`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.", "https://github.com/0xN7y/CVE-2022-46169
https://github.com/0xZon/CVE-2022-46169-Exploit
https://github.com/0xf4n9x/CVE-2022-46169
https://github.com/0xsyr0/OSCP
https://github.com/1f3lse/taiE
https://github.com/20142995/pocsuite3
https://github.com/4m4Sec/CVE-2022-46169
https://github.com/ARPSyndicate/cvemon
https://github.com/ARPSyndicate/kenzer-templates
https://github.com/Anekant-Singhai/Exploits
https://github.com/Anthonyc3rb3ru5/CVE-2022-46169
https://github.com/BKreisel/CVE-2022-46169
https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22
https://github.com/Habib0x0/CVE-2022-46169
https://github.com/Inplex-sys/CVE-2022-46169
https://github.com/JacobEbben/CVE-2022-46169_unauth_remote_code_execution
https://github.com/JoshMorrison99/my-nuceli-templates
https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
https://github.com/Loginsoft-Research/Linux-Exploit-Detection
https://github.com/MarkStrendin/CVE-2022-46169
https://github.com/MrRooten/burp-rs
https://github.com/N1arut/CVE-2022-46169_POC
https://github.com/Ostorlab/KEV
https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
https://github.com/Rickster5555/EH2-PoC
https://github.com/Safarchand/CVE-2022-46169
https://github.com/Safe3/CVS
https://github.com/SirElmard/ethical_hacking
https://github.com/TasosY2K/camera-exploit-tool
https://github.com/Threekiii/Awesome-POC
https://github.com/Threekiii/CVE
https://github.com/Threekiii/Vulhub-Reproduce
https://github.com/a1665454764/CVE-2022-46169
https://github.com/adavinchi/Wazuh_Cacti
https://github.com/ahanel13/CVE-2022-4616-POC
https://github.com/antisecc/CVE-2022-46169
https://github.com/ariyaadinatha/cacti-cve-2022-46169-exploit
https://github.com/bakery312/Vulhub-Reproduce
https://github.com/botfather0x0/CVE-2022-46169
https://github.com/copyleftdev/PricklyPwn
https://github.com/d4n-sec/d4n-sec.github.io
https://github.com/dawnl3ss/CVE-2022-46169
https://github.com/deadyP00l/CVE-2022-46169
https://github.com/devAL3X/CVE-2022-46169_poc
https://github.com/devAL3X/cacti_cve_statistics
https://github.com/devilgothies/CVE-2022-46169
https://github.com/doosec101/CVE-2022-46169
https://github.com/hab1b0x/CVE-2022-46169
https://github.com/icebreack/CVE-2022-46169
https://github.com/imjdl/CVE-2022-46169
https://github.com/k0mi-tg/CVE-POC
https://github.com/kgwanjala/oscp-cheatsheet
https://github.com/m3ssap0/cacti-rce-cve-2022-46169-vulnerable-application
https://github.com/manas3c/CVE-POC
https://github.com/miko550/CVE-2022-46169
https://github.com/mind2hex/CVE-2022-46169
https://github.com/nickczh/kikibo
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/oscpname/OSCP_cheat
https://github.com/revanmalang/OSCP
https://github.com/ruycr4ft/CVE-2022-46169
https://github.com/ruycr4ft/cacti-1.2.22-exploit
https://github.com/sAsPeCt488/CVE-2022-46169
https://github.com/sha-16/RCE-Cacti-1.2.22
https://github.com/taythebot/CVE-2022-46169
https://github.com/txuswashere/OSCP
https://github.com/whoforget/CVE-POC
https://github.com/x00tex/hackTheBox
https://github.com/xhref/OSCP
https://github.com/yassinebk/CVE-2022-46169
https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-24375", "The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.", "https://github.com/claroty/opcua-exploit-framework", "https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725"], ["2022", "CVE-2022-23987", "The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape their Form Name, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55"], ["2022", "CVE-2022-0819", "Code Injection in GitHub repository dolibarr/dolibarr prior to 15.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5"], ["2022", "CVE-2022-21882", "Win32k Elevation of Privilege Vulnerability", "https://github.com/0day404/vulnerability-poc
https://github.com/20142995/sectool
https://github.com/ARPSyndicate/cvemon
https://github.com/Al1ex/WindowsElevation
https://github.com/ArrestX/--POC
https://github.com/Ascotbe/Kernelhub
https://github.com/B0nfee/CVE-2022-21882
https://github.com/CVEDB/PoC-List
https://github.com/CVEDB/awesome-cve-repo
https://github.com/CVEDB/top
https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
https://github.com/David-Honisch/CVE-2022-21882
https://github.com/GhostTroops/TOP
https://github.com/JERRY123S/all-poc
https://github.com/KaLendsi/CVE-2022-21882
https://github.com/KayCHENvip/vulnerability-poc
https://github.com/L4ys/CVE-2022-21882
https://github.com/LegendSaber/exp_x64
https://github.com/Miraitowa70/POC-Notes
https://github.com/Mr-xn/Penetration_Testing_POC
https://github.com/NaInSec/CVE-PoC-in-GitHub
https://github.com/Ostorlab/KEV
https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
https://github.com/SYRTI/POC_to_review
https://github.com/Threekiii/Awesome-POC
https://github.com/WhooAmii/POC_to_review
https://github.com/binganao/vulns-2022
https://github.com/cyberanand1337x/bug-bounty-2022
https://github.com/d4n-sec/d4n-sec.github.io
https://github.com/dishfwk/CVE-2022-21882
https://github.com/florylsk/OSEP-Notes
https://github.com/hktalent/TOP
https://github.com/hugefiver/mystars
https://github.com/jbmihoub/all-poc
https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732
https://github.com/k0mi-tg/CVE-POC
https://github.com/lions2012/Penetration_Testing_POC
https://github.com/manas3c/CVE-POC
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/open-source-agenda/new-open-source-projects
https://github.com/r1l4-i3pur1l4/CVE-2021-1732
https://github.com/r1l4-i3pur1l4/CVE-2022-21882
https://github.com/sailay1996/cve-2022-21882-poc
https://github.com/soosmile/POC
https://github.com/taielab/awesome-hacking-lists
https://github.com/trhacknon/Pocingit
https://github.com/weeka10/-hktalent-TOP
https://github.com/whoforget/CVE-POC
https://github.com/xuetusummer/Penetration_Testing_POC
https://github.com/youwizard/CVE-POC
https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html"], ["2022", "CVE-2022-31519", "The Lukasavicus/WindMill repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-3462", "The Highlight Focus WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd"], ["2022", "CVE-2022-35110", "SWFTools commit 772e55a2 was discovered to contain a memory leak via /lib/mem.c.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Cvjark/Poc", "https://github.com/matthiaskramm/swftools/issues/184"], ["2022", "CVE-2022-24264", "Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Nguyen-Trung-Kien/CVE-1
https://github.com/oxf5/CVE
https://github.com/truonghuuphuc/CVE", "https://github.com/CuppaCMS/CuppaCMS/issues/13"], ["2022", "CVE-2022-23896", "Admidio 4.1.2 version is affected by stored cross-site scripting (XSS).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/"], ["2022", "CVE-2022-0908", "Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.", "https://github.com/ARPSyndicate/cvemon", "https://gitlab.com/libtiff/libtiff/-/issues/383"], ["2022", "CVE-2022-30976", "GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2179"], ["2022", "CVE-2022-26361", "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-47085", "An issue was discovered in ostree before 2022.7 allows attackers to cause a denial of service or other unspecified impacts via the print_panic function in repo_checkout_filter.rs.", "https://github.com/shinmao/Bug-hunting-in-Rust", "https://doc.rust-lang.org/std/macro.eprintln.html"], ["2022", "CVE-2022-45180", "An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdesk_{DOMAIN]/export endpoint. A malicious user, authenticated to the product without any specific privilege, can use the API for exporting information about all users of the system (an operation intended to only be available to the system administrator).", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-39107", "In Soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in Soundrecorder service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon
https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-32770", "A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the \"toast\" parameter which is inserted into the document with insufficient sanitization.", "https://github.com/ARPSyndicate/cvemon
https://github.com/ARPSyndicate/kenzer-templates", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538"], ["2022", "CVE-2022-25299", "This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Kirill89/Kirill89", "https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180"], ["2022", "CVE-2022-25108", "Foxit PDF Reader and Editor before 11.2.1 and PhantomPDF before 10.1.7 allow a NULL pointer dereference during PDF parsing because the pointer is used without proper validation.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-4202", "A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a patch to fix this issue. VDB-214518 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2333"], ["2022", "CVE-2022-25048", "Command injection vulnerability in CWP v0.9.8.1126 that allows normal users to run commands as the root user.", "No PoCs found on GitHub currently.", "https://github.com/Immersive-Labs-Sec/CentOS-WebPanel"], ["2022", "CVE-2022-21441", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3/IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "https://github.com/4ra1n/4ra1n
https://github.com/ARPSyndicate/cvemon
https://github.com/NorthShad0w/FINAL
https://github.com/Secxt/FINAL
https://github.com/Tim1995/FINAL
https://github.com/r00t4dm/r00t4dm
https://github.com/yycunhua/4ra1n
https://github.com/zisigui123123s/FINAL", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-39047", "Freeciv before 2.6.7 and before 3.0.3 is prone to a buffer overflow vulnerability in the Modpack Installer utility's handling of the modpack URL.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23544", "MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.0 are subject to a Server-Side Request Forgery that leads to Cross-Site Scripting. A Server-Side request forgery in `IssueProxyResourceService::getMdImageByUrl` allows an attacker to access internal resources, as well as executing JavaScript code in the context of Metersphere's origin by a victim of a reflected XSS. This vulnerability has been fixed in v2.5.0. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj"], ["2022", "CVE-2022-35050", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b04de.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md"], ["2022", "CVE-2022-0848", "OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.", "https://github.com/ARPSyndicate/cvemon
https://github.com/DharmaDoll/Search-Poc-from-CVE
https://github.com/Enes4xd/Enes4xd
https://github.com/Lay0us1/CVE-2022-0848-RCE
https://github.com/NaInSec/CVE-PoC-in-GitHub
https://github.com/SYRTI/POC_to_review
https://github.com/WhooAmii/POC_to_review
https://github.com/cr0ss2018/cr0ss2018
https://github.com/d3ltacros/d3ltacros
https://github.com/dskmehra/CVE-2022-0848
https://github.com/ezelnur6327/Enes4xd
https://github.com/ezelnur6327/enesamaafkolan
https://github.com/k0mi-tg/CVE-POC
https://github.com/logm1lo/CVE-2022-0848-RCE
https://github.com/manas3c/CVE-POC
https://github.com/nomi-sec/PoC-in-GitHub
https://github.com/soosmile/POC
https://github.com/superlink996/chunqiuyunjingbachang
https://github.com/trhacknon/Pocingit
https://github.com/whoforget/CVE-POC
