Original release date: December 28, 2022
High Vulnerabilities
[CENTER][TABLE] [TR] [TH]Primary Vendor -- Product[/TH] [TH]Description[/TH] [TH]Published[/TH] [TH]CVSS Score[/TH] [TH]Source & Patch Info[/TH] [/TR] [TR] [TD][LEFT]greenend -- sftpserver[/LEFT][/TD] [TD][LEFT]** DISPUTED ** A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2020-36617&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2020-36617]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36617') [N/A]('https://vuldb.com/?id.216205') [N/A]('https://github.com/ewxrjk/sftpserver/commit/bf4032f34832ee11d79aa60a226cc018e7ec5eed')[/TD] [/TR] [TR] [TD][LEFT]online_grading_system_project -- online_grading_system[/LEFT][/TD] [TD][LEFT]A SQL injection vulnerability in Sourcecodester Online Grading System 1.0 allows remote attackers to execute arbitrary SQL commands via the uname parameter.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-31650&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2021-31650]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-31650') [MISC]('https://www.exploit-db.com/exploits/49493')[/TD] [/TR] [TR] [TD][LEFT]ruoyi -- ruoyi[/LEFT][/TD] [TD][LEFT]Deserialization issue discovered in Ruoyi before 4.6.1 allows remote attackers to run arbitrary code via weak cipher in Shiro framework.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-38241&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2021-38241]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-38241') [MISC]('https://www.du1ge.com/archives/CVE-2021-38241')[/TD] [/TR] [TR] [TD][LEFT]lmeve_project -- lmeve[/LEFT][/TD] [TD][LEFT]A vulnerability was found in roxlukas LMeve and classified as critical. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument X-Forwarded-For leads to sql injection. The attack may be launched remotely. The name of the patch is 29e1ead3bb1c1fad53b77dfc14534496421c5b5d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216176.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4246&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2021-4246]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4246') [N/A]('https://vuldb.com/?id.216176') [N/A]('https://github.com/roxlukas/lmeve/commit/29e1ead3bb1c1fad53b77dfc14534496421c5b5d')[/TD] [/TR] [TR] [TD][LEFT]kapetan_dns_project -- kapetan_dns[/LEFT][/TD] [TD][LEFT]A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4248&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2021-4248]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4248') [N/A]('https://github.com/kapetan/dns/releases/tag/v7.0.0') [N/A]('https://github.com/kapetan/dns/commit/cf7105aa2aae90d6656088fe5a8ee1d5730773b6') [N/A]('https://github.com/kapetan/dns/pull/88') [N/A]('https://vuldb.com/?id.216188')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]The search term could have been specified externally to trigger SQL injection. This vulnerability affects Firefox for iOS < 101.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-1887&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-1887]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1887') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1767205') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-23/')[/TD] [/TR] [TR] [TD][LEFT]mutiny -- mutiny[/LEFT][/TD] [TD][LEFT]Mutiny 7.2.0-10788 suffers from Hardcoded root password.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-37832&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-37832]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-37832') [MISC]('https://labs.jumpsec.com/advisory-cve-2022-37832-mutiny-network-monitoring-appliance-hardcoded-credentials/')[/TD] [/TR] [TR] [TD][LEFT]beardev -- joomsport[/LEFT][/TD] [TD][LEFT]The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4050&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4050]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4050') [MISC]('https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f')[/TD] [/TR] [TR] [TD][LEFT]pluginus -- inpost_gallery[/LEFT][/TD] [TD][LEFT]The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4063&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4063]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4063') [MISC]('https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]Product: AndroidVersions: Android kernelAndroid ID: A-235292841References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42529&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42529]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42529') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]contec -- conprosys_hmi_system[/LEFT][/TD] [TD][LEFT]CONPROSYS HMI System (CHS) Ver.3.4.4?and earlier allows a remote unauthenticated attacker to execute an arbitrary OS command on the server where the product is running by sending a specially crafted request.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44456&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44456]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44456') [MISC]('https://www.contec.com/download/contract/contract4/?itemid=ea8039aa-3434-4999-9ab6-897aa690210c&downloaditemid=866d7d3c-aae9-438d-87f3-17aa040df90b') [MISC]('https://jvn.jp/en/vu/JVNVU96873821/index.html') [MISC]('https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_221014_en.pdf')[/TD] [/TR] [TR] [TD][LEFT]ruoyi_project -- ruoyi[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4566&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4566]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4566') [MISC]('https://github.com/luelueking/ruoyi-4.7.5-vuln-poc') [MISC]('https://vuldb.com/?id.215975') [MISC]('https://gitee.com/y_project/RuoYi/commit/167970e5c4da7bb46217f576dc50622b83f32b40') [MISC]('https://gitee.com/y_project/RuoYi/issues/I65V2B')[/TD] [/TR] [TR] [TD][LEFT]crmx_project -- crmx[/LEFT][/TD] [TD][LEFT]A vulnerability was found in luckyshot CRMx and classified as critical. This issue affects the function get/save/delete/comment/commentdelete of the file index.php. The manipulation leads to sql injection. The attack may be initiated remotely. The name of the patch is 8c62d274986137d6a1d06958a6f75c3553f45f8f. It is recommended to apply a patch to fix this issue. The identifier VDB-216185 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4592&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4592]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4592') [N/A]('https://github.com/luckyshot/CRMx/commit/8c62d274986137d6a1d06958a6f75c3553f45f8f') [N/A]('https://vuldb.com/?id.216185')[/TD] [/TR] [TR] [TD][LEFT]tjws2_project -- tjws2[/LEFT][/TD] [TD][LEFT]A vulnerability was found in drogatkin TJWS2. It has been declared as critical. Affected by this vulnerability is the function deployWar of the file 1.x/src/rogatkin/web/WarRoller.java. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 1bac15c496ec54efe21ad7fab4e17633778582fc. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216187.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4594&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4594]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4594') [N/A]('https://vuldb.com/?id.216187') [N/A]('https://github.com/drogatkin/TJWS2/commit/1bac15c496ec54efe21ad7fab4e17633778582fc')[/TD] [/TR] [TR] [TD][LEFT]flatpress -- flatpress[/LEFT][/TD] [TD][LEFT]PHP Remote File Inclusion in GitHub repository flatpressblog/flatpress prior to 1.3.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4606&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4606]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4606') [CONFIRM]('https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95') [MISC]('https://github.com/flatpressblog/flatpress/commit/c30d52b28483e1e512d0d81758d4c149f02b4068')[/TD] [/TR] [TR] [TD][LEFT]tum -- ogc_web_feature_service[/LEFT][/TD] [TD][LEFT]A vulnerability was found in 3D City Database OGC Web Feature Service up to 5.2.0. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to xml external entity reference. Upgrading to version 5.2.1 is able to address this issue. The name of the patch is 246f4e2a97ad81491c00a7ed72ce5e7c7f75050a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216215.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4607&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4607]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4607') [N/A]('https://vuldb.com/?id.216215') [N/A]('https://github.com/3dcitydb/web-feature-service/pull/12') [N/A]('https://github.com/3dcitydb/web-feature-service/commit/246f4e2a97ad81491c00a7ed72ce5e7c7f75050a') [MISC]('https://github.com/3dcitydb/web-feature-service/releases/tag/v5.2.1')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]A thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46316&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46316]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46316') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46319&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46319]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46319') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46320&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46320]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46320') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46323&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46323]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46323') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46324&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46324]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46324') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46325&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46325]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46325') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46326&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46326]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46326') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46327&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46327]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46327') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a command injection vulnerability via the mac parameter at /goform/WriteFacMac.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46538&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46538]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46538') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md')[/TD] [/TR] [TR] [TD][LEFT]sick -- sim2000_firmware[/LEFT][/TD] [TD][LEFT]Password recovery vulnerability in SICK SIM2000ST Partnumber 2086502 with firmware version <1.13.4 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 1.13.4 as soon as possible (available in SICK Support Portal).[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47377&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-47377]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47377') [MISC]('https://sick.com/psirt')[/TD] [/TR] [TR] [TD][LEFT]ibm -- cognos_analytics[/LEFT][/TD] [TD][LEFT]IBM Cognos Analytics 11.1.7 11.2.0, and 11.2.1 could be vulnerable to a Server-Side Request Forgery Attack (SSRF) attack by constructing URLs from user-controlled data. This could enable attackers to make arbitrary requests to the internal network or to the local file system. IBM X-Force ID: 234180.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][9.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38708&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-38708]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38708') [MISC]('https://www.ibm.com/support/pages/node/6841801') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/234180')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20607&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20607]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20607') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In cellular modem firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-240462530References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20610&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20610]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20610') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]broadcom -- symantec_identity_governance_and_administration[/LEFT][/TD] [TD][LEFT]An authenticated user can perform XML eXternal Entity injection in Management Console in Symantec Identity Manager 14.4[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-25628&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-25628]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-25628') [MISC]('https://support.broadcom.com/external/content/SecurityAdvisories/0/21136')[/TD] [/TR] [TR] [TD][LEFT]ucf -- materia[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in University of Central Florida Materia up to 9.0.0. This affects the function before of the file fuel/app/classes/controller/api.php of the component API Controller. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 9.0.1-alpha1 is able to address this issue. The name of the patch is af259115d2e8f17068e61902151ee8a9dbac397b. It is recommended to upgrade the affected component. The identifier VDB-215973 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4564&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4564]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4564') [N/A]('https://vuldb.com/?id.215973') [N/A]('https://github.com/ucfopen/Materia/commit/af259115d2e8f17068e61902151ee8a9dbac397b') [N/A]('https://github.com/ucfopen/Materia/pull/1371') [MISC]('https://github.com/ucfopen/Materia/releases/tag/v9.0.1-alpha1')[/TD] [/TR] [TR] [TD][LEFT]axiosys -- bento4[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Axiomatic Bento4. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4584&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4584]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4584') [N/A]('https://vuldb.com/?id.216170') [N/A]('https://github.com/axiomatic-systems/Bento4/issues/818') [N/A]('https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz')[/TD] [/TR] [TR] [TD][LEFT]samba -- ppp[/LEFT][/TD] [TD][LEFT]** DISPUTED ** A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4603&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4603]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4603') [N/A]('https://vuldb.com/?id.216198') [N/A]('https://github.com/ppp-project/ppp/commit/a75fb7b198eed50d769c80c36629f38346882cbf')[/TD] [/TR] [TR] [TD][LEFT]wp-english-wp-admin_project -- wp-english-wp-admin[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4604&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4604]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4604') [N/A]('https://vuldb.com/?id.216199') [N/A]('https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d') [MISC]('https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2')[/TD] [/TR] [TR] [TD][LEFT]xml-rpc.net_project -- xml-rpc.net[/LEFT][/TD] [TD][LEFT]An XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, as demonstrated by a pingback.aspx POST request.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47514&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-47514]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47514') [MISC]('https://papercutsoftware.github.io/XML-RPC.NET/download.html') [MISC]('https://github.com/jumpycastle/xmlrpc.net-poc')[/TD] [/TR] [TR] [TD][LEFT]open-emr -- openemr[/LEFT][/TD] [TD][LEFT]Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.2.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][8.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4567&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-4567]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4567') [CONFIRM]('https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2') [MISC]('https://github.com/openemr/openemr/commit/953cb84dfd55fee9d5296668ec7fdb8bf25bcea4')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onCreate of WifiDppConfiguratorActivity.java, there is a possible way for a guest user to add a WiFi configuration due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224772890[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20503&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20503]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20503') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onCreate of WifiDialogActivity.java, there is a missing permission check. This could lead to local escalation of privilege from a guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-226133034[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20506&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20506]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20506') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onMulticastListUpdateNotificationReceived of UwbEventManager.java, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246649179[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20507&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20507]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20507') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onAttach of ConfigureWifiSettings.java, there is a possible way for a guest user to change WiFi settings due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-218679614[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20508&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20508]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20508') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In navigateUpTo of Task.java, there is a possible way to launch an intent handler with a mismatched intent due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238602879[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20512&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20512]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20512') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onCreate of various files, there is a possible tapjacking/overlay attack. This could lead to local escalation of privilege or denial of server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227203202[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20520&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20520]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20520') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getSlice of ProviderModelSlice.java, there is a missing permission check. This could lead to local escalation of privilege from the guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227470877[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20522&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20522]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20522') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In compose of Vibrator.cpp, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-228523213[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20524&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20524]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20524') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SurfaceFlinger::doDump of SurfaceFlinger.cpp, there is possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-237291506[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20540&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20540]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20540') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In multiple functions of AdapterService.java, there is a possible way to manipulate Bluetooth state due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240301753[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20547&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20547]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20547') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In setParameter of EqualizerEffect.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240919398[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20548&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20548]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20548') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Multiple Locations, there is a possibility to launch arbitrary protected activities due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242845514[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20550&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20550]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20550') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In TBD of aud_hal_tunnel.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222162870References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20561&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20561]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20561') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20566&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20566]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20566') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20568&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20568]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20568') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233645166References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20582&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20582]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20582') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In page_number of shared_mem.c, there is a possible code execution in secure world due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238366009References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20584&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20584]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20584') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In valid_out_of_special_sec_dram_addr of drm_access_control.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238716781References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20585&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20585]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20585') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In valid_out_of_special_sec_dram_addr of drm_access_control.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238718854References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20586&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20586]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20586') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmp_validate_wsm of drm_fw.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238720411References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20587&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20587]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20587') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmpu_set of ppmpu.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243480506References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20597&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20597]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20597') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sec_media_protect of media.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege of secure mode MFC Core with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242357514References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20598&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20598]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20598') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In TBD of TBD, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239847859References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20600&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20600]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20600') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]datadoghq -- guarddog[/LEFT][/TD] [TD][LEFT]GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to 0.1.5 are vulnerable to Relative Path Traversal when scanning a specially-crafted local PyPI package. Running GuardDog against a specially-crafted package can allow an attacker to write an arbitrary file on the machine where GuardDog is executed due to a path traversal vulnerability when extracting the .tar.gz file of the package being scanned, which exists by design in the tarfile.TarFile.extractall function. This issue is patched in version 0.1.5.