| cve_id | publish_date | last_modified_date | severity | cvss_base_score | description |
|---|---|---|---|---|---|
| CVE-2022-27607 | 2022-03-21T23:15Z | 2022-03-21T23:15Z | Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class. a related issue to CVE-2018-14531. | ||
| CVE-2022-26285 | 2022-03-21T23:15Z | 2022-03-21T23:15Z | Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the apply endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. | ||
| CVE-2022-26284 | 2022-03-21T23:15Z | 2022-03-21T23:15Z | Simple Client Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the manage_client endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. | ||
| CVE-2022-26283 | 2022-03-21T23:15Z | 2022-03-21T23:15Z | Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. | ||
| CVE-2022-27333 | 2022-03-21T22:15Z | 2022-03-21T22:15Z | idcCMS v1.10 was discovered to contain an issue which allows attackers to arbitrarily delete the install.lock file. resulting in a reset of the CMS settings and data. | ||
| CVE-2022-27090 | 2022-03-21T22:15Z | 2022-03-21T22:15Z | Cscms Music Portal System v4.2 was discovered to contain a redirection vulnerability via the backurl parameter. | ||
| CVE-2022-26184 | 2022-03-21T22:15Z | 2022-03-21T22:15Z | Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | ||
| CVE-2022-26183 | 2022-03-21T22:15Z | 2022-03-21T22:15Z | PNPM v6.15.1 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | ||
| CVE-2022-26174 | 2022-03-21T22:15Z | 2022-03-21T22:15Z | A remote code execution (RCE) vulnerability in Beekeeper Studio v3.2.0 allows attackers to execute arbitrary code via a crafted payload injected into the display fields. | ||
| CVE-2022-0601 | 2022-03-14T15:15Z | 2022-03-21T21:16Z | MEDIUM | 4.3 | The Countdown. Coming Soon. Maintenance WordPress plugin before 2.2.9 does not sanitize and escape the post parameter before outputting it back in an admin page. leading to a Reflected Cross-Site Scripting. |
| CVE-2021-40662 | 2022-03-21T21:15Z | 2022-03-21T21:15Z | A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL. | ||
| CVE-2021-3199 | 2021-01-26T18:16Z | 2022-03-21T21:15Z | HIGH | 7.5 | Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3. when JWT is used. via a /.. sequence in an image upload parameter. |
| CVE-2021-38745 | 2022-03-21T21:15Z | 2022-03-21T21:15Z | Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page. | ||
| CVE-2022-0593 | 2022-03-14T15:15Z | 2022-03-21T20:58Z | MEDIUM | 6.4 | The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory. allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation. |
| CVE-2022-0503 | 2022-03-14T15:15Z | 2022-03-21T20:47Z | MEDIUM | 4.3 | The WordPress Multisite Content Copier/Updater WordPress plugin before 2.1.2 does not sanitise and escape the s parameter before outputting it back in an attribute. leading to a Reflected Cross-Site Scripting issue in the network dashboard |
| CVE-2022-0478 | 2022-03-14T15:15Z | 2022-03-21T20:40Z | MEDIUM | 6.5 | The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/editing events. which could allow users with a role as low as contributor to perform SQL Injection attacks |
| CVE-2022-0449 | 2022-03-14T15:15Z | 2022-03-21T20:26Z | MEDIUM | 4.3 | The Flexi WordPress plugin before 4.20 does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard. leading to a Reflected Cross-Site Scripting |
| CVE-2022-0399 | 2022-03-14T15:15Z | 2022-03-21T20:17Z | MEDIUM | 4.3 | The Advanced Product Labels for WooCommerce WordPress plugin before 1.2.3.7 does not sanitise and escape the tax_color_set_type parameter before outputting it back in the berocket_apl_color_listener AJAX action's response. leading to a Reflected Cross-Site Scripting |
| CVE-2022-26148 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | An issue was discovered in Grafana through 7.3.4. when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register. one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address. | ||
| CVE-2022-24775 | 2022-03-21T19:15Z | 2022-03-21T20:15Z | guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds. | ||
| CVE-2022-23352 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS). | ||
| CVE-2022-23350 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability. | ||
| CVE-2022-23349 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forgery (CSRF). | ||
| CVE-2022-23348 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes. | ||
| CVE-2022-23347 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks. | ||
| CVE-2022-23346 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues. | ||
| CVE-2022-23345 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control. | ||
| CVE-2021-46390 | 2022-03-21T20:15Z | 2022-03-21T20:15Z | An access control issue in the authentication module of Lexar_F35 v1.0.34 allows attackers to access sensitive data and cause a Denial of Service (DoS). An attacker without access to securely protected data on a secure USB flash drive can bypass user authentication without having any information related to the password of the registered user. The secure USB flash drive transmits the password entered by the user to the authentication module in the drive after the user registers a password. and then the input password is compared with the registered password stored in the authentication module. Subsequently. the module returns the comparison result for the authentication decision. Therefore. an attacker can bypass password authentication by analyzing the functions that return the password verification or comparison results and manipulate the authentication result values. Accordingly. even if attackers enter an incorrect password. they can be authenticated as a legitimate user and can therefore exploit functions of the secure USB flash drive by manipulating the authentication result values. | ||