https://github.com/youwizard/CVE-POC
https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html
https://huntr.dev/bounties/3e91685f-cfb9-4ee4-abaf-9b712a8fd5a6"], ["2022", "CVE-2022-40434", "Softr v2.0 was discovered to be vulnerable to HTML injection via the Name field of the Account page.", "No PoCs found on GitHub currently.", "https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254"], ["2022", "CVE-2022-37155", "RCE in SPIP 3.1.13 through 4.1.2 allows remote authenticated users to execute arbitrary code via the _oups parameter.", "No PoCs found on GitHub currently.", "https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md
https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/"], ["2022", "CVE-2022-31459", "Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth.", "https://github.com/MiracleAnameke/Cybersecurity-Vulnerability-and-Exposure-Report
https://github.com/oxMdee/Cybersecurity-Vulnerability-and-Exposure-Report", "No PoCs from references."], ["2022", "CVE-2022-1427", "Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301"], ["2022", "CVE-2022-22628", "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4160", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14
https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd"], ["2022", "CVE-2022-48199", "SoftPerfect NetWorx 7.1.1 on Windows allows an attacker to execute a malicious binary with potentially higher privileges via a low-privileged user account that abuses the Notifications function. The Notifications function allows for arbitrary binary execution and can be modified by any user. The resulting binary execution will occur in the context of any user running NetWorx. If an attacker modifies the Notifications function to execute a malicious binary, the binary will be executed by every user running NetWorx on that system.", "No PoCs found on GitHub currently.", "https://giuliamelottigaribaldi.com/cve-2022-48199/"], ["2022", "CVE-2022-1906", "The Copyright Proof WordPress plugin through 4.16 does not sanitise and escape a parameter before outputting it back via an AJAX action available to both unauthenticated and authenticated users, leading to a Reflected Cross-Site Scripting when a specific setting is enabled.", "https://github.com/ARPSyndicate/kenzer-templates
https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338"], ["2022", "CVE-2022-47076", "An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to view sensitive information via DisplayParallelLogData.aspx.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html
https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/"], ["2022", "CVE-2022-21663", "WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Afetter618/WordPress-PenTest
https://github.com/namhikelo/Symfonos1-Vulnhub-CEH", "No PoCs from references."], ["2022", "CVE-2022-45173", "An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /api/v1/vdeskintegration/challenge endpoint. Because only the client-side verifies whether a check was successful, an attacker can modify the response, and fool the application into concluding that the TOTP was correct.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-23865", "Nyron 1.0 is affected by a SQL injection vulnerability through Nyron/Library/Catalog/winlibsrch.aspx. To exploit this vulnerability, an attacker must inject '\"> on the thes1 parameter.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50674"], ["2022", "CVE-2022-37377", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor 11.1.1.53537;. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within JavaScript optimizations. The issue results from an improper optimization, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16733.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-1605", "The Email Users WordPress plugin through 4.8.8 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and change the notification settings of arbitrary users", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f"], ["2022", "CVE-2022-1594", "The HC Custom WP-Admin URL WordPress plugin through 1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, allowing them to change the login URL", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5"], ["2022", "CVE-2022-3491", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742.", "https://github.com/denis-jdsouza/wazuh-vulnerability-report-maker", "https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb"], ["2022", "CVE-2022-3640", "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37237", "An attacker can send malicious RTMP requests to make the ZLMediaKit server crash remotely. Affected version is below commit 7d8b212a3c3368bc2f6507cb74664fc419eb9327.", "No PoCs found on GitHub currently.", "https://github.com/ZLMediaKit/ZLMediaKit/issues/1839"], ["2022", "CVE-2022-21820", "NVIDIA DCGM contains a vulnerability in nvhostengine, where a network user can cause detection of error conditions without action, which may lead to limited code execution, some denial of service, escalation of privileges, and limited impacts to both data confidentiality and integrity.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html"], ["2022", "CVE-2022-26143", "The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.", "https://github.com/ARPSyndicate/cvemon
https://github.com/Ostorlab/KEV
https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
https://github.com/bigblackhat/oFx", "https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/"], ["2022", "CVE-2022-40756", "If folder security is misconfigured for Actian Zen PSQL BEFORE Patch Update 1 for Zen 15 SP1 (v15.11.005), Patch Update 4 for Zen 15 (v15.01.017), or Patch Update 5 for Zen 14 SP2 (v14.21.022), it can allow an attacker (with file read/write access) to remove specific security files in order to reset the master password and gain access to the database.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0429", "The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 8.9.6 does not sanitise the $url variable before using it in an attribute in the Activity tab in the plugins dashboard, leading to an unauthenticated stored Cross-Site Scripting vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b"], ["2022", "CVE-2022-40855", "Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping with post request 'goform/setPortMapping/'. This vulnerability allows attackers to cause a Denial of Service (DoS) or Remote Code Execution (RCE) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md"], ["2022", "CVE-2022-21723", "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html"], ["2022", "CVE-2022-23626", "m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html"], ["2022", "CVE-2022-28051", "The \"Add category\" functionality inside the \"Global Keywords\" menu in \"SeedDMS\" version 6.0.18 and 5.1.25, is prone to stored XSS which allows an attacker to inject malicious javascript code.", "https://github.com/ARPSyndicate/cvemon
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure", "https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051"], ["2022", "CVE-2022-45033", "A cross-site scripting (XSS) vulnerability in Expense Tracker 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Chat text field.", "No PoCs found on GitHub currently.", "https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload"], ["2022", "CVE-2022-4020", "Vulnerability in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices may allow an attacker with elevated privileges to modify UEFI Secure Boot settings by modifying an NVRAM variable.", "https://github.com/ARPSyndicate/cvemon
https://github.com/k0imet/pyfetch
https://github.com/river-li/awesome-uefi-security", "No PoCs from references."], ["2022", "CVE-2022-1846", "The Tiny Contact Form WordPress plugin through 0.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a"], ["2022", "CVE-2022-47027", "Timmystudios Fast Typing Keyboard v1.275.1.162 allows unauthorized apps to overwrite arbitrary files in its internal storage via a dictionary traversal vulnerability and achieve arbitrary code execution.", "No PoCs found on GitHub currently.", "https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md"], ["2022", "CVE-2022-0538", "Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.", "https://github.com/ARPSyndicate/cvemon
https://github.com/r00t4dm/r00t4dm", "No PoCs from references."], ["2022", "CVE-2022-40944", "Dairy Farm Shop Management System 1.0 is vulnerable to SQL Injection via sales-report-ds.php file.", "No PoCs found on GitHub currently.", "https://caicaizi.top/archives/9/
https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md"], ["2022", "CVE-2022-21632", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-42841", "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2. Processing a maliciously crafted package may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon
https://github.com/houjingyi233/macOS-iOS-system-security", "http://seclists.org/fulldisclosure/2022/Dec/23
http://seclists.org/fulldisclosure/2022/Dec/24
http://seclists.org/fulldisclosure/2022/Dec/25"], ["2022", "CVE-2022-1957", "The Comment License WordPress plugin before 1.4.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351"], ["2022", "CVE-2022-1654", "Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 allow any authenticated attacker, including a subscriber or customer-level attacker, to gain administrative privileges via the \"abb_uninstall_template\" (both) and \"jupiterx_core_cp_uninstall_template\" (JupiterX Core Only) AJAX actions", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3751", "SQL Injection in GitHub repository owncast/owncast prior to 0.0.13.", "https://github.com/cooliscool/Advisories", "https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9"], ["2022", "CVE-2022-24157", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetMacFilterCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the deviceList parameter.", "https://github.com/ARPSyndicate/cvemon
https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-37326", "Docker Desktop for Windows before 4.6.0 allows attackers to delete (or create) any file through the dockerBackendV2 windowscontainers/start API by controlling the pidfile field inside the DaemonJSON field in the WindowsContainerStartRequest class. This can indirectly lead to privilege escalation.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2"], ["2022", "CVE-2022-32991", "Web Based Quiz System v1.0 was discovered to contain a SQL injection vulnerability via the eid parameter at welcome.php.", "https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-24017", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the miniupnpd binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-23974", "In 0.9.3 or older versions of Apache Pinot segment upload path allowed segment directories to be imported into pinot tables. In pinot installations that allow open access to the controller a specially crafted request can potentially be exploited to cause disruption in pinot service. Pinot release 0.10.0 fixes this. See https://docs.pinot.apache.org/basics/releases/0.10.0", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26112", "In 0.10.0 or older versions of Apache Pinot, Pinot query endpoint and realtime ingestion layer has a vulnerability in unprotected environments due to a groovy function support. In order to avoid this, we disabled the groovy function support by default from Pinot release 0.11.0. See https://docs.pinot.apache.org/basics/releases/0.11.0", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1714", "Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0"], ["2022", "CVE-2022-3912", "The User Registration WordPress plugin before 2.2.4.1 does not properly restrict the files to be uploaded via an AJAX action available to both unauthenticated and authenticated users, which could allow unauthenticated users to upload PHP files for example.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74"], ["2022", "CVE-2022-22989", "My Cloud OS 5 was vulnerable to a pre-authenticated stack overflow vulnerability on the FTP service that could be exploited by unauthenticated attackers on the network. Addressed the vulnerability by adding defenses against stack overflow issues.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-1817", "A vulnerability, which was classified as problematic, was found in Badminton Center Management System. This affects the userlist module at /bcms/admin/?page=user/list. The manipulation of the argument username with the input 
