function main of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component Media Manager Plugin. The manipulation of the argument mm-newgallery-name leads to cross site scripting. The attack may be initiated remotely. The name of the patch is d3f329496536dc99f9707f2f295d571d65a496f5. It is recommended to apply a patch to fix this issue. The identifier VDB-216869 was assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4755
MISC
MISC
MISC
MISC dolibarr_project_timesheet — dolibarr_project_timesheet
  A vulnerability was found in dolibarr_project_timesheet up to 4.5.5. It has been declared as problematic. This vulnerability affects unknown code of the component Form Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. Upgrading to version 4.5.6.a is able to address this issue. The name of the patch is 082282e9dab43963e6c8f03cfaddd7921de377f4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216880. 2022-12-27 not yet calculated CVE-2022-4766
MISC
MISC
MISC
MISC
MISC usememos — memos
  Denial of Service in GitHub repository usememos/memos prior to 0.9.1. 2022-12-27 not yet calculated CVE-2022-4767
CONFIRM
MISC dropbox — merou
  A vulnerability was found in Dropbox merou. It has been classified as critical. Affected is the function add_public_key of the file grouper/public_key.py of the component SSH Public Key Handler. The manipulation of the argument public_key_str leads to injection. It is possible to launch the attack remotely. The name of the patch is d93087973afa26bc0a2d0a5eb5c0fde748bdd107. It is recommended to apply a patch to fix this issue. VDB-216906 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4768
MISC
MISC
MISC
MISC widoco — widoco
  A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability. 2022-12-27 not yet calculated CVE-2022-4772
MISC
MISC
MISC
MISC elvexys — streamx
  StreamX applications from versions 6.02.01 to 6.04.34 are affected by a path traversal vulnerability that allows authenticated users to get unauthorized access to files on the server’s filesystem. StreamX applications using StreamView HTML component with the public web server feature activated are affected. 2022-12-29 not yet calculated CVE-2022-4778
MISC elvexys — streamx
  StreamX applications from versions 6.02.01 to 6.04.34 are affected by a logic bug that allows to bypass the implemented authentication scheme. StreamX applications using StreamView HTML component with the public web server feature activated are affected. 2022-12-29 not yet calculated CVE-2022-4779
MISC elvexys — streamx
  ISOS firmwares from versions 1.81 to 2.00 contain hardcoded credentials from embedded StreamX installer that integrators are not forced to change. 2022-12-29 not yet calculated CVE-2022-4780
MISC linux — kernel
  An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case. 2022-12-23 not yet calculated CVE-2022-47943
MISC
MISC
MISC
MLIST linux — kernel
  An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq. 2022-12-23 not yet calculated CVE-2022-47946
MISC
MISC
MLIST usememos — memos
  Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4796
MISC
CONFIRM heimdall — application_dashboard
  Heimdall Application Dashboard through 2.5.4 allows reflected and stored XSS via “Application name” to the “Add application” page. The stored XSS will be triggered in the “Application list” page. 2022-12-27 not yet calculated CVE-2022-47968
MISC
MISC usememos — memos
  Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4797
MISC
CONFIRM usememos — memos
  Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4798
MISC
CONFIRM usememos — memos
  Improper Authentication in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4799
MISC
CONFIRM usememos — memos
  Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4800
MISC
CONFIRM usememos — memos
  Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4801
MISC
CONFIRM usememos — memos
  Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4802
MISC
CONFIRM usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4803
MISC
CONFIRM usememos — memos
  Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4804
MISC
CONFIRM usememos — memos
  Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4805
CONFIRM
MISC usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4806
MISC
CONFIRM usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4807
MISC
CONFIRM usememos — memos
  Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4808
MISC
CONFIRM usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4809
MISC
CONFIRM usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4810
MISC
CONFIRM usememos — memos
  Improper Authorization in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4811
MISC
CONFIRM usememos — memos
  Comparison of Object References Instead of Object Contents in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4812
MISC
CONFIRM usememos — memos
  Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4813
MISC
CONFIRM usememos — memos
  Improper Access Control in GitHub repository usememos/memos prior to 0.9.1. 2022-12-28 not yet calculated CVE-2022-4814
MISC
CONFIRM centic9 — jgit-cookbook
