# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-34876 |
89 |
|
Sql |
2022-07-05 |
2022-07-13 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
SQL Injection vulnerability in admin interface (/vicidial/admin.php) of VICIdial via modify_email_accounts, access_recordings, and agentcall_email parameters allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555. |
2 |
CVE-2022-33948 |
78 |
|
Exec Code |
2022-07-04 |
2022-07-15 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product. |
3 |
CVE-2022-30215 |
|
|
|
2022-07-12 |
2022-07-20 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Active Directory Federation Services Elevation of Privilege Vulnerability. |
4 |
CVE-2022-28743 |
367 |
|
Exec Code |
2022-04-21 |
2022-05-04 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Time-of-check Time-of-use (TOCTOU) Race Condition vulerability in Foscam R2C IP camera running System FW <= 1.13.1.6, and Application FW <= 2.91.2.66, allows an authenticated remote attacker with administrator permissions to execute arbitrary remote code via a malicious firmware patch. The impact of this vulnerability is that the remote attacker could gain full remote access to the IP camera and the underlying Linux system with root permissions. With root access to the camera's Linux OS, an attacker could effectively change the code that is running, add backdoor access, or invade the privacy of the user by accessing the live camera stream. |
5 |
CVE-2022-27883 |
59 |
|
|
2022-04-09 |
2022-04-14 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
A link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an attacker to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt to exploit this vulnerability. |
6 |
CVE-2022-26986 |
89 |
|
Sql |
2022-04-05 |
2022-04-12 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system. |
7 |
CVE-2022-26829 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826. |
8 |
CVE-2022-26822 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
9 |
CVE-2022-26821 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
10 |
CVE-2022-26820 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
11 |
CVE-2022-26819 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
12 |
CVE-2022-26818 |
|
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26817, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
13 |
CVE-2022-26817 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
14 |
CVE-2022-26814 |
362 |
|
Exec Code |
2022-04-15 |
2022-04-18 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26815, CVE-2022-26817, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. |
15 |
CVE-2022-26670 |
78 |
|
Exec Code |
2022-04-07 |
2022-04-14 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
D-Link DIR-878 has inadequate filtering for special characters in the webpage input field. An unauthenticated LAN attacker can perform command injection attack to execute arbitrary system commands to control the system or disrupt service. |
16 |
CVE-2022-26019 |
|
|
Exec Code |
2022-03-31 |
2022-04-07 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Improper access control vulnerability in pfSense CE and pfSense Plus (pfSense CE software versions prior to 2.6.0 and pfSense Plus software versions prior to 22.01) allows a remote attacker with the privilege to change NTP GPS settings to rewrite existing files on the file system, which may result in arbitrary command execution. |
17 |
CVE-2022-24893 |
787 |
|
Mem. Corr. |
2022-06-25 |
2022-07-08 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware. |
18 |
CVE-2022-24533 |
|
|
Exec Code |
2022-04-15 |
2022-04-19 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Remote Desktop Protocol Remote Code Execution Vulnerability. |
19 |
CVE-2022-24355 |
787 |
|
Exec Code |
2022-02-18 |
2022-02-28 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of file name extensions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13910. |
20 |
CVE-2022-24354 |
190 |
|
Exec Code Overflow |
2022-02-18 |
2022-02-28 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835. |
21 |
CVE-2022-24248 |
22 |
|
Dir. Trav. |
2022-04-12 |
2022-04-20 |
8.5 |
None |
Remote |
Low |
??? |
None |
Complete |
Complete |
RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain web server security mechanisms such as deleting .htaccess file that would deactivate those security constraints. |
22 |
CVE-2022-24247 |
22 |
|
Exec Code Dir. Trav. |
2022-04-12 |
2022-04-19 |
8.5 |
None |
Remote |
Low |
??? |
None |
Complete |
Complete |
RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution. |
23 |
CVE-2022-24046 |
191 |
|
Exec Code |
2022-02-18 |
2022-03-07 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the anacapd daemon. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15828. |
24 |
CVE-2022-24039 |
74 |
|
Exec Code +Priv |
2022-05-10 |
2022-05-20 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