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-23531&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-23531]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23531') [MISC]('https://github.com/DataDog/guarddog/releases/tag/v0.1.5') [MISC]('https://github.com/DataDog/guarddog/security/advisories/GHSA-rp2v-v467-q9vq') [MISC]('https://github.com/DataDog/guarddog/pull/89/commits/a56aff58264cb6b7855d71b00dc10c39a5dbd306')[/TD] [/TR] [TR] [TD][LEFT]paxtechnology -- paydroid[/LEFT][/TD] [TD][LEFT]The systool_server in PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 fails to check for dollar signs or backticks in user supplied commands, leading to to arbitrary command execution as root.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-26582&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-26582]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-26582') [MISC]('https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c')[/TD] [/TR] [TR] [TD][LEFT]hcltech -- bigfix_platform[/LEFT][/TD] [TD][LEFT]In specific scenarios, on Windows the operator credentials may be encrypted in a manner that is not completely machine-dependent.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38659&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-38659]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38659') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102049')[/TD] [/TR] [TR] [TD][LEFT]poweriso -- poweriso[/LEFT][/TD] [TD][LEFT]A memory corruption vulnerability exists in the VHD File Format parsing CXSPARSE record functionality of PowerISO PowerISO 8.3. A specially-crafted file can lead to an out-of-bounds write. A victim needs to open a malicious file to trigger this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41992&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-41992]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41992') [MISC]('https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In mmu_map_for_fw of gs_ldfw_load.c, there is a possible mitigation bypass due to Permissive Memory Allocation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231500967References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42531&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42531]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42531') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible privilege escalation due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237838301References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42534&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42534]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42534') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getView of AddAppNetworksFragment.java, there is a possible way to mislead the user about network add requests due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224545390[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42544&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42544]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42544') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]entropymine -- deark[/LEFT][/TD] [TD][LEFT]Deark v.1.6.2 was discovered to contain a stack overflow via the do_prism_read_palette() function at /modules/atari-img.c.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-43289&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-43289]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-43289') [MISC]('https://github.com/jsummers/deark/issues/52') [MISC]('https://github.com/jsummers/deark')[/TD] [/TR] [TR] [TD][LEFT]ibm -- domino[/LEFT][/TD] [TD][LEFT]IBM Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44754.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44750&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44750]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44750') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151')[/TD] [/TR] [TR] [TD][LEFT]ibm -- notes[/LEFT][/TD] [TD][LEFT]IBM Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44755.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44751&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44751]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44751') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100260')[/TD] [/TR] [TR] [TD][LEFT]ibm -- domino[/LEFT][/TD] [TD][LEFT]IBM Domino is susceptible to a stack based buffer overflow vulnerability in wp6sr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted WordPerfect file.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44752&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44752]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44752') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151')[/TD] [/TR] [TR] [TD][LEFT]ibm -- notes[/LEFT][/TD] [TD][LEFT]IBM Notes is susceptible to a stack based buffer overflow vulnerability in wp6sr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted WordPerfect file.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44753&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44753]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44753') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100260')[/TD] [/TR] [TR] [TD][LEFT]ibm -- domino[/LEFT][/TD] [TD][LEFT]IBM Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44750.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44754&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44754]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44754') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151')[/TD] [/TR] [TR] [TD][LEFT]ibm -- notes[/LEFT][/TD] [TD][LEFT]IBM Notes is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44751.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44755&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-44755]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44755') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0100260')[/TD] [/TR] [TR] [TD][LEFT]freedom -- securedrop[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Freedom of the Press SecureDrop. It has been rated as critical. Affected by this issue is some unknown functionality of the file gpg-agent.conf. The manipulation leads to symlink following. Local access is required to approach this attack. The name of the patch is b0526a06f8ca713cce74b63e00d3730618d89691. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215972.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4563&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4563]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4563') [N/A]('https://github.com/freedomofpress/securedrop/pull/6704') [N/A]('https://github.com/freedomofpress/securedrop/commit/b0526a06f8ca713cce74b63e00d3730618d89691') [N/A]('https://vuldb.com/?id.215972')[/TD] [/TR] [TR] [TD][LEFT]linux -- linux_kernel[/LEFT][/TD] [TD][LEFT]An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47518&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-47518]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47518') [MISC]('https://lore.kernel.org/r/[email protected]') [MISC]('https://github.com/torvalds/linux/commit/0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0') [MLIST]('https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html')[/TD] [/TR] [TR] [TD][LEFT]linux -- linux_kernel[/LEFT][/TD] [TD][LEFT]An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47519&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-47519]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47519') [MISC]('https://lore.kernel.org/r/[email protected]') [MISC]('https://github.com/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41') [MLIST]('https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html')[/TD] [/TR] [TR] [TD][LEFT]linux -- linux_kernel[/LEFT][/TD] [TD][LEFT]An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47521&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-47521]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47521') [MISC]('https://github.com/torvalds/linux/commit/f9b62f9843c7b0afdaecabbcebf1dbba18599408') [MISC]('https://lore.kernel.org/r/[email protected]') [MLIST]('https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html')[/TD] [/TR] [TR] [TD][LEFT]knexjs -- knex[/LEFT][/TD] [TD][LEFT]Knex Knex.js through 2.3.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2016-20018&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2016-20018]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-20018') [MISC]('https://www.ghostccamm.com/blog/knex_sqli/') [MISC]('https://github.com/knex/knex/issues/1227')[/TD] [/TR] [TR] [TD][LEFT]solarwinds -- serv-u[/LEFT][/TD] [TD][LEFT]Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-35252&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2021-35252]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-35252') [MISC]('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35252') [MISC]('https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3-2_release_notes.htm') [MISC]('https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35252')[/TD] [/TR] [TR] [TD][LEFT]owasp -- nodegoat[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in OWASP NodeGoat and classified as problematic. This vulnerability affects unknown code of the file app/routes/research.js of the component Query Parameter Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The name of the patch is 4a4d1db74c63fb4ff8d366551c3af006c25ead12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216184.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4247&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2021-4247]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4247') [N/A]('https://vuldb.com/?id.216184') [N/A]('https://github.com/OWASP/NodeGoat/issues/225') [N/A]('https://github.com/OWASP/NodeGoat/commit/4a4d1db74c63fb4ff8d366551c3af006c25ead12')[/TD] [/TR] [TR] [TD][LEFT]haskell -- xml-conduit[/LEFT][/TD] [TD][LEFT]A vulnerability was found in xml-conduit. It has been classified as problematic. Affected is an unknown function of the file xml-conduit/src/Text/XML/Stream/Parse.hs of the component DOCTYPE Entity Expansion Handler. The manipulation leads to infinite loop. It is possible to launch the attack remotely. Upgrading to version 1.9.1.0 is able to address this issue. The name of the patch is 4be1021791dcdee8b164d239433a2043dc0939ea. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216204.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4249&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2021-4249]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4249') [N/A]('https://vuldb.com/?id.216204') [N/A]('https://github.com/snoyberg/xml/pull/161') [N/A]('https://hackage.haskell.org/package/xml-conduit-1.9.1.0') [N/A]('https://github.com/snoyberg/xml/commit/4be1021791dcdee8b164d239433a2043dc0939ea')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In rw_t3t_act_handle_check_ndef_rsp of rw_t3t.cc, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224002331[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20516&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20516]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20516') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In bindArtworkAndColors of MediaControlPanel.java, there is a possible way to crash the phone due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-239368697[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20545&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-20545]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20545') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]Product: AndroidVersions: Android kernelAndroid ID: A-212623833References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20560&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20560]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20560') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]Product: AndroidVersions: Android kernelAndroid ID: A-204541506References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20601&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20601]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20601') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]Product: AndroidVersions: Android kernelAndroid ID: A-211081867References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20602&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20602]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20602') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SAECOMM_CopyBufferBytes of SAECOMM_Utility.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231722405References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20605&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20605]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20605') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]juniper_networks -- multiple_products [/LEFT][/TD] [TD][LEFT]An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). If a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, this session will be torn down with an update message error. This issue cannot propagate beyond an affected system as the processing error occurs as soon as the update is received. This issue is exploitable remotely as the respective attribute will propagate through unaffected systems and intermediate AS (if any). Continuous receipt of a BGP update containing this attribute will create a sustained Denial of Service (DoS) condition. Since this issue only affects 22.3R1, Juniper strongly encourages customers to move to 22.3R1-S1. Juniper SIRT felt that the need to promptly warn customers about this issue affecting the 22.3R1 versions of Junos OS and Junos OS Evolved warranted an Out of Cycle JSA. This issue affects: Juniper Networks Junos OS version 22.3R1. Juniper Networks Junos OS Evolved version 22.3R1-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 22.3R1. Juniper Networks Junos OS Evolved versions prior to 22.3R1-EVO.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-22184&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-22184]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22184') [CONFIRM]('https://kb.juniper.net/JSA70175')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are vulnerable to Insertion of Sensitive Information Into Sent Data. The moderators-only webcams lock setting is not enforced on the backend, which allows an attacker to subscribe to viewers' webcams, even when the lock setting is applied. (The required streamId was being sent to all users even with lock setting applied). This issue is fixed in version 2.4-rc-6. There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-23488&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-23488]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23488') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4-rc-6') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-j5g3-f74q-rvfq')[/TD] [/TR] [TR] [TD][LEFT]ffmpeg -- ffmpeg[/LEFT][/TD] [TD][LEFT]An issue was discovered in the FFmpeg through 3.0. vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause the null pointer dereference, impacting confidentiality and availability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3109&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-3109]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3109') [MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2153551') [MISC]('https://github.com/FFmpeg/FFmpeg/commit/656cb0450aeb73b25d7d26980af342b37ac4c568')[/TD] [/TR] [TR] [TD][LEFT]rockwellautomation -- compactlogix_5370_firmware[/LEFT][/TD] [TD][LEFT]A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3157&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-3157]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3157') [MISC]('https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137757')[/TD] [/TR] [TR] [TD][LEFT]rockwellautomation -- micrologix_1100_firmware[/LEFT][/TD] [TD][LEFT]Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3166&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-3166]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3166') [MISC]('https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137678')[/TD] [/TR] [TR] [TD][LEFT]apache -- traffic_server[/LEFT][/TD] [TD][LEFT]Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-32749&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-32749]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-32749') [MISC]('https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02')[/TD] [/TR] [TR] [TD][LEFT]ibm -- spectrum_control[/LEFT][/TD] [TD][LEFT]IBM Spectrum Control 5.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 233982.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38391&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-38391]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38391') [MISC]('https://www.ibm.com/support/pages/node/6847541') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/233982')[/TD] [/TR] [TR] [TD][LEFT]ultimatemember -- jobboardwp[/LEFT][/TD] [TD][LEFT]The JobBoardWP WordPress plugin before 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4061&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-4061]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4061') [MISC]('https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665')[/TD] [/TR] [TR] [TD][LEFT]cedcommerce -- wholesale_market_for_woocommerce[/LEFT][/TD] [TD][LEFT]The Wholesale Market for WooCommerce WordPress plugin before 1.0.7 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4106&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4106]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4106') [MISC]('https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed')[/TD] [/TR] [TR] [TD][LEFT]redhat -- satellite[/LEFT][/TD] [TD][LEFT]A blind site-to-site request forgery vulnerability was found in Satellite server. It is possible to trigger an external interaction to an attacker's server by modifying the Referer header in an HTTP request of specific resources in the server.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4130&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-4130]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4130') [MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2145254')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41596&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-41596]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41596') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41599&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-41599]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41599') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sms_GetTpUdlIe of sms_PduCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243401445References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42524&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42524]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42524') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In cd_SsParseMsg of cd_SsCodec.c, there is a possible crash due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244448906References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42527&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-42527]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42527') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]ibm -- cognos_analytics[/LEFT][/TD] [TD][LEFT]IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to a Log Injection attack by constructing URLs from user-controlled data. This could enable attackers to make arbitrary requests to the internal network or to the local file system. IBM X-Force ID: 240266.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-43883&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-43883]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-43883') [MISC]('https://www.ibm.com/support/pages/node/6841801') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/240266')[/TD] [/TR] [TR] [TD][LEFT]rockoa -- xinhu[/LEFT][/TD] [TD][LEFT]SQL Injection exits in xinhu < 2.5.0[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-45041&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-45041]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-45041') [MISC]('https://github.com/N1k0la-T/somefiles/blob/main/sqli.py') [MISC]('https://github.com/N1k0la-T/vulnerability/issues/1')[/TD] [/TR] [TR] [TD][LEFT]hutool -- hutool[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.8.11 is able to address this issue. It is recommended to upgrade the affected component. VDB-215974 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4565&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-4565]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4565') [MISC]('https://vuldb.com/?id.215974') [MISC]('https://github.com/dromara/hutool/issues/2797')[/TD] [/TR] [TR] [TD][LEFT]tenda -- i22_firmware[/LEFT][/TD] [TD][LEFT]Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-45665&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-45665]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-45665') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- i22_firmware[/LEFT][/TD] [TD][LEFT]Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-45666&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-45666]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-45666') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- ac10_firmware[/LEFT][/TD] [TD][LEFT]Tenda AC15 V15.03.06.23 is vulnerable to Buffer Overflow via function formSetClientState.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46109&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46109]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46109') [MISC]('https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState')[/TD] [/TR] [TR] [TD][LEFT]aerocms_project -- aerocms[/LEFT][/TD] [TD][LEFT]AeroCMS v0.0.1 is vulnerable to Directory Traversal. The impact is: obtain sensitive information (remote). The component is: AeroCMS v0.0.1.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46137&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-46137]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46137') [MISC]('https://github.com/MegaTKC/AeroCMS/issues/7')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46310&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-46310]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46310') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46311&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-46311]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46311') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46312&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-46312]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46312') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46314&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46314]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46314') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46315&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46315]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46315') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46317&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46317]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46317') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46321&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-46321]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46321') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46322&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46322]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46322') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46328&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-46328]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46328') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the mac parameter at /goform/GetParentControlInfo.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46530&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46530]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46530') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/addWifiMacFilter.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46531&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46531]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46531') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceMac parameter at /goform/addWifiMacFilter.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46532&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46532]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46532') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the limitSpeed parameter at /goform/SetClientState.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46533&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46533]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46533') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the speed_dir parameter at /goform/SetSpeedWan.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46534&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46534]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46534') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetSpeedWan/formSetSpeedWan.