1 leads to an authenticated cross site scripting. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md https://vuldb.com/?id.200559"], ["2022", "CVE-2022-0478", "The Event Manager and Tickets Selling for WooCommerce WordPress plugin before 3.5.8 does not validate and escape the post_author_gutenberg parameter before using it in a SQL statement when creating/editing events, which could allow users with a role as low as contributor to perform SQL Injection attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f"], ["2022", "CVE-2022-32503", "An issue was discovered on certain Nuki Home Solutions devices. An attacker with physical access to this JTAG port may be able to connect to the device and bypass both hardware and software security protections. This affects Nuki Keypad before 1.9.2 and Nuki Fob before 1.8.1.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/"], ["2022", "CVE-2022-42901", "Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds and stack overflow issues when opening crafted XMT files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-45062", "In Xfce xfce4-settings before 4.16.4 and 4.17.x before 4.17.1, there is an argument injection vulnerability in xfce4-mime-helper.", "No PoCs found on GitHub currently.", "https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390"], ["2022", "CVE-2022-28000", "Car Rental System v1.0 was discovered to contain a SQL injection vulnerability at /Car_Rental/booking.php via the id parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md"], ["2022", "CVE-2022-28391", "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.", "https://github.com/ARPSyndicate/cvemon https://github.com/KazKobara/dockerfile_fswiki_local https://github.com/grggls/crypto-devops-test https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21475", "Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data as well as unauthorized read access to a subset of Oracle Banking Payments accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Payments. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-30490", "Badminton Center Management System V1.0 is vulnerable to SQL Injection via parameter 'id' in /bcms/admin/court_rentals/update_status.php.", "No PoCs found on GitHub currently.", "https://github.com/yasinyildiz26/Badminton-Center-Management-System"], ["2022", "CVE-2022-39073", "There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/v0lp3/CVE-2022-39073 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-3984", "The Flowplayer Video Player WordPress plugin before 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa"], ["2022", "CVE-2022-20719", "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj"], ["2022", "CVE-2022-1782", "Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/7555693f-94e4-4183-98cb-3497da6df028"], ["2022", "CVE-2022-3516", "Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748"], ["2022", "CVE-2022-32907", "This issue was addressed with improved checks. This issue is fixed in tvOS 16, iOS 16, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html"], ["2022", "CVE-2022-35064", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x4adcdb in __asan_memset.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md"], ["2022", "CVE-2022-26184", "Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.", "No PoCs found on GitHub currently.", "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/"], ["2022", "CVE-2022-37161", "Claroline 13.5.7 and prior is vulnerable to Cross Site Scripting (XSS) via SVG file upload.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/matthieu-hackwitharts/claroline-CVEs", "https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md"], ["2022", "CVE-2022-32847", "This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. A remote user may be able to cause unexpected system termination or corrupt kernel memory.", "https://github.com/ARPSyndicate/cvemon https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-2839", "The Zephyr Project Manager WordPress plugin before 3.2.55 does not have any authorisation as well as CSRF in all its AJAX actions, allowing unauthenticated users to call them either directly or via CSRF attacks. Furthermore, due to the lack of sanitisation and escaping, it could also allow them to perform Stored Cross-Site Scripting attacks against logged in admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9"], ["2022", "CVE-2022-20659", "A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", "https://github.com/ARPSyndicate/cvemon", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW"], ["2022", "CVE-2022-1553", "Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b398e4c9-6cdf-4973-ad86-da796cde221f"], ["2022", "CVE-2022-3456", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce"], ["2022", "CVE-2022-44149", "The web service on Nexxt Amp300 ARN02304U8 42.103.1.5095 and 80.103.2.5045 devices allows remote OS command execution by placing &telnetd in the JSON host field to the ping feature of the goform/sysTools component. Authentication is required", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/yerodin/CVE-2022-44149 https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html"], ["2022", "CVE-2022-4236", "The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635"], ["2022", "CVE-2022-21535", "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: General/Core Client). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Shell. CVSS 3.1 Base Score 2.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-45225", "Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the book_title parameter.", "No PoCs found on GitHub currently.", "https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e"], ["2022", "CVE-2022-27128", "An incorrect access control issue at /admin/run_ajax.php in zbzcms v1.0 allows attackers to arbitrarily add administrator accounts.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-21424", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). The supported version that is affected is 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with network access via TCP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Communications Billing and Revenue Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Communications Billing and Revenue Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-28356", "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.", "No PoCs found on GitHub currently.", "http://www.openwall.com/lists/oss-security/2022/04/06/1 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1"], ["2022", "CVE-2022-23521", "Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.", "https://github.com/9069332997/session-1-full-stack https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/juhp/rpmostree-update https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sondermc/git-cveissues https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-32655", "In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705028; Issue ID: GN20220705028.", "https://github.com/efchatz/WPAxFuzz", "No PoCs from references."], ["2022", "CVE-2022-35035", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b559f.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md"], ["2022", "CVE-2022-2928", "In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26244", "A stored cross-site scripting (XSS) vulnerability in Hospital Patient Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the \"special\" field.", "https://github.com/ARPSyndicate/cvemon https://github.com/tuando243/tuando243", "https://github.com/kishan0725/Hospital-Management-System/issues/23"], ["2022", "CVE-2022-37130", "In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-1442", "The Metform WordPress plugin is vulnerable to sensitive information disclosure due to improper access control in the ~/core/forms/action.php file which can be exploited by an unauthenticated attacker to view all API keys and secrets of integrated third-party APIs like that of PayPal, Stripe, Mailchimp, Hubspot, HelpScout, reCAPTCHA and many more, in versions up to and including 2.1.3.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/kenzer-templates https://github.com/RandomRobbieBF/CVE-2022-1442 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soxoj/information-disclosure-writeups-and-pocs", "https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf"], ["2022", "CVE-2022-3547", "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /csms/admin/?page=system_info of the component Setting Handler. The manipulation of the argument System Name/System Short Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-211047.", "No PoCs found on GitHub currently.", "https://github.com/lakshaya0557/POCs/blob/main/POC"], ["2022", "CVE-2022-44118", "dedecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php.", "https://github.com/Athishpranav2003/CVE-2022-44118-Exploit https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b"], ["2022", "CVE-2022-32816", "The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI spoofing.