  A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988. 2022-12-28 not yet calculated CVE-2022-4817
MISC
MISC
MISC
MISC talend — open studio for mdm
  A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2022-4818
MISC
MISC
MISC
MISC
MISC hotcrp — hotcrp
  A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2022-4819
MISC
MISC
MISC tp-link — tl-wr902ac
  TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate. 2022-12-30 not yet calculated CVE-2022-48194
MISC mellium — mellium.im/sasl
  An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication. 2022-12-31 not yet calculated CVE-2022-48195
MISC N/A — N/A
  Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. 2022-12-30 not yet calculated CVE-2022-48196
MISC
MISC netgear — multiple_products
  A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999. 2022-12-28 not yet calculated CVE-2022-4820
MISC
MISC
MISC
MISC flatpress — flatpress
  A vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000. 2022-12-28 not yet calculated CVE-2022-4821
MISC
MISC
MISC
MISC flatpress — flatpress
  A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2022-4822
MISC
MISC
MISC
MISC flatpress — flatpress
  A vulnerability, which was classified as problematic, was found in InSTEDD Nuntium. Affected is an unknown function of the file app/controllers/geopoll_controller.rb. The manipulation of the argument signature leads to observable timing discrepancy. It is possible to launch the attack remotely. The name of the patch is 77236f7fd71a0e2eefeea07f9866b069d612cf0d. It is recommended to apply a patch to fix this issue. VDB-217002 is the identifier assigned to this vulnerability. 2022-12-28 not yet calculated CVE-2022-4823
MISC
MISC
MISC instedd — nuntium
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4839
CONFIRM
MISC usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4840
MISC
CONFIRM usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4841
MISC
CONFIRM radareorg — radare2
  NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2. 2022-12-29 not yet calculated CVE-2022-4843
CONFIRM
MISC usememos — memos
  Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4844
CONFIRM
MISC usememos — memos
  Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4845
MISC
CONFIRM usememos — memos
  Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4846
MISC
CONFIRM usememos — memos
  Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4847
MISC
CONFIRM usememos — memos
  Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4848
MISC
CONFIRM usememos — memos
  Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4849
CONFIRM
MISC usememos — memos
  Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4850
MISC
CONFIRM usememos — memos
  Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1. 2022-12-29 not yet calculated CVE-2022-4851
MISC
CONFIRM sourcecodester — lead_management_system A vulnerability, which was classified as critical, was found in SourceCodester Lead Management System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-217020. 2022-12-30 not yet calculated CVE-2022-4855
MISC
MISC
MISC modbus_tools — modbus_slave
  A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2022-4856
MISC
MISC
MISC
MISC modbus_tools — modbus_slave
  A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability. 2022-12-30 not yet calculated CVE-2022-4857
MISC
MISC
MISC
MISC m-files — server
  Insertion of Sensitive Information into Log Files in M-Files Server before 22.10.11846.0 could allow to obtain sensitive tokens from logs, if specific configurations were set. 2022-12-30 not yet calculated CVE-2022-4858
MISC joget — joget
  A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The name of the patch is 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055. 2022-12-30 not yet calculated CVE-2022-4859
MISC
MISC
MISC
MISC kbase — metrics
  A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The name of the patch is 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059. 2022-12-30 not yet calculated CVE-2022-4860
MISC
MISC
MISC
MISC m-files — client
  Incorrect implementation in authentication protocol in M-Files Client before 22.5.11356.0 allows high privileged user to get other users tokens to another resource. 2022-12-30 not yet calculated CVE-2022-4861
MISC usememos — memos
  Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1. 2022-12-30 not yet calculated CVE-2022-4863
MISC
CONFIRM froxlor — froxlor
  Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. 2022-12-30 not yet calculated CVE-2022-4864
MISC
CONFIRM usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. 2022-12-31 not yet calculated CVE-2022-4865
CONFIRM
MISC usememos — memos
  Cross-site Scripting (XSS) – Stored in GitHub repository usememos/memos prior to 0.9.1. 2022-12-31 not yet calculated CVE-2022-4866
CONFIRM
MISC froxlor — froxlor
  Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. 2022-12-31 not yet calculated CVE-2022-4867
MISC
CONFIRM froxlor — froxlor
  Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1. 2022-12-31 not yet calculated CVE-2022-4868
CONFIRM
MISC