| CVE-2022-0327 | 2022-03-14T15:15Z | 2022-03-21T20:13Z | MEDIUM | 4.3 | The Master Addons for Elementor WordPress plugin before 1.8.5 does not sanitise and escape the error_message parameter before outputting it back in the response of the jltma_restrict_content AJAX action. available to unauthenticated and authenticated users. leading to a Reflected Cross-Site Scripting |
| CVE-2022-0321 | 2022-03-14T15:15Z | 2022-03-21T19:54Z | MEDIUM | 4.3 | The WP Voting Contest WordPress plugin through 2.1 does not sanitise and escape the post_id parameter before outputting it back in the response via the wpvc_social_share_icons AJAX action (available to both unauthenticated and authenticated users). leading to a Reflected Cross-Site Scripting issue |
| CVE-2022-0254 | 2022-03-14T15:15Z | 2022-03-21T19:28Z | HIGH | 7.5 | The WordPress Zero Spam WordPress plugin before 5.2.11 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard. leading to a SQL injection |
| CVE-2022-24766 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | mitmproxy is an interactive. SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below. a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request. the target server would see multiple requests. A smuggled request is still captured as part of another request's body. but it does not appear in the request list and does not go through the usual mitmproxy event hooks. where users may have implemented custom access control checks or input sanitization. Unless mitmproxy is used to protect an HTTP/1 service. no action is required. The vulnerability has been fixed in mitmproxy 8.0.0 and above. There are currently no known workarounds. | ||
| CVE-2022-0760 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users). leading to an unauthenticated SQL Injection | ||
| CVE-2022-0747 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users). leading to an unauthenticated SQL Injection | ||
| CVE-2022-0739 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user supplied POST data before it is used in a dynamically constructed SQL query via the bookingpress_front_get_category_services AJAX action (available to unauthenticated users). leading to an unauthenticated SQL Injection | ||
| CVE-2022-0694 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Advanced Booking Calendar WordPress plugin before 1.7.0 does not validate and escape the calendar parameter before using it in a SQL statement via the abc_booking_getSingleCalendar AJAX action (available to both unauthenticated and authenticated users). leading to an unauthenticated SQL injection | ||
| CVE-2022-0687 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user. which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role. | ||
| CVE-2022-0681 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Simple Membership WordPress plugin before 4.1.0 does not have CSRF check in place when deleting Transactions. which could allow attackers to make a logged in admin delete arbitrary transactions via a CSRF attack | ||
| CVE-2022-0640 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Pricing Table Builder WordPress plugin before 1.1.5 does not sanitize and escape the postid parameter before outputting it back in an admin page. leading to a Reflected Cross-Site Scripting. | ||
| CVE-2022-0628 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Mega Menu WordPress plugin before 3.0.8 does not sanitize and escape the _wpnonce parameter before outputting it back in an admin page. leading to a Reflected Cross-Site Scripting. | ||
| CVE-2022-0627 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page. leading to a Reflected Cross-Site Scripting. | ||
| CVE-2022-0616 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers. which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack | ||
| CVE-2022-0591 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action. leading to SSRF issues exploitable by unauthenticated users | ||
| CVE-2022-0590 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The BulletProof Security WordPress plugin before 5.8 does not sanitise and escape some of its settings. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | ||
| CVE-2022-0515 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | Cross-Site Request Forgery (CSRF) in GitHub repository crater-invoice/crater prior to 6.0.4. | ||
| CVE-2022-0514 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5. | ||
| CVE-2022-0440 | 2022-03-07T09:15Z | 2022-03-21T19:15Z | MEDIUM | 6.5 | The Catch Themes Demo Import WordPress plugin before 2.1.1 does not validate one of the file to be imported. which could allow high privivilege admin to upload an arbitrary PHP file and gain RCE even in the case of an hardened blog (ie DISALLOW_UNFILTERED_HTML. DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS constants set to true) |
| CVE-2022-0423 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The 3D FlipBook WordPress plugin before 1.12.1 does not have authorisation and CSRF checks when updating its settings. and does not have any sanitisation/escaping. allowing any authenticated users. such as subscriber to put Cross-Site Scripting payloads in all pages with a 3d flipbook. | ||
| CVE-2022-0364 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The Modern Events Calendar Lite WordPress plugin before 6.4.0 does not sanitize and escape some of the Hourly Schedule parameters which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks | ||
| CVE-2022-0229 | 2022-03-21T19:15Z | 2022-03-21T19:15Z | The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod. and does not validate the parameters passed to it properly. As a result. unauthenticated users could delete arbitrary options from the blog. making it unusable. |