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023 https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-24190", "The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can send a request to bind their account to any users picture frame, then send a POST request to accept their own bind request, without the end-users approval or interaction.", "No PoCs found on GitHub currently.", "https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html"], ["2022", "CVE-2022-30913", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the ipqos_set_bandwidth parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/7"], ["2022", "CVE-2022-37070", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19"], ["2022", "CVE-2022-26095", "Null pointer dereference vulnerability in parser_colr function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-21564", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/NorthShad0w/FINAL https://github.com/Secxt/FINAL https://github.com/Tim1995/FINAL https://github.com/yycunhua/4ra1n https://github.com/zisigui123123s/FINAL", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-40983", "An integer overflow vulnerability exists in the QML QtScript Reflect API of Qt Project Qt 6.3.2. A specially-crafted javascript code can trigger an integer overflow during memory allocation, which can lead to arbitrary code execution. Target application would need to access a malicious web page to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617"], ["2022", "CVE-2022-28187", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where the memory management software does not release a resource after its effective lifetime has ended, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-28216", "SAP BusinessObjects Business Intelligence Platform (BI Workspace) - version 420, is susceptible to a Cross-Site Scripting attack by an unauthenticated attacker due to improper sanitization of the user inputs on the network. On successful exploitation, an attacker can access certain reports causing a limited impact on confidentiality of the application data.", "https://github.com/karimhabush/cyberowl", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-23461", "Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/"], ["2022", "CVE-2022-4267", "The Bulk Delete Users by Email WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585"], ["2022", "CVE-2022-1990", "The Nested Pages WordPress plugin before 3.1.21 does not escape and sanitize the some of its settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870"], ["2022", "CVE-2022-1720", "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 http://seclists.org/fulldisclosure/2022/Oct/45 https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8"], ["2022", "CVE-2022-29358", "epub2txt2 v2.04 was discovered to contain an integer overflow via the function bug in _parse_special_tag at sxmlc.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XML file.", "No PoCs found on GitHub currently.", "https://github.com/kevinboone/epub2txt2/issues/22"], ["2022", "CVE-2022-23940", "SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/crac-learning/CVE-analysis-reports https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/manuelz120/CVE-2022-23940 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/manuelz120"], ["2022", "CVE-2022-24023", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the pppd binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-2549", "NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537"], ["2022", "CVE-2022-4045", "A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-3926", "The WP OAuth Server (OAuth Authentication) WordPress plugin before 3.4.2 does not have CSRF check when regenerating secrets, which could allow attackers to make logged in admins regenerate the secret of an arbitrary client given they know the client ID", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336"], ["2022", "CVE-2022-1823", "Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file.", "https://github.com/ARPSyndicate/cvemon https://github.com/nasbench/nasbench", "No PoCs from references."], ["2022", "CVE-2022-4294", "Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.", "No PoCs found on GitHub currently.", "https://support.norton.com/sp/static/external/tools/security-advisories.html"], ["2022", "CVE-2022-4105", "A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8"], ["2022", "CVE-2022-47382", "An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-21597", "Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaScript). Supported versions that are affected are Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM Enterprise Edition accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21606", "Vulnerability in the Oracle Services for Microsoft Transaction Server component of Oracle Database Server. The supported version that is affected is 19c. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Services for Microsoft Transaction Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Services for Microsoft Transaction Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Services for Microsoft Transaction Server accessible data as well as unauthorized read access to a subset of Oracle Services for Microsoft Transaction Server accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-2409", "The Rough Chart WordPress plugin through 1.0.0 does not properly escape chart data label, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea"], ["2022", "CVE-2022-45287", "An access control issue in Registration.aspx of Temenos CWX 8.5.6 allows authenticated attackers to escalate privileges and perform arbitrary Administrative commands.", "https://github.com/WhiteBearVN/CWX-Registration-Broken-Access-Control", "No PoCs from references."], ["2022", "CVE-2022-2798", "The Affiliates Manager WordPress plugin before 2.9.14 does not validate and sanitise the affiliate data, which could allow users registering as affiliate to perform CSV injection attacks against an admin exporting the data", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd"], ["2022", "CVE-2022-24163", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the timeZone parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-37312", "OX App Suite through 7.10.6 has Uncontrolled Resource Consumption via a large request body containing a redirect URL to the deferrer servlet.", "https://github.com/ARPSyndicate/cvemon", "https://seclists.org/fulldisclosure/2022/Nov/18"], ["2022", "CVE-2022-37083", "TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the ip parameter at the function setDiagnosisCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1"], ["2022", "CVE-2022-3765", "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d"], ["2022", "CVE-2022-35097", "SWFTools commit 772e55a2 was discovered to contain a segmentation violation via FoFiTrueType::writeTTF at /xpdf/FoFiTrueType.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md"], ["2022", "CVE-2022-23911", "The Testimonial WordPress Plugin WordPress plugin before 1.4.7 does not validate and escape the id parameter before using it in a SQL statement when retrieving a testimonial to edit, leading to a SQL Injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9"], ["2022", "CVE-2022-37203", "JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/AgainstTheLight/CVE-2022-37203 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md"], ["2022", "CVE-2022-1771", "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb"], ["2022", "CVE-2022-43999", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to exposed CORBA management services, arbitrary system commands can be executed on the server.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-4385", "The Intuitive Custom Post Order WordPress plugin before 3.1.4 does not check for authorization in the update-menu-order ajax action, allowing any logged in user (with roles as low as Subscriber) to update the menu order", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c"], ["2022", "CVE-2022-3977", "A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89"], ["2022", "CVE-2022-4014", "A vulnerability, which was classified as problematic, has been found in FeehiCMS. Affected by this issue is some unknown functionality of the component Post My Comment Tab. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The identifier of this vulnerability is VDB-213788.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.213788"], ["2022", "CVE-2022-1872", "Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf https://github.com/zhchbin/zhchbin", "No PoCs from references."], ["2022", "CVE-2022-40861", "Tenda AC18 router V15.03.05.19 contains a stack overflow vulnerability in the formSetQosBand->FUN_0007db78 function with the request /goform/SetNetControlList/", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md"], ["2022", "CVE-2022-47102", "A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-47102 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/sudoninja-noob/CVE-2022-47102/blob/main/CVE-2022-47102"], ["2022", "CVE-2022-21486", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-39080", "In messaging service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-42964", "An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the GaussianInput.from_string method", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/"], ["2022", "CVE-2022-39251", "Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42824", "A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-4154", "The Contest Gallery Pro WordPress plugin before 19.1.5 does not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with at administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5 https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a"], ["2022", "CVE-2022-3837", "The Uji Countdown WordPress plugin before 2.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c"], ["2022", "CVE-2022-1932", "The Rezgo Online Booking WordPress plugin before 4.1.8 does not sanitise and escape some parameters before outputting them back in a page, leading to a Reflected Cross-Site Scripting, which can be exploited either via a LFI in an AJAX action, or direct call to the affected file", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093"], ["2022", "CVE-2022-1631", "Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim\u2019s Email. This allows an attacker to gain pre-authentication to the victim\u2019s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker\u2019s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee\u2019s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee\u2019s account.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html https://huntr.dev/bounties/5494e258-5c7b-44b4-b443-85cff7ae0ba4"], ["2022", "CVE-2022-21954", "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-40622", "The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.", "No PoCs found on GitHub currently.", "https://youtu.be/cSileV8YbsQ?t=655"], ["2022", "CVE-2022-3725", "Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file", "No PoCs found on GitHub currently.", "https://gitlab.com/wireshark/wireshark/-/issues/18378"], ["2022", "CVE-2022-1620", "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51"], ["2022", "CVE-2022-26026", "A denial of service vulnerability exists in the OAS Engine SecureConfigValues functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted network request can lead to loss of communications. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491"], ["2022", "CVE-2022-24123", "MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload.", "https://github.com/ARPSyndicate/cvemon https://github.com/wuhan005/wuhan005", "No PoCs from references."], ["2022", "CVE-2022-2449", "The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 does not perform CSRF checks for any of its AJAX actions, allowing an attackers to trick logged in users to perform various actions on their behalf on the site.