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/SetClientState.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46535&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46535]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46535') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the limitSpeedUp parameter at /goform/SetClientState.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46536&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46536]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46536') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the security parameter at /goform/WifiBasicSet.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46537&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46537]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46537') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security/formWifiBasicSet_security.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the security_5g parameter at /goform/WifiBasicSet.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46539&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46539]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46539') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the entrys parameter at /goform/addressNat.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46540&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46540]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46540') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the ssid parameter at /goform/fast_setting_wifi_set.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46541&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46541]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46541') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/addressNat.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46542&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46542]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46542') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the mitInterface parameter at /goform/addressNat.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46543&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46543]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46543') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_mitInterface/fromAddressNat_mitInterface.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the cmdinput parameter at /goform/exeCommand.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46544&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46544]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46544') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/NatStaticSetting.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46545&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46545]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46545') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromNatStaticSetting/fromNatStaticSetting.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the entrys parameter at /goform/RouteStatic.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46546&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46546]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46546') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromRouteStatic/fromRouteStatic.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/VirtualSer.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46547&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46547]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46547') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/DhcpListClient.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46548&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46548]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46548') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/saveParentControlInfo.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46549&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46549]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46549') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the urls parameter at /goform/saveParentControlInfo.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46550&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46550]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46550') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md')[/TD] [/TR] [TR] [TD][LEFT]tenda -- f1203_firmware[/LEFT][/TD] [TD][LEFT]Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the time parameter at /goform/saveParentControlInfo.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46551&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-46551]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46551') [MISC]('https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md')[/TD] [/TR] [TR] [TD][LEFT]drachtio -- drachtio-server[/LEFT][/TD] [TD][LEFT]An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47515&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-47515]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47515') [MISC]('https://github.com/drachtio/drachtio-server/issues/245') [MISC]('https://github.com/drachtio/drachtio-server/commit/4cf9fe2c420b86c16442215d449d40be777c1911')[/TD] [/TR] [TR] [TD][LEFT]drachtio -- drachtio-server[/LEFT][/TD] [TD][LEFT]An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that leads to a failure of the libsofia-sip-ua/tport/tport.c self assertion.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47516&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-47516]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47516') [MISC]('https://github.com/davehorton/sofia-sip/commit/13b2a135287caa2d67ac6cd5155626821e25b377') [MISC]('https://github.com/drachtio/drachtio-server/issues/244')[/TD] [/TR] [TR] [TD][LEFT]drachtio -- drachtio-server[/LEFT][/TD] [TD][LEFT]An issue was discovered in the libsofia-sip fork in drachtio-server before 0.8.19. It allows remote attackers to cause a denial of service (daemon crash) via a crafted UDP message that causes a url_canonize2 heap-based buffer over-read because of an off-by-one error.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47517&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-47517]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47517') [MISC]('https://github.com/davehorton/sofia-sip/commit/22c1bd191f0acbf11f0c0fbea1845d9bf9dcd47e') [MISC]('https://github.com/davehorton/sofia-sip/commit/bfc79d85c8f3a4798a3305fb98f5a11c11d0d29f') [MISC]('https://github.com/drachtio/drachtio-server/issues/243')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SetDecompContextDb of RohcDeCompContextOfRbId.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219265339References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20603&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20603]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20603') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]vmware -- vrealize_operations[/LEFT][/TD] [TD][LEFT]vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-31707&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-31707]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-31707') [MISC]('https://www.vmware.com/security/advisories/VMSA-2022-0034.html')[/TD] [/TR] [TR] [TD][LEFT]aerocms_project -- aerocms[/LEFT][/TD] [TD][LEFT]In AeroCms v0.0.1, there is an arbitrary file upload vulnerability at /admin/posts.php?source=edit_post , through which we can upload webshell and control the web server.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][7.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46135&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-46135]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46135') [MISC]('https://github.com/MegaTKC/AeroCMS/issues/5')[/TD] [/TR] [TR] [TD][LEFT]ubi_reader_project -- ubi_reader[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 is able to address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][7.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4572&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4572]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4572') [MISC]('https://github.com/jrspruitt/ubi_reader/releases/tag/v0.8.5-master') [MISC]('https://github.com/jrspruitt/ubi_reader/commit/d5d68e6b1b9f7070c29df5f67fc060f579ae9139') [MISC]('https://vuldb.com/?id.216146') [MISC]('https://github.com/jrspruitt/ubi_reader/pull/57')[/TD] [/TR] [TR] [TD][LEFT]linux -- linux_kernel[/LEFT][/TD] [TD][LEFT]An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][7.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47520&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-47520]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47520') [MISC]('https://github.com/torvalds/linux/commit/cd21d99e595ec1d8721e1058dcdd4f1f7de1d793') [MISC]('https://lore.kernel.org/r/[email protected]') [MLIST]('https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html')[/TD] [/TR] [/TABLE][/CENTER] [Back to top]('https://us-cert.cisa.gov#top')Medium Vulnerabilities
[CENTER][TABLE] [TR] [TH]Primary Vendor -- Product[/TH] [TH]Description[/TH] [TH]Published[/TH] [TH]CVSS Score[/TH] [TH]Source & Patch Info[/TH] [/TR] [TR] [TD][LEFT]paxtechnology -- paydroid[/LEFT][/TD] [TD][LEFT]PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 was discovered to be vulnerable to command injection.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-26580&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-26580]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-26580') [MISC]('https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c')[/TD] [/TR] [TR] [TD][LEFT]paxtechnology -- paydroid[/LEFT][/TD] [TD][LEFT]The ADB daemon in PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 allows the execution of the systool utility in production mode, allowing unauthenticated attackers to perform privileged actions.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-26581&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-26581]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-26581') [MISC]('https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c')[/TD] [/TR] [TR] [TD][LEFT]ibm -- spectrum_scale[/LEFT][/TD] [TD][LEFT]IBM Spectrum Scale 5.1 could allow users with permissions to create pod, persistent volume and persistent volume claim to access files and directories outside of the volume, including on the host filesystem. IBM X-Force ID: 235740.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-40607&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-40607]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-40607') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/235740') [MISC]('https://www.ibm.com/support/pages/node/6848231')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In multiple locations of DreamManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and dismissal of system dialogs with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225878553[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20504&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20504]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20504') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In openFile of CallLogProvider.java, there is a possible permission bypass due to a path traversal error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitationProduct: AndroidVersions: Android-13Android ID: A-225981754[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20505&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20505]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20505') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In mapGrantorDescr of MessageQueueBase.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244713317[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20509&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20509]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20509') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In acquireFabricatedOverlayIterator, nextFabricatedOverlayInfos, and releaseFabricatedOverlayIterator of Idmap2Service.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-245727875[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20514&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20514]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20514') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In parameterToHal of Effect.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the audio server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-237291425[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20539&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20539]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20539') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getCurrentConfigImpl of Effect.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240266798[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20546&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20546]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20546') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In authToken2AidlVec of KeyMintUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-242702451[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20549&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20549]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20549') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In removeEventHubDevice of InputDevice.cpp, there is a possible OOB read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-245770596[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20554&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20554]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20554') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In MessageQueueBase of MessageQueueBase.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-247092734[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20557&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20557]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20557') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In TBD of ufdt_convert, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242067561References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20563&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20563]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20563') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In _ufdt_output_strtab_to_fdt of ufdt_convert.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243798789References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20564&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20564]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20564') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In thermal_cooling_device_stats_update of thermal_sysfs.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-229258234References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20569&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20569]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20569') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In extract_metadata of dm-android-verity.c, there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234030265References: Upstream kernel[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20571&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20571]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20571') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20572&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20572]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20572') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In externalOnRequest of rilapplication.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239701761References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20576&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20576]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20576') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In OemSimAuthRequest::encode of wlandata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762281References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20577&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20577]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20577') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In RadioImpl::setGsmBroadcastConfig of ril_service_legacy.cpp, there is a possible stack clash leading to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509749References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20578&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20578]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20578') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In RadioImpl::setCdmaBroadcastConfig of ril_service_legacy.cpp, there is a possible stack clash leading to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243510139References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20579&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20579]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20579') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ufdt_do_one_fixup of ufdt_overlay.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243629453References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20580&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20580]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20580') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In the Pixel camera driver, there is a possible use after free due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-245916120References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20581&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20581]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20581') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmp_unprotect_mfcfw_buf of drm_fw.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege in S-EL1 with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234859169References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20583&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20583]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20583') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sysmmu_map of sysmmu.c, there is a possible EoP due to a precondition check failure. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238785915References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20588&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20588]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20588') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In updateStart of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239567689References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20594&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20594]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20594') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sendChunk of WirelessCharger.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700400References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20596&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20596]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20596') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Pixel firmware, there is a possible exposure of sensitive memory due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242332706References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20599&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20599]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20599') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]broadcom -- symantec_identity_governance_and_administration[/LEFT][/TD] [TD][LEFT]An authenticated administrator who has physical access to the environment can carry out Remote Command Execution on Management Console in Symantec Identity Manager 14.4[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-25627&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-25627]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-25627') [MISC]('https://support.broadcom.com/external/content/SecurityAdvisories/0/21136')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In HexString2Value of util.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231403References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42501&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42501]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42501') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In FacilityLock::Parse of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231970References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42502&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42502]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42502') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolMiscBuilder::BuildSetLinkCapaReportCriteria of protocolmiscbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241231983References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42503&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42503]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42503') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In CallDialReqData::encodeCallNumber of callreqdata.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241232209References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42504&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42504]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42504') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolMiscBuilder::BuildSetSignalReportCriteria of protocolmiscbuilder.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241232492References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42505&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42505]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42505') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SimUpdatePbEntry::encode of simdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388399References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42506&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42506]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42506') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolSimBuilder::BuildSimUpdatePb3gEntry of protocolsimbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388774References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42507&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42507]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42507') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolCallBuilder::BuildSendUssd of protocolcallbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241388966References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42508&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42508]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42508') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In CallDialReqData::encode of callreqdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241544307References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42509&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42509]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42509') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In StringsRequestData::encode of requestdata.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762656References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42510&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42510]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42510') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In EmbmsSessionData::encode of embmsdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241762712References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42511&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42511]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42511') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolEmbmsBuilder::BuildSetSession of protocolembmsbuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763204References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42513&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42513]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42513') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In BroadcastSmsConfigsRequestData::encode of smsdata.