A vulnerability has been identified in Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The “addCell” JavaScript function fails to properly sanitize user-controllable input before including it into the generated XML body of the XLS report document, such that it is possible to inject arbitrary content (e.g., XML tags) into the generated file. An attacker with restricted privileges, by poisoning any of the content used to generate XLS reports, could be able to leverage the application to deliver malicious files against higher-privileged users and obtain Remote Code Execution (RCE) against the administrator’s workstation. |
25 |
CVE-2022-22993 |
918 |
|
Bypass |
2022-01-28 |
2022-03-18 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
A limited SSRF vulnerability was discovered on Western Digital My Cloud devices that could allow an attacker to impersonate a server and reach any page on the server by bypassing access controls. The vulnerability was addressed by creating a whitelist for valid parameters. |
26 |
CVE-2022-22991 |
77 |
|
|
2022-01-13 |
2022-01-21 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP. |
27 |
CVE-2022-22990 |
287 |
|
Exec Code Bypass |
2022-01-13 |
2022-03-17 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts. |
28 |
CVE-2022-22986 |
78 |
|
Exec Code |
2022-03-31 |
2022-04-08 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
Netcommunity OG410X and OG810X series (Netcommunity OG410Xa, OG410Xi, OG810Xa, and OG810Xi firmware Ver.2.28 and earlier) allow an attacker on the adjacent network to execute an arbitrary OS command via a specially crafted config file. |
29 |
CVE-2022-22811 |
352 |
|
CSRF |
2022-02-09 |
2022-05-16 |
8.8 |
None |
Remote |
Medium |
Not required |
None |
Complete |
Complete |
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists that could induce users to perform unintended actions, leading to the override of the system?s configurations when an attacker persuades a user to visit a rogue website. Affected Product: spaceLYnk (V2.6.2 and prior), Wiser for KNX (formerly homeLYnk) (V2.6.2 and prior), fellerLYnk (V2.6.2 and prior) |
30 |
CVE-2022-22772 |
|
|
Exec Code |
2022-03-30 |
2022-04-07 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
The cfsend, cfrecv, and CyberResp components of TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for UNIX and TIBCO Managed File Transfer Platform Server for z/Linux contain a difficult to exploit Remote Code Execution (RCE) vulnerability that allows a low privileged attacker with network access to execute arbitrary code on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for UNIX: versions 8.1.0 and below and TIBCO Managed File Transfer Platform Server for z/Linux: versions 8.1.0 and below. |
31 |
CVE-2022-22767 |
522 |
|
+Priv |
2022-06-02 |
2022-06-11 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
Specific BD Pyxis™ products were installed with default credentials and may presently still operate with these credentials. There may be scenarios where BD Pyxis™ products are installed with the same default local operating system credentials or domain-joined server(s) credentials that may be shared across product types. If exploited, threat actors may be able to gain privileged access to the underlying file system and could potentially exploit or gain access to ePHI or other sensitive information. |
32 |
CVE-2022-22725 |
120 |
|
Exec Code Overflow |
2022-02-04 |
2022-02-10 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P3 (All versions prior to V30.205) |
33 |
CVE-2022-22723 |
120 |
|
Exec Code Overflow |
2022-02-04 |
2022-02-10 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101) |
34 |
CVE-2022-22374 |
|
|
|
2022-03-24 |
2022-06-16 |
8.5 |
None |
Remote |
Low |
Not required |
None |
Partial |
Complete |
The BMC (IBM Power 9 AC922 OP910, OP920, OP930, and OP940) may be subject to a firmware downgrade attack which may affect its ability to operate its host. IBM X-Force ID: 221442. |
35 |
CVE-2022-22037 |
269 |
|
|
2022-07-12 |
2022-07-16 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30202, CVE-2022-30224. |
36 |
CVE-2022-21970 |
269 |
|
|
2022-01-11 |
2022-08-10 |
8.3 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Complete |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21954. |
37 |
CVE-2022-21893 |
|
|
Exec Code |
2022-01-11 |
2022-05-23 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Remote Desktop Protocol Remote Code Execution Vulnerability. |
38 |
CVE-2022-21846 |
94 |
|
Exec Code |
2022-01-11 |
2022-01-14 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21855, CVE-2022-21969. |
39 |
CVE-2022-21768 |
787 |
|
|
2022-07-06 |
2022-07-14 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784351; Issue ID: ALPS06784351. |
40 |
CVE-2022-21767 |
787 |
|
|
2022-07-06 |
2022-07-14 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784430; Issue ID: ALPS06784430. |
41 |
CVE-2022-21745 |
416 |
|
Mem. Corr. |
2022-06-06 |
2022-06-13 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
