Vulnerabilidades CVE
Base de dados CVE enriquecida com CISA KEV e NVD
| CVE ID | CVSS | Severidade | KEV | Avistamentos |
|---|---|---|---|---|
| CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user... | 5.6 | MEDIUM | — | 0 |
| CVE-2022-2385 A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges. | 8.1 | HIGH | — | 0 |
| CVE-2022-24800 October/System is the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. Prior to versions 1.0.476, 1.1.12, and 2.2.15, when the developer allows the user to... | 8.1 | HIGH | — | 0 |
| CVE-2011-4916 Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /dev/pts/ and /dev/tty*. | 5.5 | MEDIUM | — | 0 |
| CVE-2022-1737 Pyramid Solutions' affected products, the Developer and DLL kits for EtherNet/IP Adapter and EtherNet/IP Scanner, are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to ... | 9.8 | CRITICAL | — | 0 |
| CVE-2022-22997 Addressed a remote code execution vulnerability by resolving a command injection vulnerability and closing an AWS S3 bucket that potentially allowed an attacker to execute unsigned code on My Cloud Ho... | 6.8 | MEDIUM | — | 0 |
| CVE-2022-22998 Implemented protections on AWS credentials that were not properly protected. | 8.0 | HIGH | — | 0 |
| CVE-2022-29187 Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsus... | 7.8 | HIGH | — | 0 |
| CVE-2022-29619 Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 allows user Administrator to view, edit or modify rights of objects it doesn't own and which would ot... | 6.5 | MEDIUM | — | 0 |
| CVE-2022-2211 A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by... | 6.5 | MEDIUM | — | 0 |
| CVE-2022-31012 Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows' installer execute a binary into `C:\mingw64\bin\git.exe` b... | 8.2 | HIGH | — | 0 |
| CVE-2022-31134 Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to downl... | 4.9 | MEDIUM | — | 0 |
| CVE-2022-31591 SAP BusinessObjects BW Publisher Service - versions 420, 430, uses a search path that contains an unquoted element. A local attacker can gain elevated privileges by inserting an executable file in the... | 7.8 | HIGH | — | 0 |
| CVE-2022-22024 Windows Fax Service Remote Code Execution Vulnerability | 7.8 | HIGH | — | 0 |
| CVE-2022-31592 The application SAP Enterprise Extension Defense Forces & Public Security - versions 605, 606, 616,617,618, 802, 803, 804, 805, 806, does not perform necessary authorization checks for an authenticate... | 4.3 | MEDIUM | — | 0 |
| CVE-2022-31593 SAP Business One client - version 10.0 allows an attacker with low privileges, to inject code that can be executed by the application. An attacker could thereby control the behavior of the application... | 8.8 | HIGH | — | 0 |
| CVE-2022-31597 Within SAP S/4HANA - versions S4CORE 101, 102, 103, 104, 105, 106, SAPSCORE 127, the application business partner extension for Spain/Slovakia does not perform necessary authorization checks for a low... | 5.4 | MEDIUM | — | 0 |
| CVE-2022-31598 Due to insufficient input validation, SAP Business Objects - version 420, allows an authenticated attacker to submit a malicious request through an allowed operation. On successful exploitation, an at... | 5.4 | MEDIUM | — | 0 |
| CVE-2022-31654 VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in configurations. | 5.4 | MEDIUM | — | 0 |
| CVE-2022-31655 VMware vRealize Log Insight in versions prior to 8.8.2 contain a stored cross-site scripting vulnerability due to improper input sanitization in alerts. | 5.4 | MEDIUM | — | 0 |
| CVE-2022-22025 Windows Internet Information Services Cachuri Module Denial of Service Vulnerability | 7.5 | HIGH | — | 0 |
| CVE-2022-32246 SAP Busines Objects Business Intelligence Platform (Visual Difference Application) - versions 420, 430, allows an authenticated attacker who has access to BI admin console to send crafted queries and ... | 4.6 | MEDIUM | — | 0 |