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242536278References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42518&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42518]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42518') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In CdmaBroadcastSmsConfigsRequestData::encode of cdmasmsdata.cpp, there is a possible stack clash leading to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242540694References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42519&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42519]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42519') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ServiceInterface::HandleRequest of serviceinterface.cpp, there is a possible use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242994270References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42520&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42520]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42520') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In encode of wlandata.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130019References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42521&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42521]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42521') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In fillSetupDataCallInfo_V1_6 of ril_service_1_6.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243376893References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42523&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42523]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42523') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In fillSetupDataCallInfo_V1_6 of ril_service_1_6.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509750References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42525&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42525]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42525') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ConvertUtf8ToUcs2 of radio_hal_utils.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243509880References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42526&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42526]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42526') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In phNxpNciHal_core_initialized of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231445184[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42542&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-42542]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42542') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]apache -- zeppelin[/LEFT][/TD] [TD][LEFT]The improper Input Validation vulnerability in "”Move folder to Trash” feature of Apache Zeppelin allows an attacker to delete the arbitrary files. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-28655&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L')[/CENTER][/TD] [TD][CVE-2021-28655]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-28655') [MISC]('https://lists.apache.org/thread/bxs056g3xlsofz0jb3wny9dw4llwptd2')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onCreate of LogAccessDialogActivity.java, there is a possible way to bypass a permission check due to a tapjacking/overlay attack. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244155265[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20553&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20553]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20553') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]datadoghq -- guarddog[/LEFT][/TD] [TD][LEFT]GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package. Extracting files using shutil.unpack_archive() from a potentially malicious tarball without validating that the destination file path is within the intended destination directory can cause files outside the destination directory to be overwritten. This issue is patched in version 0.1.8. Potential workarounds include using a safer module, like zipfile, and validating the location of the extracted files and discarding those with malicious paths.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-23530&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-23530]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23530') [MISC]('https://github.com/DataDog/guarddog/blob/a1d064ceb09d39bb28deb6972bc0a278756ea91f/guarddog/scanners/package_scanner.py#L153..158') [MISC]('https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v') [MISC]('https://github.com/DataDog/guarddog/commit/37c7d0767ba28f4df46117d478f97652594c491c')[/TD] [/TR] [TR] [TD][LEFT]wpwax -- directorist[/LEFT][/TD] [TD][LEFT]The Directorist WordPress plugin before 7.4.4 does not prevent users with low privileges (like subscribers) from accessing sensitive system information.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3961&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-3961]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3961') [MISC]('https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253')[/TD] [/TR] [TR] [TD][LEFT]genetechsolutions -- pie_register[/LEFT][/TD] [TD][LEFT]The Registration Forms WordPress plugin before 3.8.1.3 does not have authorisation and CSRF when deleting users via an init action handler, allowing unauthenticated attackers to delete arbitrary users (along with their posts)[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4024&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD] [TD][CVE-2022-4024]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4024') [MISC]('https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe')[/TD] [/TR] [TR] [TD][LEFT]cedcommerce -- smsa_shipping_for_woocommerce[/LEFT][/TD] [TD][LEFT]The SMSA Shipping for WooCommerce WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks, as well as does not validate the file to be downloaded, allowing any authenticated users, such as subscriber to download arbitrary file from the server[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4107&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4107]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4107') [MISC]('https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302')[/TD] [/TR] [TR] [TD][LEFT]adobe -- campaign[/LEFT][/TD] [TD][LEFT]Adobe Campaign version 7.3.1 (and earlier) and 8.3.9 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42343&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42343]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42343') [MISC]('https://helpx.adobe.com/security/products/campaign/apsb22-58.html')[/TD] [/TR] [TR] [TD][LEFT]clickstudios -- passwordstate[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as problematic. This vulnerability affects unknown code. The manipulation leads to insufficiently protected credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216274 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4612&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4612]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4612') [N/A]('https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf') [N/A]('https://vuldb.com/?id.216274') [N/A]('https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html')[/TD] [/TR] [TR] [TD][LEFT]clickstudios -- passwordstate[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as critical. This issue affects some unknown processing of the component Browser Extension Provisioning. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216275.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4613&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4613]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4613') [N/A]('https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf') [N/A]('https://vuldb.com/?id.216275') [N/A]('https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20567&vector=CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-20567]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20567') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]as_project -- as[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in as. This vulnerability affects the function getFullURL of the file include.cdn.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 4acad1e3d2c34c017473ceea442fb3e3e078b2bd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216208.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4251&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4251]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4251') [N/A]('https://vuldb.com/?id.216208') [N/A]('https://github.com/andrewsauder/as/commit/4acad1e3d2c34c017473ceea442fb3e3e078b2bd')[/TD] [/TR] [TR] [TD][LEFT]wp-ban_project -- wp-ban[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in WP-Ban. This issue affects the function toggle_checkbox of the file ban-options.php. The manipulation of the argument $_SERVER["HTTP_USER_AGENT"] leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 13e0b1e922f3aaa3f8fcb1dd6d50200dd693fd76. It is recommended to apply a patch to fix this issue. The identifier VDB-216209 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4252&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4252]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4252') [N/A]('https://vuldb.com/?id.216209') [N/A]('https://github.com/lesterchan/wp-ban/commit/13e0b1e922f3aaa3f8fcb1dd6d50200dd693fd76') [N/A]('https://github.com/lesterchan/wp-ban/pull/11')[/TD] [/TR] [TR] [TD][LEFT]ctrlo -- lenio[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in ctrlo lenio. Affected is an unknown function in the library lib/Lenio.pm of the component Ticket Handler. The manipulation of the argument site_id leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 7a1f90bd2a0ce95b8338ec0926902da975ec64d9. It is recommended to apply a patch to fix this issue. VDB-216210 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4253&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4253]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4253') [N/A]('https://github.com/ctrlo/lenio/commit/7a1f90bd2a0ce95b8338ec0926902da975ec64d9') [N/A]('https://vuldb.com/?id.216210')[/TD] [/TR] [TR] [TD][LEFT]ctrlo -- lenio[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in ctrlo lenio and classified as problematic. Affected by this vulnerability is an unknown functionality of the file views/layouts/main.tt of the component Notice Handler. The manipulation of the argument notice.notice.text leads to cross site scripting. The attack can be launched remotely. The name of the patch is aa300555343c1c081951fcb68bfb6852fbba7451. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216211.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4254&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4254]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4254') [N/A]('https://vuldb.com/?id.216211') [N/A]('https://github.com/ctrlo/lenio/commit/aa300555343c1c081951fcb68bfb6852fbba7451')[/TD] [/TR] [TR] [TD][LEFT]ctrlo -- lenio[/LEFT][/TD] [TD][LEFT]A vulnerability was found in ctrlo lenio and classified as problematic. Affected by this issue is some unknown functionality of the file views/contractor.tt. The manipulation of the argument contractor.name leads to cross site scripting. The attack may be launched remotely. The name of the patch is e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216212.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4255&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4255]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4255') [N/A]('https://vuldb.com/?id.216212') [N/A]('https://github.com/ctrlo/lenio/commit/e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97')[/TD] [/TR] [TR] [TD][LEFT]ctrlo -- lenio[/LEFT][/TD] [TD][LEFT]A vulnerability was found in ctrlo lenio. It has been classified as problematic. This affects an unknown part of the file views/index.tt. The manipulation of the argument task.name/task.site.org.name leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97. It is recommended to apply a patch to fix this issue. The identifier VDB-216213 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4256&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4256]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4256') [N/A]('https://vuldb.com/?id.216213') [N/A]('https://github.com/ctrlo/lenio/commit/e1646d5cd0a2fbab9eb505196dd2ca1c9e4cdd97')[/TD] [/TR] [TR] [TD][LEFT]ctrlo -- lenio[/LEFT][/TD] [TD][LEFT]A vulnerability was found in ctrlo lenio. It has been declared as problematic. This vulnerability affects unknown code of the file views/task.tt of the component Task Handler. The manipulation of the argument site.org.name/check.name/task.tasktype.name/task.name leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 698c5fa465169d6f23c6a41ca4b1fc9a7869013a. It is recommended to apply a patch to fix this issue. VDB-216214 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4257&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4257]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4257') [N/A]('https://github.com/ctrlo/lenio/commit/698c5fa465169d6f23c6a41ca4b1fc9a7869013a') [N/A]('https://vuldb.com/?id.216214')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-30679&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-30679]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-30679') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-35694&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-35694]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35694') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-35696&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-35696]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35696') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]emby -- emby[/LEFT][/TD] [TD][LEFT]In Emby Server 4.6.7.0, the playlist name field is vulnerable to XSS stored where it is possible to steal the administrator access token and flip or steal the media server administrator account.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-36223&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-36223]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-36223') [MISC]('https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f')[/TD] [/TR] [TR] [TD][LEFT]hcltech -- hcl_digital_experience[/LEFT][/TD] [TD][LEFT]In HCL Digital Experience, URLs can be constructed to redirect users to untrusted sites.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38662&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-38662]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38662') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102141')[/TD] [/TR] [TR] [TD][LEFT]ibm -- cognos_analytics[/LEFT][/TD] [TD][LEFT]IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 235064.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-39160&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-39160]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-39160') [MISC]('https://www.ibm.com/support/pages/node/6841801') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/235064')[/TD] [/TR] [TR] [TD][LEFT]apache -- traffic_server[/LEFT][/TD] [TD][LEFT]Improper Input Validation vulnerability for the xdebug plugin in Apache Software Foundation Apache Traffic Server can lead to cross site scripting and cache poisoning attacks.This issue affects Apache Traffic Server: 9.0.0 to 9.1.3. Users should upgrade to 9.1.4 or later versions.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-40743&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-40743]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-40743') [MISC]('https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42360&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42360]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42360') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42366&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42366]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42366') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42367&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42367]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42367') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]alinto -- sogo[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Alinto SOGo up to 5.7.1 and classified as problematic. Affected by this issue is the function _migrateMailIdentities of the file SoObjects/SOGo/SOGoUserDefaults.m of the component Identity Handler. The manipulation of the argument fullName leads to cross site scripting. The attack may be launched remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is efac49ae91a4a325df9931e78e543f707a0f8e5e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215960.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4556&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4556]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4556') [MISC]('https://github.com/Alinto/sogo/commit/efac49ae91a4a325df9931e78e543f707a0f8e5e') [MISC]('https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0') [MISC]('https://vuldb.com/?id.215960')[/TD] [/TR] [TR] [TD][LEFT]alinto -- sogo[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Alinto SOGo up to 5.7.1. It has been classified as problematic. This affects an unknown part of the file SoObjects/SOGo/NSString+Utilities.m of the component Folder/Mail Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 5.8.0 is able to address this issue. The name of the patch is 1e0f5f00890f751e84d67be4f139dd7f00faa5f3. It is recommended to upgrade the affected component. The identifier VDB-215961 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4558&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4558]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4558') [MISC]('https://github.com/Alinto/sogo/releases/tag/SOGo-5.8.0') [MISC]('https://github.com/Alinto/sogo/commit/1e0f5f00890f751e84d67be4f139dd7f00faa5f3') [MISC]('https://vuldb.com/?id.215961')[/TD] [/TR] [TR] [TD][LEFT]inex -- ixp_manager[/LEFT][/TD] [TD][LEFT]A vulnerability was found in INEX IPX-Manager up to 6.2.0. It has been declared as problematic. This vulnerability affects unknown code of the file resources/views/customer/list.foil.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 6.3.0 is able to address this issue. The name of the patch is bc9b14c6f70cccdb89b559e8bc3a7318bfe9c243. It is recommended to upgrade the affected component. VDB-215962 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4559&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4559]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4559') [MISC]('https://github.com/inex/IXP-Manager/commit/bc9b14c6f70cccdb89b559e8bc3a7318bfe9c243') [MISC]('https://vuldb.com/?id.215962') [MISC]('https://github.com/inex/IXP-Manager/releases/tag/v6.3.0')[/TD] [/TR] [TR] [TD][LEFT]joget -- joget_dx[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Joget up to 7.0.31. It has been rated as problematic. This issue affects the function getInternalJsCssLib of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java of the component wflow-core. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.32 is able to address this issue. The name of the patch is ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215963.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4560&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4560]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4560') [MISC]('https://vuldb.com/?id.215963') [MISC]('https://github.com/jogetworkflow/jw-community/commit/ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b') [MISC]('https://github.com/jogetworkflow/jw-community/releases/tag/7.0.32')[/TD] [/TR] [TR] [TD][LEFT]mediawiki -- semantic_drilldown[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in SemanticDrilldown Extension. Affected is the function printFilterLine of the file includes/specials/SDBrowseDataPage.php of the component GET Parameter Handler. The manipulation of the argument value leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6e18cf740a4548166c1d95f6d3a28541d298a3aa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215964.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4561&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4561]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4561') [MISC]('https://vuldb.com/?id.215964') [MISC]('https://github.com/wikimedia/mediawiki-extensions-SemanticDrilldown/commit/6e18cf740a4548166c1d95f6d3a28541d298a3aa')[/TD] [/TR] [TR] [TD][LEFT]mind-map_project -- mind-map[/LEFT][/TD] [TD][LEFT]A vulnerability was found in 1j01 mind-map and classified as problematic. This issue affects some unknown processing of the file app.coffee. The manipulation of the argument html leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9617e6084dfeccd92079ab4d7f439300a4b24394. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216167.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4581&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4581]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4581') [N/A]('https://github.com/1j01/mind-map/commit/9617e6084dfeccd92079ab4d7f439300a4b24394') [N/A]('https://vuldb.com/?id.216167')[/TD] [/TR] [TR] [TD][LEFT]starter-public-edition-4_project -- starter-public-edition-4[/LEFT][/TD] [TD][LEFT]A vulnerability was found in starter-public-edition-4 up to 4.6.10. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.6.11 is able to address this issue. The name of the patch is 2606983c20f6ea3430ac4b36b3d2e88aafef45da. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216168.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4582&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4582]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4582') [N/A]('https://github.com/ivantcholakov/starter-public-edition-4/commit/2606983c20f6ea3430ac4b36b3d2e88aafef45da') [N/A]('https://github.com/ivantcholakov/starter-public-edition-4/releases/tag/v4.6.11') [N/A]('https://vuldb.com/?id.216168')[/TD] [/TR] [TR] [TD][LEFT]oc-server3_project -- oc-server3[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in Opencaching Deutschland oc-server3. This affects an unknown part of the file htdocs/templates2/ocstyle/start.tpl of the component Cookie Handler. The manipulation of the argument usercountryCode leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is c720f2777a452186c67ef30db3679dd409556544. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216171.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4585&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4585]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4585') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/commit/c720f2777a452186c67ef30db3679dd409556544') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/pull/894') [N/A]('https://vuldb.com/?id.216171')[/TD] [/TR] [TR] [TD][LEFT]oc-server3_project -- oc-server3[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in Opencaching Deutschland oc-server3. This vulnerability affects unknown code of the file htdocs/templates2/ocstyle/cachelists.tpl of the component Cachelist Handler. The manipulation of the argument name_filter/by_filter leads to cross site scripting. The attack can be initiated remotely. The name of the patch is a9f79c7da78cd24a7ef1d298e6bc86006972ea73. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216172.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4586&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4586]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4586') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/commit/a9f79c7da78cd24a7ef1d298e6bc86006972ea73') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/pull/894') [N/A]('https://vuldb.com/?id.216172')[/TD] [/TR] [TR] [TD][LEFT]bostonsleep -- slice[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in Boston Sleep slice up to 84.1.x. Affected is an unknown function of the component Layout Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 84.2.0 is able to address this issue. The name of the patch is 6523bb17d889e2ab13d767f38afefdb37083f1d0. It is recommended to upgrade the affected component. VDB-216174 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4588&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4588]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4588') [N/A]('https://vuldb.com/?id.216174') [N/A]('https://github.com/sleepepi/slice/commit/6523bb17d889e2ab13d767f38afefdb37083f1d0') [MISC]('https://github.com/sleepepi/slice/releases/tag/v84.2.0')[/TD] [/TR] [TR] [TD][LEFT]django_terms_and_conditions_project -- django_terms_and_conditions[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.9 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.10 is able to address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4589&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4589]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4589') [N/A]('https://github.com/cyface/django-termsandconditions/pull/239') [N/A]('https://vuldb.com/?id.216175') [N/A]('https://github.com/cyface/django-termsandconditions/commit/03396a1c2e0af95e12a45c5faef7e47a4b513e1a') [MISC]('https://github.com/cyface/django-termsandconditions/releases/tag/v2.0.10')[/TD] [/TR] [TR] [TD][LEFT]toto_project -- toto[/LEFT][/TD] [TD][LEFT]A vulnerability was found in mschaef toto up to 1.4.20. It has been classified as problematic. This affects an unknown part of the component Todo List Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is fdc825ac5249f40683377e8a526a06cdc6870125. It is recommended to upgrade the affected component. The identifier VDB-216177 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4590&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4590]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4590') [N/A]('https://github.com/mschaef/toto/commit/fdc825ac5249f40683377e8a526a06cdc6870125') [N/A]('https://vuldb.com/?id.216177') [N/A]('https://github.com/mschaef/toto/releases/tag/1.4.21')[/TD] [/TR] [TR] [TD][LEFT]toto_project -- toto[/LEFT][/TD] [TD][LEFT]A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4591&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4591]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4591') [N/A]('https://github.com/mschaef/toto/commit/1f27f37c1a06f54a76971f70eaa6139dc139bdf9') [N/A]('https://vuldb.com/?id.216178') [N/A]('https://github.com/mschaef/toto/releases/tag/1.4.21')[/TD] [/TR] [TR] [TD][LEFT]retra-system_project -- retra-system[/LEFT][/TD] [TD][LEFT]A vulnerability was found in retra-system. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a6d94ab88f4a6f631a14c59b72461140fb57ae1f. It is recommended to apply a patch to fix this issue. VDB-216186 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4593&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4593]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4593') [N/A]('https://github.com/retra/retra-system/commit/a6d94ab88f4a6f631a14c59b72461140fb57ae1f') [N/A]('https://vuldb.com/?id.216186')[/TD] [/TR] [TR] [TD][LEFT]django-openipam_project -- django-openipam[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in django-openipam. This affects an unknown part of the file openipam/report/templates/report/exposed_hosts.html. The manipulation of the argument description leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is a6223a1150d60cd036106ba6a8e676c1bfc3cc85. It is recommended to apply a patch to fix this issue. The identifier VDB-216189 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4595&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4595]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4595') [N/A]('https://github.com/openipam/django-openipam/commit/a6223a1150d60cd036106ba6a8e676c1bfc3cc85') [N/A]('https://github.com/openipam/django-openipam/pull/205') [N/A]('https://vuldb.com/?id.216189')[/TD] [/TR] [TR] [TD][LEFT]open-emr -- openemr[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4615&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4615]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4615') [CONFIRM]('https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b') [MISC]('https://github.com/openemr/openemr/commit/d5eb41697f7f1bc2c7ee5bc9bbf58684e1c8cc14')[/TD] [/TR] [TR] [TD][LEFT]microweber -- microweber[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.2.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4617&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4617]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4617') [CONFIRM]('https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df') [MISC]('https://github.com/microweber/microweber/commit/df8add930ecfa7f5b18c67c3f748c137fe890906')[/TD] [/TR] [TR] [TD][LEFT]jacic -- electronic_bidding_core_system[/LEFT][/TD] [TD][LEFT]Cross-site scripting vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and earlier allows a remote unauthenticated attacker to inject an arbitrary script.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46287&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-46287]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46287') [MISC]('https://www.cals.jacic.or.jp/coreconso/pdf/coreconsoinfo20221215.pdf') [MISC]('https://jvn.jp/en/jp/JVN96321933/index.html')[/TD] [/TR] [TR] [TD][LEFT]jacic -- electronic_bidding_core_system[/LEFT][/TD] [TD][LEFT]Open redirect vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46288&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-46288]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46288') [MISC]('https://www.cals.jacic.or.jp/coreconso/pdf/coreconsoinfo20221215.pdf') [MISC]('https://jvn.jp/en/jp/JVN96321933/index.html')[/TD] [/TR] [TR] [TD][LEFT]microweber -- microweber[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.2.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4647&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4647]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4647') [MISC]('https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936') [CONFIRM]('https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242')[/TD] [/TR] [TR] [TD][LEFT]rockwellautomation -- micrologix_1400_firmware[/LEFT][/TD] [TD][LEFT]Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution. The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46670&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-46670]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46670') [MISC]('https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1137679')[/TD] [/TR] [TR] [TD][LEFT]apache -- helix[/LEFT][/TD] [TD][LEFT]URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Software Foundation Apache Helix UI component.This issue affects Apache Helix all releases from 0.8.0 to 1.0.4. Solution: removed the the forward component since it was improper designed for UI embedding. User please upgrade to 1.1.0 to fix this issue.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47500&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-47500]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47500') [MISC]('https://lists.apache.org/thread/lr74xtxxbb1t3dfn5qzzwl2xjr3qlbmh')[/TD] [/TR] [TR] [TD][LEFT]paxtechnology -- paydroid[/LEFT][/TD] [TD][LEFT]PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 allows root privileged attackers to install an unsigned application by copying the APK to /data/app, setting the appropriate permissions and rebooting the device.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-26579&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-26579]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-26579') [MISC]('https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c')[/TD] [/TR] [TR] [TD][LEFT]trellix -- endpoint_security[/LEFT][/TD] [TD][LEFT]Improper preservation of permissions vulnerability in Trellix Endpoint Agent (xAgent) prior to V35.31.22 on Windows allows a local user with administrator privileges to bypass the product protection to uninstall the agent via incorrectly applied permissions in the removal protection functionality.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][6]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4326&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H')[/CENTER][/TD] [TD][CVE-2022-4326]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4326') [MISC]('https://docs.trellix.com/bundle/xagent_35-31-22_rn/page/UUID-73c848e7-6107-fe11-d83d-b17bd5b1449c.html')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. This vulnerability only affects release candidates of BigBlueButton 2.4. The attacker can start a subscription for poll results before starting an anonymous poll, and use this subscription to see individual responses in the anonymous poll. The attacker had to be a meeting presenter. This issue is patched in version 2.4.0. There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41964&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-41964]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41964') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.0') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-fgmj-rx7j-fqr4')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In multiple locations of NfcService.java, there is a possible disclosure of NFC tags due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-199291025[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20199&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20199]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20199') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getNearbyNotificationStreamingPolicy of DevicePolicyManagerService.java, there is a possible way to learn about the notification streaming policy of other users due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235822336[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20510&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20510]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20510') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getNearbyAppStreamingPolicy of DevicePolicyManagerService.java, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235821829[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20511&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20511]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20511') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244569759[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20513&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20513]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20513') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onPreferenceClick of AccountTypePreferenceLoader.java, there is a possible way to retrieve protected files from the Settings app due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-220733496[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20515&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20515]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20515') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getMessagesByPhoneNumber of MmsSmsProvider.java, there is a possible access to restricted tables due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224769956[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20517&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20517]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20517') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In query of MmsSmsProvider.java, there is a possible access to restricted tables due to SQL injection. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224770203[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20518&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20518]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20518') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In IncFs_GetFilledRangesStartingFrom of incfs.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-228222508[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20523&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20523]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20523') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In HalCoreCallback of halcore.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure from the NFC firmware with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229994861[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20527&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20527]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20527') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getSmsRoleHolder of RoleService.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235601770[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20538&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20538]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20538') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In btif_a2dp_sink_command_ready of btif_a2dp_sink.cc, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-243922806[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20552&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20552]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20552') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]Product: AndroidVersions: Android kernelAndroid ID: A-230660904References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20570&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20570]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20570') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sec_sysmmu_info of drm_fw.c, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237582191References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20574&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20574]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20574') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In read_ppmpu_info of drm_fw.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237585040References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20575&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20575]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20575') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In valid_va_sec_mfc_check of drm_access_control.c, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238932493References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20590&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20590]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20590') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmpu_set of ppmpu.c, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238939706References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20591&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20591]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20591') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ppmp_validate_secbuf of drm_fw.c, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238976908References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20592&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20592]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20592') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SAECOMM_SetDcnIdForPlmn of SAECOMM_DbManagement.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure from a single device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-230463606References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20604&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20604]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20604') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Pixel cellular firmware, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239239246References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20608&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20608]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20608') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Pixel cellular firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239240808References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20609&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20609]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20609') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In a query in MmsSmsProvider.java, there is a possible access to restricted tables due to SQL injection. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224770183[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42535&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42535]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42535') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]adobe -- illustrator[/LEFT][/TD] [TD][LEFT]Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44498&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-44498]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44498') [MISC]('https://helpx.adobe.com/security/products/illustrator/apsb22-60.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- illustrator[/LEFT][/TD] [TD][LEFT]Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44499&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-44499]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44499') [MISC]('https://helpx.adobe.com/security/products/illustrator/apsb22-60.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- illustrator[/LEFT][/TD] [TD][LEFT]Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44500&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-44500]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44500') [MISC]('https://helpx.adobe.com/security/products/illustrator/apsb22-60.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- illustrator[/LEFT][/TD] [TD][LEFT]Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44502&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-44502]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44502') [MISC]('https://helpx.adobe.com/security/products/illustrator/apsb22-60.html')[/TD] [/TR] [TR] [TD][LEFT]clickstudios -- passwordstate[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected by this issue is some unknown functionality. The manipulation leads to risky cryptographic algorithm. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216272.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4610&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4610]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4610') [N/A]('https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf') [N/A]('https://vuldb.com/?id.216272') [N/A]('https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-35693&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-35693]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35693') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-35695&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-35695]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35695') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]solarwinds -- serv-u[/LEFT][/TD] [TD][LEFT]This vulnerability happens in the web client versions 15.3.0 to Serv-U 15.3.1. This vulnerability affects the directory creation function.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38106&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-38106]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38106') [MISC]('https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-38106') [MISC]('https://cve.mitre.org/cgi-bin/cvename.cgi?name=%20CVE-2022-38106') [MISC]('https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3-2_release_notes.htm')[/TD] [/TR] [TR] [TD][LEFT]hcltech -- digital_experience[/LEFT][/TD] [TD][LEFT]In HCL Digital Experience, customized XSS payload can be constructed such that it is served in the application unencoded.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38653&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-38653]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38653') [MISC]('https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102141')[/TD] [/TR] [TR] [TD][LEFT]noorsplugin -- easy_video_player[/LEFT][/TD] [TD][LEFT]The Easy Video Player WordPress plugin before 1.2.2.3 does not sanitize and escapes some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3937&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3937]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3937') [MISC]('https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af')[/TD] [/TR] [TR] [TD][LEFT]noorsplugin -- checkout_for_paypal[/LEFT][/TD] [TD][LEFT]The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3983&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3983]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3983') [MISC]('https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1')[/TD] [/TR] [TR] [TD][LEFT]wphowto -- flowplayer_video_player[/LEFT][/TD] [TD][LEFT]The Flowplayer Video Player WordPress plugin before 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3984&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3984]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3984') [MISC]('https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa')[/TD] [/TR] [TR] [TD][LEFT]wphowto -- videojs_html5_player[/LEFT][/TD] [TD][LEFT]The Videojs HTML5 Player WordPress plugin before 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3985&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3985]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3985') [MISC]('https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc')[/TD] [/TR] [TR] [TD][LEFT]noorsplugin -- wp_stripe_checkout[/LEFT][/TD] [TD][LEFT]The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3986&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3986]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3986') [MISC]('https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a')[/TD] [/TR] [TR] [TD][LEFT]noorsplugin -- responsive_lightbox2[/LEFT][/TD] [TD][LEFT]The Responsive Lightbox2 WordPress plugin before 1.0.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3987&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3987]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3987') [MISC]('https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29')[/TD] [/TR] [TR] [TD][LEFT]10web -- photo_gallery[/LEFT][/TD] [TD][LEFT]The Photo Gallery by 10Web WordPress plugin before 1.8.3 does not validate and escape some parameters before outputting them back in in JS code later on in another page, which could lead to Stored XSS issue when an attacker makes a logged in admin open a malicious URL or page under their control.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4058&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4058]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4058') [MISC]('https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42345&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42345]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42345') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42346&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42346]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42346') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42348&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42348]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42348') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42349&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42349]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42349') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42350&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42350]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42350') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42352&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42352]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42352') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42354&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42354]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42354') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42356&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42356]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42356') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42357&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42357]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42357') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42362&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42362]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42362') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42364&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42364]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42364') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42365&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-42365]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42365') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44462&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44462]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44462') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44463&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44463]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44463') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44465&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44465]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44465') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44466&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44466]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44466') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44467&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44467]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44467') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44468&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44468]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44468') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44469&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44469]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44469') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44470&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44470]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44470') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44471&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44471]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44471') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44473&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44473]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44473') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44474&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44474]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44474') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44488&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44488]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44488') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager [/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-44510&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-44510]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-44510') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]oc-server3_project -- oc-server3[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in Opencaching Deutschland oc-server3. This issue affects some unknown processing of the file htdocs/templates2/ocstyle/login.tpl of the component Login Page. The manipulation of the argument username leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3296ebd61e7fe49e93b5755d5d7766d6e94a7667. It is recommended to apply a patch to fix this issue. The identifier VDB-216173 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-17[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4587&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4587]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4587') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/commit/3296ebd61e7fe49e93b5755d5d7766d6e94a7667') [N/A]('https://github.com/OpencachingDeutschland/oc-server3/pull/893') [N/A]('https://vuldb.com/?id.216173')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4596&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4596]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4596') [N/A]('https://vuldb.com/?id.216191') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in Shoplazza LifeStyle 1.1. Affected is an unknown function of the file /admin/api/admin/v2_products of the component Create Product Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216192.