In WIFI Firmware, there is a possible memory corruption due to a use after free. This could lead to remote escalation of privilege, when devices are connecting to the attacker-controllable Wi-Fi hotspot, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06468872; Issue ID: ALPS06468872. |
42 |
CVE-2022-21705 |
74 |
|
Exec Code Bypass |
2022-02-23 |
2022-03-02 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. This issue only affects admin panels that rely on safe mode and restricted permissions. To exploit this vulnerability, an attacker must first have access to the backend area. The issue has been patched in Build 474 (v1.0.474) and v1.1.10. Users unable to upgrade should apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually. |
43 |
CVE-2022-21173 |
78 |
|
Exec Code |
2022-02-08 |
2022-02-15 |
8.3 |
None |
Local Network |
Low |
Not required |
Complete |
Complete |
Complete |
Hidden functionality vulnerability in ELECOM LAN routers (WRH-300BK3 firmware v1.05 and earlier, WRH-300WH3 firmware v1.05 and earlier, WRH-300BK3-S firmware v1.05 and earlier, WRH-300DR3-S firmware v1.05 and earlier, WRH-300LB3-S firmware v1.05 and earlier, WRH-300PN3-S firmware v1.05 and earlier, WRH-300WH3-S firmware v1.05 and earlier, and WRH-300YG3-S firmware v1.05 and earlier) allows an attacker on the adjacent network to execute an arbitrary OS command via unspecified vectors. |
44 |
CVE-2022-20812 |
22 |
|
Dir. Trav. |
2022-07-06 |
2022-07-14 |
8.5 |
None |
Remote |
Low |
??? |
None |
Complete |
Complete |
Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory. |
45 |
CVE-2022-20789 |
610 |
|
|
2022-04-21 |
2022-05-03 |
8.5 |
None |
Remote |
Low |
??? |
None |
Complete |
Complete |
A vulnerability in the software upgrade process of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to write arbitrary files on the affected system. This vulnerability is due to improper restrictions applied to a system script. An attacker could exploit this vulnerability by using crafted variables during the execution of a system upgrade. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges. |
46 |
CVE-2022-20759 |
269 |
|
+Priv |
2022-05-03 |
2022-05-13 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, but unprivileged, remote attacker to elevate privileges to level 15. This vulnerability is due to improper separation of authentication and authorization scopes. An attacker could exploit this vulnerability by sending crafted HTTPS messages to the web services interface of an affected device. A successful exploit could allow the attacker to gain privilege level 15 access to the web management interface of the device. This includes privilege level 15 access to the device using management tools like the Cisco Adaptive Security Device Manager (ASDM) or the Cisco Security Manager (CSM). Note: With Cisco FTD Software, the impact is lower than the CVSS score suggests because the affected web management interface allows for read access only. |
47 |
CVE-2022-20739 |
269 |
|
Exec Code |
2022-04-15 |
2022-05-13 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged by a root user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the root user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the root user. |
48 |
CVE-2022-20658 |
669 |
|
|
2022-01-14 |
2022-01-14 |
8.5 |
None |
Remote |
Low |
??? |
Complete |
Complete |
None |
A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) and Cisco Unified Contact Center Domain Manager (Unified CCDM) could allow an authenticated, remote attacker to elevate their privileges to Administrator. This vulnerability is due to the lack of server-side validation of user permissions. An attacker could exploit this vulnerability by submitting a crafted HTTP request to a vulnerable system. A successful exploit could allow the attacker to create Administrator accounts. With these accounts, the attacker could access and modify telephony and user resources across all the Unified platforms that are associated to the vulnerable Cisco Unified CCMP. To successfully exploit this vulnerability, an attacker would need valid Advanced User credentials. |
49 |
CVE-2022-1467 |
668 |
|
|
2022-05-23 |
2022-06-07 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
Windows OS can be configured to overlay a “language bar” on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS. |
50 |
CVE-2021-45033 |
798 |
|
|
2022-01-11 |
2022-01-19 |
8.5 |
None |
Remote |
Medium |
??? |
Complete |
Complete |
Complete |
A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < V16.20), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < V16.20), CP-8021 MASTER MODULE (All versions < V16.20), CP-8022 MASTER MODULE WITH GPRS (All versions < V16.20). An undocumented debug port uses hard-coded default credentials. If this port is enabled by a privileged user, an attacker aware of the credentials could access an administrative debug shell on the affected device. |