| CVE-2022-32247 SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the User i... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-32248 Due to missing input validation in the Manage Checkbooks component of SAP S/4HANA - version 101, 102, 103, 104, 105, 106, an attacker could insert or edit the value of an existing field in the databas... | 5.3 | MEDIUM | — | 0 |
| CVE-2022-32249 Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit�s data volume to gain access to highly sensitive information (e.g., high privil... | 7.5 | HIGH | — | 0 |
| CVE-2022-35168 Due to improper input sanitization of XML input in SAP Business One - version 10.0, an attacker can perform a denial-of-service attack rendering the system temporarily inoperative. | 7.5 | HIGH | — | 0 |
| CVE-2022-22026 Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | 8.8 | HIGH | — | 0 |
| CVE-2022-35169 SAP BusinessObjects Business Intelligence Platform (LCM) - versions 420, 430, allows an attacker with an admin privilege to read and decrypt LCMBIAR file's password under certain conditions, enabling ... | 6.0 | MEDIUM | — | 0 |
| CVE-2022-35170 SAP NetWeaver Enterprise Portal does - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-35171 When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the us... | 5.5 | MEDIUM | — | 0 |
| CVE-2022-35172 SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerabilit... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-35224 SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can b... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-22027 Windows Fax Service Remote Code Execution Vulnerability | 7.8 | HIGH | — | 0 |
| CVE-2022-35225 SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-35227 A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attac... | 6.1 | MEDIUM | — | 0 |
| CVE-2022-35228 SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses... | 8.8 | HIGH | — | 0 |
| CVE-2022-29600 The oelib (aka One is Enough Library) extension through 4.1.5 for TYPO3 allows SQL Injection. | 9.8 | CRITICAL | — | 0 |
| CVE-2022-29601 The seminars (aka Seminar Manager) extension through 4.1.3 for TYPO3 allows SQL Injection. | 9.8 | CRITICAL | — | 0 |
| CVE-2022-30181 Azure Site Recovery Elevation of Privilege Vulnerability | 6.5 | MEDIUM | — | 0 |
| CVE-2022-31102 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with 2.3.0 and prior to 2.3.6 and 2.4.5 is vulnerable to a cross-site scripting (XSS) bug which could allow a... | 2.6 | LOW | — | 0 |
| CVE-2022-31105 Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 0.4.0 and prior to 2.2.11, 2.3.6, and 2.4.5 is vulnerable to an improper certificate validation ... | 8.3 | HIGH | — | 0 |
| CVE-2022-33154 The schema (aka Embedding schema.org vocabulary) extension before 1.13.1 and 2.x before 2.5.1 for TYPO3 allows XSS. | 5.4 | MEDIUM | — | 0 |
| CVE-2022-33155 The ameos_tarteaucitron (aka AMEOS - TarteAuCitron GDPR cookie banner and tracking management / French RGPD compatible) extension before 1.2.23 for TYPO3 allows XSS. | 5.4 | MEDIUM | — | 0 |
| CVE-2022-35403 Zoho ManageEngine ServiceDesk Plus before 13008, ServiceDesk Plus MSP before 10606, and SupportCenter Plus before 11022 are affected by an unauthenticated local file disclosure vulnerability via ticke... | 7.5 | HIGH | — | 0 |
| CVE-2022-21845 Windows Kernel Information Disclosure Vulnerability | 4.7 | MEDIUM | — | 0 |
| CVE-2022-22022 Windows Print Spooler Elevation of Privilege Vulnerability | 7.1 | HIGH | — | 0 |
| CVE-2022-22028 Windows Network File System Information Disclosure Vulnerability | 5.9 | MEDIUM | — | 0 |
| CVE-2022-22029 Windows Network File System Remote Code Execution Vulnerability | 8.1 | HIGH | — | 0 |
| CVE-2022-22031 Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability | 7.8 | HIGH | — | 0 |
| CVE-2022-22034 Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 | HIGH | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.