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4597&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4597]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4597') [N/A]('https://vuldb.com/?id.216192') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/api/theme-edit/ of the component Announcement Handler. The manipulation of the argument Text/Mobile Text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216193 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4598&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4598]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4598') [N/A]('https://vuldb.com/?id.216193') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/api/theme-edit/ of the component Product Handler. The manipulation of the argument Subheading/Heading/Text/Button Text/Label leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216194 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4599&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4599]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4599') [N/A]('https://vuldb.com/?id.216194') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Shoplazza LifeStyle 1.1. It has been classified as problematic. This affects an unknown part of the file /admin/api/theme-edit/ of the component Product Carousel Handler. The manipulation of the argument Heading/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216195.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4600&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4600]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4600') [N/A]('https://vuldb.com/?id.216195') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Shoplazza LifeStyle 1.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/api/theme-edit/ of the component Shipping/Member Discount/Icon. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216196.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4601&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4601]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4601') [N/A]('https://vuldb.com/?id.216196') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt')[/TD] [/TR] [TR] [TD][LEFT]shoplazza -- lifestyle[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Shoplazza LifeStyle 1.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/api/theme-edit/ of the component Review Flow Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216197 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4602&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4602]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4602') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/11') [N/A]('https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt') [N/A]('https://vuldb.com/?id.216197')[/TD] [/TR] [TR] [TD][LEFT]flatpress -- flatpress[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4605&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4605]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4605') [MISC]('https://github.com/flatpressblog/flatpress/commit/742f8b04f233e3cc52bed11f79fcc9911faee776') [CONFIRM]('https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367')[/TD] [/TR] [TR] [TD][LEFT]usememos -- memos[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4609&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4609]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4609') [MISC]('https://github.com/usememos/memos/commit/726285e63467820f94cbf872abe71025a161c212') [CONFIRM]('https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce')[/TD] [/TR] [TR] [TD][LEFT]znote -- znote[/LEFT][/TD] [TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository alagrede/znote-app prior to 1.7.11.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4614&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4614]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4614') [CONFIRM]('https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5') [MISC]('https://github.com/alagrede/znote-app/commit/d889337b9c3ed16ca1aa43837af0960321dd77f2')[/TD] [/TR] [TR] [TD][LEFT]apache -- zeppelin[/LEFT][/TD] [TD][LEFT]An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Zeppelin allows logged-in users to execute arbitrary javascript in other users' browsers. This issue affects Apache Zeppelin before 0.8.2. Users are recommended to upgrade to a supported version of Zeppelin.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46870&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-46870]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46870') [MISC]('https://lists.apache.org/thread/gb1wdnrm1095xw6qznpsycfrht4lwbwc')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In strings.xml, there is a possible permission bypass due to a misleading string. This could lead to remote information disclosure of call logs with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231585645[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20530&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20530]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20530') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]broadcom -- symantec_identity_governance_and_administration[/LEFT][/TD] [TD][LEFT]An unauthenticated user can access Identity Manager’s management console specific page URLs. However, the system doesn’t allow the user to carry out server side tasks without a valid web session.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-25626&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-25626]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-25626') [MISC]('https://support.broadcom.com/external/content/SecurityAdvisories/0/21136')[/TD] [/TR] [TR] [TD][LEFT]apache -- traffic_server[/LEFT][/TD] [TD][LEFT]Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-37392&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-37392]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-37392') [MISC]('https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02')[/TD] [/TR] [TR] [TD][LEFT]ibm -- cognos_analytics[/LEFT][/TD] [TD][LEFT]IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could be vulnerable to sensitive information exposure by passing API keys to log files. If these keys contain sensitive information, it could lead to further attacks. IBM X-Force ID: 240450.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-43887&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-43887]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-43887') [MISC]('https://www.ibm.com/support/pages/node/6841801') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/240450')[/TD] [/TR] [TR] [TD][LEFT]wpvar -- wp_shamsi[/LEFT][/TD] [TD][LEFT]The WP Shamsi plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the deactivate() function hooked via init() in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to deactivate arbitrary plugins on the site. This can be used to deactivate security plugins that aids in exploiting other vulnerabilities.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4555&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4555]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4555') [MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/7b498c5a-9fd1-43b8-b456-f6cec65d5077') [MISC]('https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2645044%40wp-shamsi&new=2645044%40wp-shamsi&sfp_email=&sfph_mail=')[/TD] [/TR] [TR] [TD][LEFT]clickstudios -- passwordstate[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4611&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4611]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4611') [N/A]('https://vuldb.com/?id.216273') [N/A]('https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46313&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD] [TD][CVE-2022-46313]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46313') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]huawei -- harmonyos[/LEFT][/TD] [TD][LEFT]The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46318&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-46318]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46318') [MISC]('https://consumer.huawei.com/en/support/bulletin/2022/12/') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In sdpu_find_most_specific_service_uuid of sdp_utils.cc, there is a possible way to crash Bluetooth due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-227203684[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20521&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-20521]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20521') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In SAEMM_MiningCodecTableWithMsgIE of SAEMM_RadioMessageCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233230674References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20606&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20606]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20606') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]vmware -- vrealize_operations[/LEFT][/TD] [TD][LEFT]vRealize Operations (vROps) contains a broken access control vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.4.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-31708&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-31708]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-31708') [MISC]('https://www.vmware.com/security/advisories/VMSA-2022-0034.html')[/TD] [/TR] [TR] [TD][LEFT]ibm -- security_guardium[/LEFT][/TD] [TD][LEFT]IBM Security Guardium 11.4 could allow a privileged user to obtain sensitive information inside of an HTTP response. IBM X-Force ID: 235405.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-39166&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-39166]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-39166') [MISC]('https://www.ibm.com/support/pages/node/6848317') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/235405')[/TD] [/TR] [TR] [TD][LEFT]cedcommerce -- wholesale_market_for_woocommerce[/LEFT][/TD] [TD][LEFT]The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4108&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-4108]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4108') [MISC]('https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470')[/TD] [/TR] [TR] [TD][LEFT]external_media_project -- external_media[/LEFT][/TD] [TD][LEFT]The External Media WordPress plugin before 1.0.36 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3832&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-3832]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3832') [MISC]('https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92')[/TD] [/TR] [TR] [TD][LEFT]vms-studio -- quizlord[/LEFT][/TD] [TD][LEFT]The Quizlord WordPress plugin through 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4112&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4112]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4112') [MISC]('https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onOptionsItemSelected of ManageApplications.java, there is a possible bypass of profile owner restrictions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238745070[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20544&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20544]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20544') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ufdt_get_node_by_path_len of ufdt_convert.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246194233[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20555&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20555]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20555') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In valid_va_secbuf_check of drm_access_control.c, there is a possible ID due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238841928References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20589&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20589]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20589') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In pop_descriptor_string of BufferDescriptor.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239415809References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20593&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20593]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20593') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getWpcAuthChallengeResponse of WirelessCharger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700137References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20595&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20595]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20595') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In VsimOperationDataExt::encode of vsimdata.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763050References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42512&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42512]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42512') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolImsBuilder::BuildSetConfig of protocolimsbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763298References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42514&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42514]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42514') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In MiscService::DoOemSetRtpPktlossThreshold of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763503References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42515&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42515]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42515') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In ProtocolSimBuilderLegacy::BuildSimGetGbaAuth of protocolsimbuilderlegacy.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763577References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42516&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42516]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42516') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In MiscService::DoOemSetTcsFci of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763682References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42517&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42517]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42517') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In DoSetCarrierConfig of miscservice.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130038References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42522&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42522]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42522') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242331893References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42530&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42530]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42530') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In Pixel firmware, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-242332610References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42532&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42532]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42532') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-249998113References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42543&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42543]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42543') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]ibm -- aix[/LEFT][/TD] [TD][LEFT]IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a local user with elevated privileges to exploit a vulnerability in the lpd daemon to cause a denial of service. IBM X-Force ID: 238641.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-43382&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD] [TD][CVE-2022-43382]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-43382') [MISC]('https://www.ibm.com/support/pages/node/6848309') [MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/238641')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]If a domain name contained a RTL character, it would cause the domain to be rendered to the right of the path. This could lead to user confusion and spoofing attacks.[I]This bug only affects Firefox for Android. Other operating systems are unaffected.[/I]
[I]Note[/I]: Due to a clerical error this advisory was not included in the original announcement, and was added in Feburary 2022. This vulnerability affects Firefox < 92.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-4221&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2021-4221]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4221') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1704422') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-38/')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4.0 expose sensitive information to Unauthorized Actors. This issue affects meetings with polls, where the attacker is a meeting participant. Subscribing to the current-poll collection does not update the client UI, but does give the attacker access to the contents of the collection, which include the individual poll responses. This issue is patched in version 2.4.0. There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-23490&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-23490]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23490') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.0') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-4qgc-xhw5-6qfg')[/TD] [/TR] [TR] [TD][LEFT]microfocus -- groupwise[/LEFT][/TD] [TD][LEFT]A vulnerability has been identified in Micro Focus GroupWise Web in versions prior to 18.4.2. The GW Web component makes a request to the Post Office Agent that contains sensitive information in the query parameters that could be logged by any intervening HTTP proxies.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-38756&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-38756]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-38756') [MISC]('https://portal.microfocus.com/s/article/KM000012374?language=en_US')[/TD] [/TR] [TR] [TD][LEFT]popup_manager_project -- popup_manager[/LEFT][/TD] [TD][LEFT]The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF checks when deleting popups, which could allow unauthenticated users to delete them[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4124&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4124]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4124') [MISC]('https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2')[/TD] [/TR] [TR] [TD][LEFT]popup_manager_project -- popup_manager[/LEFT][/TD] [TD][LEFT]The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF check when creating/updating popups, and is missing sanitisation as well as escaping, which could allow unauthenticated attackers to create arbitrary popups and add Stored XSS payloads as well[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4125&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-4125]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4125') [MISC]('https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4.3, are subject to Insufficient Verification of Data Authenticity, resulting in Denial of Service. An attacker can make a Meteor call to [ICODE]validateAuthToken[/ICODE] using a victim's userId, meetingId, and an invalid authToken. This forces the victim to leave the conference, because the resulting verification failure is also observed and handled by the victim's client. The attacker must be a participant in any meeting on the server. This issue is patched in version 2.4.3. There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41960&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD] [TD][CVE-2022-41960]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41960') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.3') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-rgjp-3r74-g4cm')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6 are subject to Ineffective user bans. The attacker could register multiple users, and join the meeting with one of them. When that user is banned, they could still join the meeting with the remaining registered users from the same extId. This issue has been fixed by improving permissions such that banning a user removes all users related to their extId, including registered users that have not joined the meeting. This issue is patched in versions 2.4-rc-6 and 2.5-alpha-1. There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41961&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-41961]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41961') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4-rc-6') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-wxjp-h88g-7fqg')[/TD] [/TR] [TR] [TD][LEFT]adobe -- experience_manager[/LEFT][/TD] [TD][LEFT]Adobe Experience Manager version 6.5.14 (and earlier) is affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to disclose low level confidentiality information. Exploitation of this issue does not require user interaction.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-42351&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-42351]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-42351') [MISC]('https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In phNxpNciHal_ioctl of phNxpNciHal.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238083126[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][4.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20541&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20541]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20541') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [/TABLE][/CENTER] [Back to top]('https://us-cert.cisa.gov#top')
Low Vulnerabilities