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537"], ["2022", "CVE-2022-1923", "DOS / potential heap overwrite in mkv demuxing using bzip decompression. Integer overflow in matroskademux element in bzip decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.", "No PoCs found on GitHub currently.", "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225"], ["2022", "CVE-2022-4145", "A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-1863", "Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-4394", "The iPages Flipbook For WordPress plugin through 1.4.6 does not sanitise and escape some of its settings, which could allow users such as contributor+ to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c"], ["2022", "CVE-2022-4005", "The Donation Button WordPress plugin through 4.0.0 does not sanitize and escapes some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c"], ["2022", "CVE-2022-39091", "In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2509", "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.", "https://github.com/ARPSyndicate/cvemon https://github.com/GitHubForSnap/ssmtp-gael https://github.com/chair6/test-go-container-images https://github.com/finnigja/test-go-container-images https://github.com/maxim12z/ECommerce https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-2698", "A vulnerability was found in SourceCodester Simple E-Learning System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument searchPost leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205819.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205819"], ["2022", "CVE-2022-21497", "Vulnerability in the Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Services Manager. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Web Services Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Web Services Manager accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-30472", "Tenda AC Seris Router AC18_V15.03.05.19(6318) has a stack-based buffer overflow vulnerability in function fromAddressNat", "https://github.com/ARPSyndicate/cvemon https://github.com/lcyfrank/VulnRepo", "https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1"], ["2022", "CVE-2022-37183", "Piwigo 12.3.0 is vulnerable to Cross Site Scripting (XSS) via /search/1940/created-monthly-list.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0"], ["2022", "CVE-2022-23900", "A command injection vulnerability in the API of the Wavlink WL-WN531P3 router, version M31G3.V5030.201204, allows an attacker to achieve unauthorized remote code execution via a malicious POST request through /cgi-bin/adm.cgi.", "https://github.com/ARPSyndicate/cvemon", "https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df"], ["2022", "CVE-2022-35086", "SWFTools commit 772e55a2 was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md"], ["2022", "CVE-2022-3665", "A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/794"], ["2022", "CVE-2022-1760", "The Core Control WordPress plugin through 1.2.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/"], ["2022", "CVE-2022-37092", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/5"], ["2022", "CVE-2022-26077", "A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490"], ["2022", "CVE-2022-35206", "Null pointer dereference vulnerability in Binutils readelf 2.38.50 via function read_and_display_attr_value in file dwarf.c.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29290"], ["2022", "CVE-2022-24172", "Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddDhcpBindRule. This vulnerability allows attackers to cause a Denial of Service (DoS) via the addDhcpRules parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-3774", "A vulnerability was found in SourceCodester Train Scheduler App 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /train_scheduler_app/?action=delete. The manipulation of the argument id leads to improper control of resource identifiers. The attack may be launched remotely. The identifier of this vulnerability is VDB-212504.", "https://github.com/r0x5r/poc https://github.com/r0x5r/r0x5r https://github.com/rohit0x5/rohit0x5", "http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html https://github.com/rohit0x5/poc/blob/main/idor https://vuldb.com/?id.212504"], ["2022", "CVE-2022-1671", "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff8376ade4f668130385839cef586a0990f8ef87"], ["2022", "CVE-2022-1972", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bcoles/kasld https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/randorisec/CVE-2022-1972-infoleak-PoC https://github.com/ssr-111/linux-kernel-exploitation https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4285", "An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.", "https://github.com/fokypoky/places-list", "https://sourceware.org/bugzilla/show_bug.cgi?id=29699"], ["2022", "CVE-2022-3877", "A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected is an unknown function of the component URL Field Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216246 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"], ["2022", "CVE-2022-4114", "The Superio WordPress theme does not sanitise and escape some parameters, which could allow users with a role as low as a subscriber to perform Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd"], ["2022", "CVE-2022-23483", "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade.", "https://github.com/ARPSyndicate/cvemon https://github.com/bacon-tomato-spaghetti/XRDP-LPE https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-23712", "A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request.", "No PoCs found on GitHub currently.", "https://www.elastic.co/community/security/"], ["2022", "CVE-2022-2418", "A vulnerability was found in URVE Web Manager. It has been classified as critical. This affects an unknown part of the file kreator.html5/img_upload.php. The manipulation leads to unrestricted upload. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20img_upload.php%20File%20upload%20vulnerability.md"], ["2022", "CVE-2022-42864", "A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/Muirey03/CVE-2022-42864 https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25 http://seclists.org/fulldisclosure/2022/Dec/26 http://seclists.org/fulldisclosure/2022/Dec/27"], ["2022", "CVE-2022-47393", "An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-47002", "A vulnerability in the Remember Me function of Masa CMS v7.2, 7.3, and 7.4-beta allows attackers to bypass authentication via a crafted web request.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30563", "When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/Asoh42/2022hw-vuln", "No PoCs from references."], ["2022", "CVE-2022-21586", "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21617", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-45047", "Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.", "https://github.com/ARPSyndicate/cvemon https://github.com/Whoopsunix/PPPVULNS https://github.com/hktalent/CVE-2022-45047 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-2558", "The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f"], ["2022", "CVE-2022-28025", "Student Grading System v1.0 was discovered to contain a SQL injection vulnerability via /student-grading-system/rms.php?page=school_year.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md"], ["2022", "CVE-2022-1832", "The CaPa Protect WordPress plugin through 0.5.8.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and disable the applied protection.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275"], ["2022", "CVE-2022-3937", "The Easy Video Player WordPress plugin before 1.2.2.3 does not sanitize and escapes some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af"], ["2022", "CVE-2022-3634", "The Contact Form 7 Database Addon WordPress plugin before 1.2.6.5 does not validate data when output it back in a CSV file, which could lead to CSV injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10"], ["2022", "CVE-2022-29349", "kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/kekingcn/kkFileView/issues/347"], ["2022", "CVE-2022-1731", "Metasonic Doc WebClient 7.0.14.0 / 7.0.12.0 / 7.0.3.0 is vulnerable to a SQL injection attack in the username field. SSO or System authentication are required to be enabled for vulnerable conditions to exist.", "https://github.com/JoshuaMart/JoshuaMart", "https://www.tenable.com/security/research/tra-2022-17"], ["2022", "CVE-2022-24032", "Adenza AxiomSL ControllerView through 10.8.1 is vulnerable to user enumeration. An attacker can identify valid usernames on the platform because a failed login attempt produces a different error message when the username is valid.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC", "No PoCs from references."], ["2022", "CVE-2022-28196", "NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot blob_decompress function, where insufficient validation of untrusted data may allow a local attacker with elevated privileges to cause a memory buffer overflow, which may lead to code execution, limited loss of Integrity, and limited denial of service. The scope of impact can extend to other components.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5343"], ["2022", "CVE-2022-39173", "In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes a previous TLS session. During the resumption Client Hello a Hello Retry Request must be triggered. Both Client Hellos are required to contain a list of duplicate cipher suites to trigger the buffer overflow. In total, two Client Hellos have to be sent: one in the resumed session, and a second one as a response to a Hello Retry Request message.", "https://github.com/ARPSyndicate/cvemon https://github.com/trailofbits/publications https://github.com/wolfSSL/wolfssl", "http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/"], ["2022", "CVE-2022-21575", "Vulnerability in the Oracle WebCenter Sites Support Tools product of Oracle Fusion Middleware (component: User Interface). The supported version that is affected is Prior to 4.4.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites Support Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites Support Tools accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites Support Tools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites Support Tools. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-40992", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no firmwall domain WORD description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-4276", "A vulnerability was found in House Rental System and classified as critical. Affected by this issue is some unknown functionality of the file tenant-engine.php of the component POST Request Handler. The manipulation of the argument id_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214772.", "No PoCs found on GitHub currently.", "https://github.com/nikeshtiwari1/House-Rental-System/issues/8 https://vuldb.com/?id.214772"], ["2022", "CVE-2022-43769", "Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html"], ["2022", "CVE-2022-44109", "pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int).", "No PoCs found on GitHub currently.", "https://github.com/ldenoue/pdftojson/issues/4"], ["2022", "CVE-2022-3416", "The WPtouch WordPress plugin before 4.3.45 does not properly validate images to be uploaded, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6"], ["2022", "CVE-2022-44298", "SiteServer CMS 7.1.3 is vulnerable to SQL Injection.", "No PoCs found on GitHub currently.", "https://github.com/siteserver/cms/issues/3492"], ["2022", "CVE-2022-1682", "Reflected Xss using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.07. Xss can use to steal user's cookies which lead to Account takeover or do any malicious activity in victim's browser", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e962d191-93e2-405e-a6af-b4a4e4d02527"], ["2022", "CVE-2022-40691", "An information disclosure vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621"], ["2022", "CVE-2022-26315", "qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.", "No PoCs found on GitHub currently.", "https://github.com/claudiodangelis/qrcp/issues/223"], ["2022", "CVE-2022-37061", "All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/h00die-gr3y/Metasploit", "http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php"], ["2022", "CVE-2022-24181", "Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 >= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/comrade99/CVE-2022-24181 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-35164", "LibreDWG v0.12.4.4608 & commit f2dea29 was discovered to contain a heap use-after-free via bit_copy_chain.", "No PoCs found on GitHub currently.", "https://github.com/LibreDWG/libredwg/issues/497"], ["2022", "CVE-2022-2879", "Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrKsey/AdGuardHome https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-40440", "mxGraph v4.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the setTooltips() function.", "No PoCs found on GitHub currently.", "https://github.com/SxB64/mxgraph-xss-vul/wiki"], ["2022", "CVE-2022-26255", "Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.", "No PoCs found on GitHub currently.", "https://github.com/Fndroid/clash_for_windows_pkg/issues/2710"], ["2022", "CVE-2022-35024", "OTFCC commit 617837b was discovered to contain a segmentation violation via /multiarch/memmove-vec-unaligned-erms.S.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md"], ["2022", "CVE-2022-32947", "The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/asahilina/agx-exploit https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-44049", "The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0.", "https://github.com/d0r4-hackers/dora-hacking", "No PoCs from references."], ["2022", "CVE-2022-20759", "A vulnerability in the web services interface for remote access VPN features of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, but unprivileged, remote attacker to elevate privileges to level 15. This vulnerability is due to improper separation of authentication and authorization scopes. An attacker could exploit this vulnerability by sending crafted HTTPS messages to the web services interface of an affected device. A successful exploit could allow the attacker to gain privilege level 15 access to the web management interface of the device. This includes privilege level 15 access to the device using management tools like the Cisco Adaptive Security Device Manager (ASDM) or the Cisco Security Manager (CSM). Note: With Cisco FTD Software, the impact is lower than the CVSS score suggests because the affected web management interface allows for read access only.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24"], ["2022", "CVE-2022-27139", "** DISPUTED ** An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file. NOTE: Vendor states that as outlined in Ghost's security documentation, upload of SVGs is only possible by trusted authenticated users. The uploading of SVG files to Ghost does not represent a remote code execution vulnerability. SVGs are not executable on the server, and may only execute javascript in a client's browser - this is expected and intentional functionality.", "No PoCs found on GitHub currently.", "http://ghost.org/docs/security/#privilege-escalation-attacks"], ["2022", "CVE-2022-28347", "A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.", "https://github.com/ARPSyndicate/cvemon https://github.com/Shenkongyin/CUC-2023 https://github.com/SurfRid3r/Django_vulnerability_analysis https://github.com/kudoas/sql-injection-sandbox", "No PoCs from references."], ["2022", "CVE-2022-23530", "GuardDog is a CLI tool to identify malicious PyPI packages. Versions prior to v0.1.8 are vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package. Extracting files using shutil.unpack_archive() from a potentially malicious tarball without validating that the destination file path is within the intended destination directory can cause files outside the destination directory to be overwritten. This issue is patched in version 0.1.8. Potential workarounds include using a safer module, like zipfile, and validating the location of the extracted files and discarding those with malicious paths.", "https://github.com/ARPSyndicate/cvemon https://github.com/Sim4n6/Sim4n6", "https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v"], ["2022", "CVE-2022-21435", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-21524", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via SMB to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris as well as unauthorized update, insert or delete access to some of Oracle Solaris accessible data and unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-37030", "Weak permissions on the configuration file in the PAM module in Grommunio Gromox 0.5 through 1.x before 1.28 allow a local unprivileged user in the gromox group to have the PAM stack execute arbitrary code upon loading the Gromox PAM module.", "No PoCs found on GitHub currently.", "http://www.openwall.com/lists/oss-security/2022/08/04/1 https://bugzilla.suse.com/show_bug.cgi?id=1201949"], ["2022", "CVE-2022-35135", "Boodskap IoT Platform v4.4.9-02 allows attackers to escalate privileges via a crafted request sent to /api/user/upsert/.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html"], ["2022", "CVE-2022-44158", "Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function via set_device_name.", "No PoCs found on GitHub currently.", "https://drive.google.com/file/d/11PSsUpLmLCl0-eO565TLbVavzfP5aWdG/view?usp=sharing"], ["2022", "CVE-2022-1542", "The HPB Dashboard WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359"], ["2022", "CVE-2022-20708", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-1793", "The Private Files WordPress plugin through 0.40 is missing CSRF check when disabling the protection, which could allow attackers to make a logged in admin perform such action via a CSRF attack and make the blog public", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c"], ["2022", "CVE-2022-30710", "Improper validation vulnerability in RemoteViews prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-21464", "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Business Logic Infra SEC). The supported version that is affected is Prior to 9.2.6.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools and unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-1806", "Cross-site Scripting (XSS) - Reflected in GitHub repository rtxteam/rtx prior to checkpoint_2022-05-18.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/101a2a31-0b27-433a-ad3a-a216238ca4d1"], ["2022", "CVE-2022-4060", "The User Post Gallery WordPress plugin through 2.19 does not limit what callback functions can be called by users, making it possible to any visitors to run code on sites running it.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs https://github.com/devmehedi101/wordpress-exploit https://github.com/im-hanzou/UPGer https://github.com/nomi-sec/PoC-in-GitHub https://github.com/securi3ytalent/wordpress-exploit", "https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e"], ["2022", "CVE-2022-48308", "It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md"], ["2022", "CVE-2022-22998", "Implemented protections on AWS credentials that were not properly protected.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107"], ["2022", "CVE-2022-28011", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\schedule_delete.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-30786", "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate in NTFS-3G through 2021.8.22.", "No PoCs found on GitHub currently.", "https://github.com/tuxera/ntfs-3g/releases"], ["2022", "CVE-2022-21860", "Windows AppContracts API Server Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40716", "HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2.\"", "https://github.com/tdunlap607/docker_vs_cg", "No PoCs from references."], ["2022", "CVE-2022-24006", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the arpbrocast binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-3600", "The Easy Digital Downloads WordPress plugin before 3.1.0.2 does not validate data when its output in a CSV file, which could lead to CSV injection.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0"], ["2022", "CVE-2022-3591", "Use After Free in GitHub repository vim/vim prior to 9.0.0789.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921"], ["2022", "CVE-2022-1705", "Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-1645", "The Amazon Link WordPress plugin through 3.2.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2"], ["2022", "CVE-2022-37337", "A command execution vulnerability exists in the access control functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187 https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596"], ["2022", "CVE-2022-26043", "An external config control vulnerability exists in the OAS Engine SecureAddSecurity functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of a custom Security Group. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489"], ["2022", "CVE-2022-23825", "Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24146", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetQosBand. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-42850", "The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 and iPadOS 16.2. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/h26forge/h26forge", "http://seclists.org/fulldisclosure/2022/Dec/20"], ["2022", "CVE-2022-39225", "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 4.10.15, or 5.0.0 and above prior to 5.2.6, a user can write to the session object of another user if the session object ID is known. For example, an attacker can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object. Note that assigning a session to another user does not usually change the privileges of either of the two users, and a user cannot assign their own session to another user. This issue is patched in version 4.10.15 and above, and 5.2.6 and above. To mitigate this issue in unpatched versions add a `beforeSave` trigger to the `_Session` class and prevent writing if the requesting user is different from the user in the session object.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-47036", "Siklu TG Terragraph devices before approximately 2.1.1 have a hardcoded root password that has been revealed via a brute force attack on an MD5 hash. It can be used for \"debug login\" by an admin. NOTE: the vulnerability is not fixed by the 2.1.1 firmware; instead, it is fixed in newer hardware, which would typically be used with firmware 2.1.1 or later.", "https://github.com/NaInSec/CVE-LIST https://github.com/fkie-cad/nvd-json-data-feeds", "https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html"], ["2022", "CVE-2022-0529", "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/ByteHackr/unzip_poc https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanaao/unzip_poc https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://bugzilla.redhat.com/show_bug.cgi?id=2051402 https://github.com/ByteHackr/unzip_poc"], ["2022", "CVE-2022-40955", "In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. Users are advised to upgrade to Apache InLong 1.3.0 or newer.