[CENTER][TABLE] [TR] [TH]Primary Vendor -- Product[/TH] [TH]Description[/TH] [TH]Published[/TH] [TH]CVSS Score[/TH] [TH]Source & Patch Info[/TH] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In onCreate of AddAppNetworksActivity.java, there is a possible way for a guest user to configure WiFi networks due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224772678[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20519&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20519]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20519') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In enforceVisualVoicemailPackage of PhoneInterfaceManager.java, there is a possible leak of visual voicemail package name due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229742768[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20525&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20525]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20525') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In CanvasContext::draw of CanvasContext.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-229742774[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20526&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L')[/CENTER][/TD] [TD][CVE-2022-20526]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20526') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In findParam of HevcUtils.cpp there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230172711[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20528&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20528]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20528') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In placeCall of TelecomManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231988638[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20531&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20531]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20531') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In getSlice of WifiSlice.java, there is a possible way to connect a new WiFi network from the guest mode due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-232798363[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20533&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20533]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20533') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In registerLocalOnlyHotspotSoftApCallback of WifiManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233605242[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20535&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20535]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20535') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In registerBroadcastReceiver of RcsService.java, there is a possible way to change preferred TTY mode due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235100180[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20536&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20536]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20536') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In createDialog of WifiScanModeActivity.java, there is a possible way for a Guest user to enable location-sensitive settings due to a missing permission check. This could lead to local escalation of privilege from the Guest user with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235601169[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20537&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20537]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20537') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In launchConfigNewNetworkFragment of NetworkProviderSettings.java, there is a possible way for the guest user to add a new WiFi network due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-246301667[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20556&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20556]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20556') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In registerReceivers of DeviceCapabilityListener.java, there is a possible way to change preferred TTY mode due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236264289[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20558&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-20558]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20558') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In revokeOwnPermissionsOnKill of PermissionManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-219739967[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20559&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20559]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20559') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In various functions of ap_input_processor.c, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231630423References: N/A[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20562&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20562]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20562') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4.3 contain a whiteboard grace period that exists to handle delayed messages, but this grace period could be used by attackers to take actions in the few seconds after their access is revoked. The attacker must be a meeting participant. This issue is patched in version 2.4.3 an version 2.5-alpha-1[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][3.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41963&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-41963]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41963') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4.3') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-v6p9-926c-6qfp')[/TD] [/TR] [TR] [TD][LEFT]bigbluebutton -- bigbluebutton[/LEFT][/TD] [TD][LEFT]BigBlueButton is an open source web conferencing system. Versions prior to 2.4-rc-6, and 2.5-alpha-1 contain Incorrect Authorization for setting emoji status. A user with moderator rights can use the clear status feature to set any emoji status for other users. Moderators should only be able to set none as the status of other users. This issue is patched in 2.4-rc-6 and 2.5-alpha-1There are no workarounds.[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-41962&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD] [TD][CVE-2022-41962]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-41962') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.5-alpha-1') [MISC]('https://github.com/bigbluebutton/bigbluebutton/releases/tag/v2.4-rc-6') [MISC]('https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-88qf-33qm-9mm7')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In multiple locations of WifiDialogActivity.java, there is a possible limited lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege in wifi settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-231583603[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][2.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20529&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD] [TD][CVE-2022-20529]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20529') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [TR] [TD][LEFT]google -- android[/LEFT][/TD] [TD][LEFT]In multiple locations, there is a possible display crash loop due to improper input validation. This could lead to local denial of service with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238178261[/LEFT][/TD] [TD][CENTER]2022-12-16[/CENTER][/TD] [TD][CENTER][2.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-20543&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD] [TD][CVE-2022-20543]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-20543') [MISC]('https://source.android.com/security/bulletin/pixel/2022-12-01')[/TD] [/TR] [/TABLE][/CENTER] [Back to top]('https://us-cert.cisa.gov#top')Severity Not Yet Assigned
[CENTER][TABLE] [TR] [TH]Primary Vendor -- Product[/TH] [TH]Description[/TH] [TH]Published[/TH] [TH]CVSS Score[/TH] [TH]Source & Patch Info[/TH] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360).[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-15679]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-15679') [MISC]('https://github.com/mozilla-mobile/guardian-vpn-ios/commit/4309f5c9bd2c15cdfd39ac173665fad3f2598b54') [MISC]('https://www.mozilla.org/security/advisories/mfsa2020-48/') [MISC]('https://github.com/mozilla-services/guardian-vpn-windows/commit/ac6f562973a83f6758cd7ab7aa313e863047d41b') [MISC]('https://github.com/mozilla-mobile/guardian-vpn-android/commit/981c840276ef3aee98cf5d42993d484ee99b28d9')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- thunderbird[/LEFT][/TD] [TD][LEFT]During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-15685]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-15685') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1622640') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-05/')[/TD] [/TR] [TR] [TD][LEFT]is.js -- is.js[/LEFT][/TD] [TD][LEFT]is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-26302]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-26302') [CONFIRM]('https://securitylab.github.com/advisories/GHSL-2020-295-redos-is.js') [MISC]('https://github.com/arasatasaygin/is.js/issues/320')[/TD] [/TR] [TR] [TD][LEFT]furqan -- furqan[/LEFT][/TD] [TD][LEFT]A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36618]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36618') [N/A]('https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c2834113b7286076') [N/A]('https://vuldb.com/?id.216252') [N/A]('https://github.com/FurqanSoftware/node-whois/pull/105')[/TD] [/TR] [TR] [TD][LEFT]multimon-ng -- multimon-ng[/LEFT][/TD] [TD][LEFT]A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36619]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36619') [N/A]('https://github.com/EliasOenal/multimon-ng/releases/tag/1.2.0') [N/A]('https://github.com/EliasOenal/multimon-ng/pull/160') [N/A]('https://github.com/EliasOenal/multimon-ng/commit/e5a51c508ef952e81a6da25b43034dd1ed023c07') [N/A]('https://vuldb.com/?id.216269')[/TD] [/TR] [TR] [TD][LEFT]brondahl -- enumstringvalues[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Brondahl EnumStringValues up to 4.0.0. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.1 is able to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36620]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36620') [N/A]('https://github.com/Brondahl/EnumStringValues/commit/c0fc7806beb24883cc2f9543ebc50c0820297307') [N/A]('https://vuldb.com/?id.216466') [MISC]('https://github.com/Brondahl/EnumStringValues/releases/tag/4.0.1')[/TD] [/TR] [TR] [TD][LEFT]chedabob -- whatismyudid[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in chedabob whatismyudid. Affected by this issue is the function exports.enrollment of the file routes/mobileconfig.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is bb33d4325fba80e7ea68b79121dba025caf6f45f. It is recommended to apply a patch to fix this issue. VDB-216470 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36621]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36621') [N/A]('https://vuldb.com/?id.216470') [N/A]('https://github.com/chedabob/whatismyudid/commit/bb33d4325fba80e7ea68b79121dba025caf6f45f')[/TD] [/TR] [TR] [TD][LEFT]sah-comp -- bienlein[/LEFT][/TD] [TD][LEFT]A vulnerability was found in sah-comp bienlein and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is d7836a4f2b241e4745ede194f0f6fb47199cab6b. It is recommended to apply a patch to fix this issue. The identifier VDB-216473 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36622]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36622') [N/A]('https://github.com/sah-comp/bienlein/commit/d7836a4f2b241e4745ede194f0f6fb47199cab6b') [N/A]('https://vuldb.com/?id.216473')[/TD] [/TR] [TR] [TD][LEFT]pengu -- pengu[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Pengu. It has been declared as problematic. Affected by this vulnerability is the function runApp of the file src/index.js. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The name of the patch is aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216475.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36623]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36623') [N/A]('https://vuldb.com/?id.216475') [N/A]('https://github.com/jtojnar/pengu/commit/aea66f12b8cdfc3c8c50ad6a9c89d8307e9d0a91')[/TD] [/TR] [TR] [TD][LEFT]ahorner -- text-helpers [/LEFT][/TD] [TD][LEFT]A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2020-36624]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2020-36624') [MISC]('https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3') [MISC]('https://github.com/ahorner/text-helpers/pull/19') [MISC]('https://vuldb.com/?id.216520') [MISC]('https://github.com/ahorner/text-helpers/releases/tag/v1.1.0')[/TD] [/TR] [TR] [TD][LEFT]activity_watch -- activity_watch [/LEFT][/TD] [TD][LEFT]Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the [ICODE]printAppTitle.scpt[/ICODE] file.[/LEFT][/TD] [TD][CENTER]2022-12-23[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-32692]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-32692') [CONFIRM]('https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-3x6w-q32m-jqf3')[/TD] [/TR] [TR] [TD][LEFT]openatom_foundation -- openeuler[/LEFT][/TD] [TD][LEFT]After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-33640]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-33640') [MISC]('https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2021-33640&packageName=libtar')[/TD] [/TR] [TR] [TD][LEFT]beijing -- baidunetdisk[/LEFT][/TD] [TD][LEFT]Untrusted search path vulnerability in Baidunetdisk Version 7.4.3 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-36631]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-36631') [MISC]('https://github.com/shigophilo/CVE/blob/main/Baidunetdisk%20Version%207.4.3%20dll%20hijack.md')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- thunderbird [/LEFT][/TD] [TD][LEFT]When receiving an OpenPGP/MIME signed email message that contains an additional outer MIME message layer, for example a message footer added by a mailing list gateway, Thunderbird only considered the inner signed message for the signature validity. This gave the false impression that the additional contents were also covered by the digital signature. Starting with Thunderbird version 91.4.1, only the signature that belongs to the top level MIME part will be considered for the displayed status. This vulnerability affects Thunderbird < 91.4.1.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4126]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4126') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-55/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1732310')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited. This vulnerability affects Thunderbird < 78.9 and Firefox ESR < 78.9.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4127]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4127') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-11/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1691547') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-12/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox_for_macos[/LEFT][/TD] [TD][LEFT]When transitioning in and out of fullscreen mode, a graphics object was not correctly protected; resulting in memory corruption and a potentially exploitable crash.[I]This bug only affects Firefox on MacOS. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 95.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4128]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4128') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-52/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1735852')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products [/LEFT][/TD] [TD][LEFT]Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4129]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4129') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1393362%2C1736046%2C1736751%2C1737009%2C1739372%2C1739421') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-52/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-54/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2021-53/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4140]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4140') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1746720') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]criego -- active_attr[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.2. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to the public and may be used. Upgrading to version 0.15.3 is able to address this issue. The name of the patch is dab95e5843b01525444b82bd7b336ef1d79377df. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216207.[/LEFT][/TD] [TD][CENTER]2022-12-18[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4250]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4250') [N/A]('https://github.com/cgriego/active_attr/pull/185') [N/A]('https://vuldb.com/?id.216207') [N/A]('https://github.com/cgriego/active_attr/issues/184') [N/A]('https://github.com/cgriego/active_attr/commit/dab95e5843b01525444b82bd7b336ef1d79377df') [MISC]('https://github.com/cgriego/active_attr/releases/tag/v0.15.3')[/TD] [/TR] [TR] [TD][LEFT]phpredisadmin-- phpredisadmin[/LEFT][/TD] [TD][LEFT]A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. Upgrading to version 1.16.2 is able to address this issue. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216267.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4259]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4259') [N/A]('https://github.com/erikdubbelboer/phpRedisAdmin/commit/31aa7661e6db6f4dffbf9a635817832a0a11c7d9') [N/A]('https://vuldb.com/?id.216267') [MISC]('https://github.com/erikdubbelboer/phpRedisAdmin/releases/tag/v1.16.2')[/TD] [/TR] [TR] [TD][LEFT]oils-js -- oils-js[/LEFT][/TD] [TD][LEFT]A vulnerability was found in oils-js. It has been declared as critical. This vulnerability affects unknown code of the file core/Web.js. The manipulation leads to open redirect. The attack can be initiated remotely. The name of the patch is fad8fbae824a7d367dacb90d56cb02c5cb999d42. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216268.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4260]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4260') [N/A]('https://github.com/mannyvergel/oils-js/commit/fad8fbae824a7d367dacb90d56cb02c5cb999d42') [N/A]('https://vuldb.com/?id.216268')[/TD] [/TR] [TR] [TD][LEFT]platzhersh -- pacman-canvas[/LEFT][/TD] [TD][LEFT]A vulnerability classified as critical has been found in pacman-canvas up to 1.0.5. Affected is the function addHighscore of the file data/db-handler.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 29522c90ca1cebfce6453a5af5a45281d99b0646. It is recommended to upgrade the affected component. VDB-216270 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4261]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4261') [N/A]('https://github.com/platzhersh/pacman-canvas/releases/tag/1.0.6') [N/A]('https://github.com/platzhersh/pacman-canvas/commit/29522c90ca1cebfce6453a5af5a45281d99b0646') [N/A]('https://vuldb.com/?id.216270')[/TD] [/TR] [TR] [TD][LEFT]laravel-jqgrid -- laravel-jqgrid [/LEFT][/TD] [TD][LEFT]A vulnerability classified as critical was found in laravel-jqgrid. Affected by this vulnerability is the function getRows of the file src/Mgallegos/LaravelJqgrid/Repositories/EloquentRepositoryAbstract.php. The manipulation leads to sql injection. The name of the patch is fbc2d94f43d0dc772767a5bdb2681133036f935e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216271.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4262]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4262') [N/A]('https://github.com/mgallegos/laravel-jqgrid/pull/72') [N/A]('https://vuldb.com/?id.216271') [N/A]('https://github.com/mgallegos/laravel-jqgrid/commit/fbc2d94f43d0dc772767a5bdb2681133036f935e')[/TD] [/TR] [TR] [TD][LEFT]leanote -- leanote[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in leanote. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The name of the patch is https:/github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4263]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4263') [N/A]('https://github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19') [N/A]('https://vuldb.com/?id.216461')[/TD] [/TR] [TR] [TD][LEFT]linkedin -- dustjs[/LEFT][/TD] [TD][LEFT]A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4264]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4264') [N/A]('https://github.com/linkedin/dustjs/commit/ddb6523832465d38c9d80189e9de60519ac307c3') [N/A]('https://github.com/linkedin/dustjs/pull/805') [N/A]('https://vuldb.com/?id.216464') [N/A]('https://github.com/linkedin/dustjs/issues/804') [MISC]('https://vuldb.com/?ctiid.216464') [MISC]('https://github.com/linkedin/dustjs/releases/tag/v3.0.0')[/TD] [/TR] [TR] [TD][LEFT]siwapp -- siwapp-ror[/LEFT][/TD] [TD][LEFT]A vulnerability was found in siwapp-ror. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 924d16008cfcc09356c87db01848e45290cb58ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216467.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4265]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4265') [N/A]('https://github.com/siwapp/siwapp-ror/pull/365') [N/A]('https://github.com/siwapp/siwapp-ror/commit/924d16008cfcc09356c87db01848e45290cb58ca') [N/A]('https://vuldb.com/?id.216467')[/TD] [/TR] [TR] [TD][LEFT]webdetails -- cpf[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4266]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4266') [N/A]('https://vuldb.com/?id.216468') [N/A]('https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174') [N/A]('https://github.com/siwapp/siwapp-ror/pull/365') [N/A]('https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81')[/TD] [/TR] [TR] [TD][LEFT]tad_discuss -- tad_discuss[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in tad_discuss. Affected by this vulnerability is an unknown functionality. The manipulation of the argument DiscussTitle leads to cross site scripting. The attack can be launched remotely. The name of the patch is af94d034ff8db642d05fd8788179eab05f433958. It is recommended to apply a patch to fix this issue. The identifier VDB-216469 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4267]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4267') [N/A]('https://github.com/tad0616/tad_discuss/pull/19') [N/A]('https://vuldb.com/?id.216469') [N/A]('https://github.com/tad0616/tad_discuss/commit/af94d034ff8db642d05fd8788179eab05f433958')[/TD] [/TR] [TR] [TD][LEFT]phpredisadmin-- phpredisadmin [/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in phpRedisAdmin up to 1.17.3. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.18.0 is able to address this issue. The name of the patch is b9039adbb264c81333328faa9575ecf8e0d2be94. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216471.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4268]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4268') [N/A]('https://vuldb.com/?id.216471') [N/A]('https://github.com/erikdubbelboer/phpRedisAdmin/commit/b9039adbb264c81333328faa9575ecf8e0d2be94') [N/A]('https://github.com/erikdubbelboer/phpRedisAdmin/releases/tag/v1.18.0')[/TD] [/TR] [TR] [TD][LEFT]simplerisk -- simplerisk[/LEFT][/TD] [TD][LEFT]A vulnerability has been found in SimpleRisk and classified as problematic. This vulnerability affects the function checkAndSetValidation of the file simplerisk/js/common.js. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 20220306-001 is able to address this issue. The name of the patch is 591405b4ed160fbefc1dca1e55c5745079a7bb48. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216472.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4269]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4269') [N/A]('https://github.com/simplerisk/code/releases/tag/20220306-001') [N/A]('https://github.com/simplerisk/code/commit/591405b4ed160fbefc1dca1e55c5745079a7bb48') [N/A]('https://vuldb.com/?id.216472')[/TD] [/TR] [TR] [TD][LEFT]imprint_cms -- imprint_cms[/LEFT][/TD] [TD][LEFT]A vulnerability was found in Imprint CMS. It has been classified as problematic. Affected is the function SearchForm of the file ImprintCMS/Models/ViewHelpers.cs. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6140b140ccd02b5e4e7d6ba013ac1225724487f4. It is recommended to apply a patch to fix this issue. VDB-216474 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4270]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4270') [N/A]('https://github.com/peders/Imprint-CMS/commit/6140b140ccd02b5e4e7d6ba013ac1225724487f4') [N/A]('https://vuldb.com/?id.216474')[/TD] [/TR] [TR] [TD][LEFT]w2wiki -- w2wiki [/LEFT][/TD] [TD][LEFT]A vulnerability was found in panicsteve w2wiki. It has been rated as problematic. Affected by this issue is the function toHTML of the file index.php of the component Markdown Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8f1d0470b4ddb1c7699e3308e765c11ed29542b6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216476.