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-30557", "Foxit PDF Reader and PDF Editor before 11.2.2 have a Type Confusion issue that causes a crash because of Unsigned32 mishandling during JavaScript execution.", "https://github.com/dlehgus1023/dlehgus1023", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-21623", "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Application Config Console). Supported versions that are affected are 13.4.0.0 and 13.5.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-1946", "The Gallery WordPress plugin before 2.0.0 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940"], ["2022", "CVE-2022-4120", "The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf"], ["2022", "CVE-2022-32543", "An integer overflow vulnerability exists in the way ESTsoft Alyac 2.5.8.544 parses OLE files. A specially-crafted OLE file can lead to a heap buffer overflow which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527"], ["2022", "CVE-2022-40844", "In Tenda (Shenzhen Tenda Technology Co., Ltd) AC1200 Router model W15Ev2 V15.11.0.10(1576), a Stored Cross Site Scripting (XSS) issue exists allowing an attacker to execute JavaScript code via the applications website filtering tab, specifically the URL body.", "No PoCs found on GitHub currently.", "https://boschko.ca/tenda_ac1200_router/"], ["2022", "CVE-2022-1857", "Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-1754", "Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2f65af7c-a74b-46a6-8847-5db6785f1cf2"], ["2022", "CVE-2022-21831", "A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40747", "\"IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 236584.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21971", "Windows Runtime Remote Code Execution Vulnerability", "https://github.com/0vercl0k/CVE-2022-21971 https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/GhostTroops/TOP https://github.com/HACK-THE-WORLD/DailyMorningReading https://github.com/J0hnbX/2022-21971 https://github.com/JERRY123S/all-poc https://github.com/Malwareman007/CVE-2022-21971 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-21971 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/hktalent/TOP https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/tanjiti/sec_profile https://github.com/trhacknon/Pocingit https://github.com/tufanturhan/CVE-2022-21971-Windows-Runtime-RCE https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-42493", "Several OS command injection vulnerabilities exist in the m2m binary of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is reachable through the m2m's DOWNLOAD_INFO command.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640"], ["2022", "CVE-2022-35263", "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_file/` API.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575"], ["2022", "CVE-2022-38118", "OAKlouds Portal website\u2019s Meeting Room has insufficient validation for user input. A remote attacker with general user privilege can perform SQL-injection to access, modify, delete database, perform system operations and disrupt service.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1614", "The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based anti-spamming restrictions.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1"], ["2022", "CVE-2022-1585", "The Project Source Code Download WordPress plugin through 1.0.0 does not protect its backup generation and download functionalities, which may allow any visitors on the site to download the entire site, including sensitive files like wp-config.php.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f"], ["2022", "CVE-2022-3812", "A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212678 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip https://github.com/axiomatic-systems/Bento4/issues/792"], ["2022", "CVE-2022-32403", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/manage_record.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32403.md"], ["2022", "CVE-2022-39274", "LoRaMac-node is a reference implementation and documentation of a LoRa network node. Versions of LoRaMac-node prior to 4.7.0 are vulnerable to a buffer overflow. Improper size validation of the incoming radio frames can lead to an 65280-byte out-of-bounds write. The function `ProcessRadioRxDone` implicitly expects incoming radio frames to have at least a payload of one byte or more. An empty payload leads to a 1-byte out-of-bounds read of user controlled content when the payload buffer is reused. This allows an attacker to craft a FRAME_TYPE_PROPRIETARY frame with size -1 which results in an 65280-byte out-of-bounds memcopy likely with partially controlled attacker data. Corrupting a large part if the data section is likely to cause a DoS. If the large out-of-bounds write does not immediately crash the attacker may gain control over the execution due to now controlling large parts of the data section. Users are advised to upgrade either by updating their package or by manually applying the patch commit `e851b079`.", "https://github.com/fuzzware-fuzzer/hoedur https://github.com/fuzzware-fuzzer/hoedur-experiments", "No PoCs from references."], ["2022", "CVE-2022-28291", "Insufficiently Protected Credentials: An authenticated user with debug privileges can retrieve stored Nessus policy credentials from the \u201cnessusd\u201d process in cleartext via process dumping. The affected products are all versions of Nessus Essentials and Professional. The vulnerability allows an attacker to access credentials stored in Nessus scanners, potentially compromising its customers\u2019 network of assets.", "No PoCs found on GitHub currently.", "https://cybersecurityworks.com/blog/zero-days/csw-expert-discovers-a-zero-day-vulnerability-in-tenables-nessus-scanner.html"], ["2022", "CVE-2022-42801", "A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1. An app may be able to execute arbitrary code with kernel privileges.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html"], ["2022", "CVE-2022-0578", "Code Injection in GitHub repository publify/publify prior to 9.2.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/02c81928-eb47-476f-8000-e93dc796dbcc"], ["2022", "CVE-2022-35041", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b558f.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35041.md"], ["2022", "CVE-2022-22639", "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. An application may be able to gain elevated privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/jhftss/CVE-2022-22639 https://github.com/jhftss/POC https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1436", "The WPCargo Track & Trace WordPress plugin before 6.9.5 does not sanitise and escape the wpcargo_tracking_number parameter before outputting it back in the page, which could allow attackers to perform reflected Cross-Site Scripting attacks.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3"], ["2022", "CVE-2022-23555", "authentik is an open-source Identity Provider focused on flexibility and versatility. Versions prior to 2022.11.4 and 2022.10.4 are vulnerable to Improper Authentication. Token reuse in invitation URLs leads to access control bypass via the use of a different enrollment flow than in the one provided. The vulnerability allows an attacker that knows different invitation flows names (e.g. `enrollment-invitation-test` and `enrollment-invitation-admin`) via either different invite links or via brute forcing to signup via a single invitation url for any valid invite link received (it can even be a url for a third flow as long as it's a valid invite) as the token used in the `Invitations` section of the Admin interface does NOT change when a different `enrollment flow` is selected via the interface and it is NOT bound to the selected flow, so it will be valid for any flow when used. This issue is patched in authentik 2022.11.4,2022.10.4 and 2022.12.0. Only configurations that use invitations and have multiple enrollment flows with invitation stages that grant different permissions are affected. The default configuration is not vulnerable, and neither are configurations with a single enrollment flow. As a workaround, fixed data can be added to invitations which can be checked in the flow to deny requests. Alternatively, an identifier with high entropy (like a UUID) can be used as flow slug, mitigating the attack vector by exponentially decreasing the possibility of discovering other flows.", "No PoCs found on GitHub currently.", "https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h"], ["2022", "CVE-2022-30724", "Broadcasting Intent including the BluetoothDevice object without proper restriction of receivers in sendIntentSessionCompleted function of Bluetooth prior to SMR Jun-2022 Release 1 leaks MAC address of the connected Bluetooth device.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-21450", "Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub product of Oracle PeopleSoft (component: My Links). The supported version that is affected is 9.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-39116", "In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-32761", "An information disclosure vulnerability exists in the aVideoEncoderReceiveImage functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549"], ["2022", "CVE-2022-21510", "Vulnerability in the Oracle Database - Enterprise Edition Sharding component of Oracle Database Server. For supported versions that are affected see note. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Oracle Database - Enterprise Edition Sharding executes to compromise Oracle Database - Enterprise Edition Sharding. While the vulnerability is in Oracle Database - Enterprise Edition Sharding, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Sharding. Note: None of the supported versions are affected. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21681", "Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources.", "https://github.com/HotDB-Community/HotDB-Engine", "https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj"], ["2022", "CVE-2022-47094", "GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference via filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2345"], ["2022", "CVE-2022-36368", "Multiple stored cross-site scripting vulnerabilities in the web user interface of IPFire versions prior to 2.27 allows a remote authenticated attacker with administrative privilege to inject an arbitrary script.