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4271]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4271') [N/A]('https://github.com/panicsteve/w2wiki/commit/8f1d0470b4ddb1c7699e3308e765c11ed29542b6') [N/A]('https://vuldb.com/?id.216476')[/TD] [/TR] [TR] [TD][LEFT]studygolang -- studygolang[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic has been found in studygolang. This affects an unknown part of the file static/js/topics.js. The manipulation of the argument contentHtml leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 0fb30f9640bd5fa0cae58922eac6c00bb1a94391. It is recommended to apply a patch to fix this issue. The identifier VDB-216477 was assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4272]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4272') [N/A]('https://github.com/studygolang/studygolang/commit/0fb30f9640bd5fa0cae58922eac6c00bb1a94391') [N/A]('https://vuldb.com/?id.216477')[/TD] [/TR] [TR] [TD][LEFT]studygolang -- studygolang[/LEFT][/TD] [TD][LEFT]A vulnerability classified as problematic was found in studygolang. This vulnerability affects the function Search of the file http/controller/search.go. The manipulation of the argument q leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 97ba556d42fa89dfaa7737e9cd3a8ddaf670bb23. It is recommended to apply a patch to fix this issue. VDB-216478 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4273]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4273') [N/A]('https://github.com/studygolang/studygolang/pull/158') [N/A]('https://github.com/studygolang/studygolang/commit/97ba556d42fa89dfaa7737e9cd3a8ddaf670bb23') [N/A]('https://vuldb.com/?id.216478')[/TD] [/TR] [TR] [TD][LEFT]sileht -- bird-lg[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, has been found in sileht bird-lg. This issue affects some unknown processing of the file templates/layout.html. The manipulation of the argument request_args leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ef6b32c527478fefe7a4436e10b96ee28ed5b308. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216479.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4274]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4274') [N/A]('https://vuldb.com/?id.216479') [N/A]('https://github.com/sileht/bird-lg/commit/ef6b32c527478fefe7a4436e10b96ee28ed5b308') [N/A]('https://github.com/sileht/bird-lg/pull/82')[/TD] [/TR] [TR] [TD][LEFT]pyambic-pentameter -- pyambic-pentameter[/LEFT][/TD] [TD][LEFT]A vulnerability, which was classified as problematic, was found in katlings pyambic-pentameter. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The name of the patch is 974f21aa1b2527ef39c8afe1a5060548217deca8. It is recommended to apply a patch to fix this issue. VDB-216498 is the identifier assigned to this vulnerability.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-4275]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-4275') [N/A]('https://vuldb.com/?id.216498') [N/A]('https://github.com/katlings/pyambic-pentameter/commit/974f21aa1b2527ef39c8afe1a5060548217deca8')[/TD] [/TR] [TR] [TD][LEFT]sourcecodester -- simple_client_management_system[/LEFT][/TD] [TD][LEFT]A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodetester Simple Client Management System (SCMS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the vulnerable input fields.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-43657]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-43657') [MISC]('https://github.com/c0n5n3d/CVE-2021-43657/blob/main/Info.txt')[/TD] [/TR] [TR] [TD][LEFT]harmonyos -- harmonyos[/LEFT][/TD] [TD][LEFT]The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2021-46856]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-46856') [MISC]('https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox [/LEFT][/TD] [TD][LEFT]Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-0511]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-0511') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1713579%2C1735448%2C1743821%2C1746313%2C1746314%2C1746316%2C1746321%2C1746322%2C1746323%2C1746412%2C1746430%2C1746451%2C1746488%2C1746875%2C1746898%2C1746905%2C1746907%2C1746917%2C1747128%2C1747137%2C1747331%2C1747346%2C1747439%2C1747457%2C1747870%2C1749051%2C1749274%2C1749831') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- vpn [/LEFT][/TD] [TD][LEFT]Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker with limited privileges could leverage this to launch arbitrary code with SYSTEM privilege. This vulnerability affects Mozilla VPN < 2.7.1.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-0517]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-0517') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1752291') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-08/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- thunderbird[/LEFT][/TD] [TD][LEFT]It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird < 91.6.1.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-0566]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-0566') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1753094') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-07/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 98.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-0843]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-0843') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-10/') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]
NSSToken
objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1097]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1097')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1745667')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-13/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-15/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-14/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1196]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1196')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-15/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-14/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1750679')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- thunderbird[/LEFT][/TD]
[TD][LEFT]When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1197]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1197')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1754985')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-15/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- thunderbird[/LEFT][/TD]
[TD][LEFT]When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird < 91.9.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1520]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1520')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1745019')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-18/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1529]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1529')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1770048')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-19/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1802]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1802')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1770137')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-19/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- thunderbird
[/LEFT][/TD]
[TD][LEFT]When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-1834]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-1834')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-22/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1767816')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-2200]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-2200')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-24/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-26/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-25/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1771381')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- thunderbird
[/LEFT][/TD]
[TD][LEFT]An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-2226]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-2226')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-26/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1775441')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- identity_manager[/LEFT][/TD]
[TD][LEFT]IBM Security Verify Governance, Identity Manager 10.01 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 224915.[/LEFT][/TD]
[TD][CENTER]2022-12-24[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22449]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22449')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/224915')
[MISC]('https://www.ibm.com/support/pages/node/6849247')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- identity_manager[/LEFT][/TD]
[TD][LEFT]IBM Security Verify Governance, Identity Manager 10.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225004.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22456]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22456')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/225004')
[MISC]('https://www.ibm.com/support/pages/node/6849247')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- identity_manager[/LEFT][/TD]
[TD][LEFT]IBM Security Verify Governance, Identity Manager 10.0.1 stores sensitive information including user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 225007.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22457]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22457')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/225007')
[MISC]('https://www.ibm.com/support/pages/node/6849247')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- identity_manager[/LEFT][/TD]
[TD][LEFT]IBM Security Verify Governance, Identity Manager 10.0.1 stores user credentials in plain clear text which can be read by a remote authenticated user. IBM X-Force ID: 225009.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22458]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22458')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/225009')
[MISC]('https://www.ibm.com/support/pages/node/6849247')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- identity_manager[/LEFT][/TD]
[TD][LEFT]IBM Security Verify Governance, Identity Manager 10.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225007.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22461]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22461')
[MISC]('https://www.ibm.com/support/pages/node/6850845')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/225077')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- firefox[/LEFT][/TD]
[TD][LEFT]If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.[I]This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 96.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22736]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22736') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1742692') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22737]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22737') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1745874') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22738]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22738') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1742382')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22739]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22739') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1744158') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22740]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22740') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1742334') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22741]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22741') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1740389') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22742]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22742') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1739923')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22743]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22743') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1739220') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.
[I]This bug only affects Thunderbird for Windows. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22744]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22744') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1737252')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22745]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22745') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1735856') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.
[I]This bug only affects Firefox for Windows. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22746]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22746') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1735071') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22747]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22747') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1735028') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22748]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22748') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1705211') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox_for_android[/LEFT][/TD] [TD][LEFT]When scanning QR codes, Firefox for Android would have allowed navigation to some URLs that do not point to web content.
[I]This bug only affects Firefox for Android. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 96.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22749]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22749') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1705094')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]By generally accepting and passing resource handles across processes, a compromised content process might have confused higher privileged processes to interact with handles that the unprivileged process should not have access to.
[I]This bug only affects Firefox for Windows and MacOS. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 96.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22750]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22750') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1566608')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22751]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22751') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-02/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-03/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 96.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22752]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22752') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1741210%2C1742770') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access.
[I]This bug only affects Firefox on Windows. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22753]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22753') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1732435') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22754]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22754') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1750565') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22755]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22755') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1309630') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22756]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22756') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1317873') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it.
[I]This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.[/I]. This vulnerability affects Firefox < 97.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22757]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22757') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1720098') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- firefox[/LEFT][/TD] [TD][LEFT]When clicking on a tel: link, USSD codes, specified after a
\[I]
character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack.*This bug only affects Firefox for Android. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 97.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22758]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22758') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1728742') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]If a document created a sandboxed iframe without
allow-scripts
, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22759]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22759')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1739957')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]When importing resources using Web Workers, error messages would distinguish the difference between application/javascript
responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22760]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22760')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1748503')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1740985')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD]
[TD][CENTER]2022-12-22[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-22761]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22761')
[MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1745566')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/')
[MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- firefox_for_android[/LEFT][/TD]
[TD][LEFT]Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. [I]This bug only affects Firefox for Android. Other operating systems are unaffected.[/I]. This vulnerability affects Firefox < 97.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22762]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22762') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1743931') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products[/LEFT][/TD] [TD][LEFT]When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22763]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22763') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-01/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/') [MISC]('https://bugzilla.mozilla.org/show_bug.cgi?id=1740534')[/TD] [/TR] [TR] [TD][LEFT]mozilla -- multiple_products [/LEFT][/TD] [TD][LEFT]Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-22764]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22764') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-06/') [MISC]('https://bugzilla.mozilla.org/buglist.cgi?bug_id=1742682%2C1744165%2C1746545%2C1748210%2C1748279') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-05/') [MISC]('https://www.mozilla.org/security/advisories/mfsa2022-04/')[/TD] [/TR] [TR] [TD][LEFT]pi-hole -- adminlte[/LEFT][/TD] [TD][LEFT]Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on [ICODE]queryads[/ICODE] endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: [ICODE]/admin/scripts/pi-hole/phpqueryads.php.[/ICODE] Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.[/LEFT][/TD] [TD][CENTER]2022-12-23[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23513]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23513') [MISC]('https://github.com/pi-hole/AdminLTE/releases/tag/v5.18') [MISC]('https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497')[/TD] [/TR] [TR] [TD][LEFT]auth0 -- jsonwebtoken[/LEFT][/TD] [TD][LEFT]node-jsonwebtoken is a JsonWebToken implementation for node.js. For versions [ICODE]<= 8.5.1[/ICODE] of [ICODE]jsonwebtoken[/ICODE] library, if a malicious actor has the ability to modify the key retrieval parameter (referring to the [ICODE]secretOrPublicKey[/ICODE] argument from the readme link of the [ICODE]jwt.verify()[/ICODE] function, they can write arbitrary files on the host machine. Users are affected only if untrusted entities are allowed to modify the key retrieval parameter of the [ICODE]jwt.verify()[/ICODE] on a host that you control. This issue has been fixed, please update to version 9.0.0.[/LEFT][/TD] [TD][CENTER]2022-12-21[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23529]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23529') [MISC]('https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-27h2-hvpr-p74q') [MISC]('https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3')[/TD] [/TR] [TR] [TD][LEFT]cortex_project -- cortex [/LEFT][/TD] [TD][LEFT]Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where [ICODE]-experimental.alertmanager.enable-api[/ICODE] or [ICODE]enable_api: true[/ICODE] is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the [ICODE]api_key_file[/ICODE] setting in the [ICODE]opsgenie_configs[/ICODE] section before sending to the Set Alertmanager Configuration API.[/LEFT][/TD] [TD][CENTER]2022-12-19[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23536]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23536') [MISC]('https://cortexmetrics.io/docs/api/#set-alertmanager-configuration') [MISC]('https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j') [MISC]('https://github.com/cortexproject/cortex/releases/tag/v1.13.2') [MISC]('https://github.com/cortexproject/cortex/releases/tag/v1.14.1')[/TD] [/TR] [TR] [TD][LEFT]pjsip -- pjsip[/LEFT][/TD] [TD][LEFT]PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23537]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23537') [MISC]('https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w') [MISC]('https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1')[/TD] [/TR] [TR] [TD][LEFT]auth0 -- jsonwebtoken[/LEFT][/TD] [TD][LEFT]Versions [ICODE]<=8.5.1[/ICODE] of [ICODE]jsonwebtoken[/ICODE] library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the [ICODE]allowInvalidAsymmetricKeyTypes[/ICODE] option to [ICODE]true[/ICODE] in the [ICODE]sign()[/ICODE] and/or [ICODE]verify()[/ICODE] functions.[/LEFT][/TD] [TD][CENTER]2022-12-23[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23539]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23539') [MISC]('https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33') [MISC]('https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3')[/TD] [/TR] [TR] [TD][LEFT]auth0 -- jsonwebtoken[/LEFT][/TD] [TD][LEFT]In versions [ICODE]<=8.5.1[/ICODE] of [ICODE]jsonwebtoken[/ICODE] library, lack of algorithm definition in the [ICODE]jwt.verify()[/ICODE] function can lead to signature validation bypass due to defaulting to the [ICODE]none[/ICODE] algorithm for signature verification. Users are affected if you do not specify algorithms in the [ICODE]jwt.verify()[/ICODE] function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the [ICODE]jwt.verify()[/ICODE] method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the [ICODE]none[/ICODE] algorithm. If you need 'none' algorithm, you have to explicitly specify that in [ICODE]jwt.verify()[/ICODE] options.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23540]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23540') [MISC]('https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6') [MISC]('https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3')[/TD] [/TR] [TR] [TD][LEFT]auth0 -- jsonwebtoken[/LEFT][/TD] [TD][LEFT]jsonwebtoken is an implementation of JSON Web Tokens. Versions [ICODE]<= 8.5.1[/ICODE] of [ICODE]jsonwebtoken[/ICODE] library can be misconfigured so that passing a poorly implemented key retrieval function referring to the [ICODE]secretOrPublicKey[/ICODE] argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.[/LEFT][/TD] [TD][CENTER]2022-12-22[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23541]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23541') [MISC]('https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959') [MISC]('https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0') [MISC]('https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3')[/TD] [/TR] [TR] [TD][LEFT]openfga -- openfga[/LEFT][/TD] [TD][LEFT]OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible.[/LEFT][/TD] [TD][CENTER]2022-12-20[/CENTER][/TD] [TD][CENTER]not yet calculated[/CENTER][/TD] [TD][CVE-2022-23542]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-23542') [MISC]('https://github.com/openfga/openfga/pull/422') [MISC]('https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m') [MISC]('https://github.com/openfga/openfga/releases/tag/v0.3.1')[/TD] [/TR] [TR] [TD][LEFT]silverware_games -- silverware_games[/LEFT][/TD] [TD][LEFT]Silverware Games is a social network where people can play games online. Users can attach URLs to YouTube videos, the site will generate related [ICODE]