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3473", "A vulnerability classified as critical has been found in SourceCodester Human Resource Management System. This affects an unknown part of the file getstatecity.php. The manipulation of the argument ci leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-210717 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf https://vuldb.com/?id.210717"], ["2022", "CVE-2022-31508", "The idayrus/evoting repository before 2022-05-08 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1576", "The WP Maintenance Mode & Coming Soon WordPress plugin before 2.4.5 is lacking CSRF when emptying the subscribed users list, which could allow attackers to make a logged in admin perform such action via a CSRF attack", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf"], ["2022", "CVE-2022-0919", "The Salon booking system Free and pro WordPress plugins before 7.6.3 do not have proper authorisation when searching bookings, allowing any unauthenticated users to search other's booking, as well as retrieve sensitive information about the bookings, such as the full name, email and phone number of the person who booked it.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4"], ["2022", "CVE-2022-30967", "Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.", "https://github.com/jenkinsci-cert/nvd-cwe https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23887", "YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete.", "No PoCs found on GitHub currently.", "https://github.com/yzmcms/yzmcms/issues/59"], ["2022", "CVE-2022-32862", "This issue was addressed with improved data protection. This issue is fixed in macOS Big Sur 11.7.1, macOS Ventura 13, macOS Monterey 12.6.1. An app with root privileges may be able to access private information.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rohitc33/CVE-2022-32862", "No PoCs from references."], ["2022", "CVE-2022-35290", "Under certain conditions SAP Authenticator for Android allows an attacker to access information which would otherwise be restricted.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-35101", "SWFTools commit 772e55a2 was discovered to contain a segmentation violation via /multiarch/memset-vec-unaligned-erms.S.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-3562", "Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657"], ["2022", "CVE-2022-31788", "IdeaLMS 2022 allows SQL injection via the IdeaLMS/ChatRoom/ClassAccessControl/6?isBigBlueButton=0&ClassID= pathname.", "https://github.com/ARPSyndicate/cvemon https://github.com/RNPG/CVEs", "https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4"], ["2022", "CVE-2022-1467", "Windows OS can be configured to overlay a \u201clanguage bar\u201d on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS.", "No PoCs found on GitHub currently.", "https://www.aveva.com/en/support-and-success/cyber-security-updates/"], ["2022", "CVE-2022-35010", "PNGDec commit 8abf6be was discovered to contain a heap buffer overflow via asan_interceptors_memintrinsics.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-24364", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15851.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-23996", "Unprotected component vulnerability in StTheaterModeReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to enable bedtime mode without a proper permission.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-39396", "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.18, and prior to 5.3.1 on the 5.X branch, are vulnerable to Remote Code Execution via prototype pollution. An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. This issue is patched in version 5.3.1 and in 4.10.18. There are no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-39007", "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-30775", "xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264"], ["2022", "CVE-2022-21401", "Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. While the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-41489", "WAYOS LQ_09 22.03.17V was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to send crafted requests to the server from the affected device. This vulnerability is exploitable due to a lack of authentication in the component Usb_upload.htm.", "https://github.com/ARPSyndicate/cvemon https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-36279", "A stack-based buffer overflow vulnerability exists in the httpd delfile.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605"], ["2022", "CVE-2022-25399", "Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Real-Estate-Portal-System"], ["2022", "CVE-2022-4302", "The White Label CMS WordPress plugin before 2.5 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01"], ["2022", "CVE-2022-4093", "SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period. This affect 16.0.1 and 16.0.2 only. 16.0.0 or lower, and 16.0.3 or higher are not affected", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788"], ["2022", "CVE-2022-25148", "The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_id parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042"], ["2022", "CVE-2022-4242", "The WP Google Review Slider WordPress plugin before 11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087"], ["2022", "CVE-2022-21541", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-30635", "Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-0948", "The Order Listener for WooCommerce WordPress plugin before 3.2.2 does not sanitise and escape the id parameter before using it in a SQL statement via a REST route available to unauthenticated users, leading to an SQL injection", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs https://github.com/superlink996/chunqiuyunjingbachang", "https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576"], ["2022", "CVE-2022-37055", "D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-35150", "Baijicms v4 was discovered to contain an arbitrary file upload vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md"], ["2022", "CVE-2022-3422", "Account Takeover :: when see the info i can see the hash pass i can creaked it ............... Account Takeover :: when see the info i can see the forgot_password_token the hacker can send the request and changed the pass", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551"], ["2022", "CVE-2022-22728", "A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31559", "The tsileo/flask-yeoman repository through 2013-09-13 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1527", "The WP 2FA WordPress plugin before 2.2.1 does not sanitise and escape a parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/agrawalsmart7/scodescanner", "https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16"], ["2022", "CVE-2022-20023", "In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-27940", "tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_ipv6_next in common/get.c.", "No PoCs found on GitHub currently.", "https://github.com/appneta/tcpreplay/issues/718"], ["2022", "CVE-2022-1329", "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/crac-learning/CVE-analysis-reports https://github.com/dexit/CVE-2022-1329 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mcdulltii/CVE-2022-1329 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html"], ["2022", "CVE-2022-25845", "The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/Asoh42/2022hw-vuln https://github.com/Expl0desploit/CVE-2022-25845 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Phuong39/2022-HW-POC https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/W01fh4cker/LearnFastjsonVulnFromZero-Basic https://github.com/WhooAmii/POC_to_review https://github.com/XuCcc/VulEnv https://github.com/d4n-sec/d4n-sec.github.io https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/hosch3n/FastjsonVulns https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nerowander/CVE-2022-25845-exploit https://github.com/nomi-sec/PoC-in-GitHub https://github.com/scabench/fastjson-tp1fn1 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 https://www.ddosi.org/fastjson-poc/ https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-44830", "Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.", "https://github.com/RashidKhanPathan/CVE-2022-44830 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/RashidKhanPathan/CVE-2022-44830"], ["2022", "CVE-2022-36537", "ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Malwareman007/CVE-2022-36537 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/agnihackers/CVE-2022-36537-EXPLOIT https://github.com/k0mi-tg/CVE-POC https://github.com/k8gege/Ladon https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/numencyber/Vulnerability_PoC https://github.com/rggu2zr/rggu2zr https://github.com/sponkmonk/Ladon_english_update https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/"], ["2022", "CVE-2022-27643", "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4lo/awesome-IoT-security-article https://github.com/f1tao/awesome-iot-security-resource", "No PoCs from references."], ["2022", "CVE-2022-37818", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the list parameter at the function formSetQosBand.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2"], ["2022", "CVE-2022-2000", "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", "https://github.com/Live-Hack-CVE/CVE-2022-2000", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 http://seclists.org/fulldisclosure/2022/Oct/45 https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0"], ["2022", "CVE-2022-2391", "The Inspiro PRO WordPress plugin does not sanitize the portfolio slider description, allowing users with privileges as low as Contributor to inject JavaScript into the description.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3"], ["2022", "CVE-2022-48664", "In the Linux kernel, the following vulnerability has been resolved:btrfs: fix hang during unmount when stopping a space reclaim workerOften when running generic/562 from fstests we can hang during unmount,resulting in a trace like this: Sep 07 11:52:00 debian9 unknown: run fstests generic/562 at 2022-09-07 11:52:00 Sep 07 11:55:32 debian9 kernel: INFO: task umount:49438 blocked for more than 120 seconds. Sep 07 11:55:32 debian9 kernel: Not tainted 6.0.0-rc2-btrfs-next-122 #1 Sep 07 11:55:32 debian9 kernel: \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. Sep 07 11:55:32 debian9 kernel: task:umount state:D stack: 0 pid:49438 ppid: 25683 flags:0x00004000 Sep 07 11:55:32 debian9 kernel: Call Trace: Sep 07 11:55:32 debian9 kernel: Sep 07 11:55:32 debian9 kernel: __schedule+0x3c8/0xec0 Sep 07 11:55:32 debian9 kernel: ? rcu_read_lock_sched_held+0x12/0x70 Sep 07 11:55:32 debian9 kernel: schedule+0x5d/0xf0 Sep 07 11:55:32 debian9 kernel: schedule_timeout+0xf1/0x130 Sep 07 11:55:32 debian9 kernel: ? lock_release+0x224/0x4a0 Sep 07 11:55:32 debian9 kernel: ? lock_acquired+0x1a0/0x420 Sep 07 11:55:32 debian9 kernel: ? trace_hardirqs_on+0x2c/0xd0 Sep 07 11:55:32 debian9 kernel: __wait_for_common+0xac/0x200 Sep 07 11:55:32 debian9 kernel: ? usleep_range_state+0xb0/0xb0 Sep 07 11:55:32 debian9 kernel: __flush_work+0x26d/0x530 Sep 07 11:55:32 debian9 kernel: ? flush_workqueue_prep_pwqs+0x140/0x140 Sep 07 11:55:32 debian9 kernel: ? trace_clock_local+0xc/0x30 Sep 07 11:55:32 debian9 kernel: __cancel_work_timer+0x11f/0x1b0 Sep 07 11:55:32 debian9 kernel: ? close_ctree+0x12b/0x5b3 [btrfs] Sep 07 11:55:32 debian9 kernel: ? __trace_bputs+0x10b/0x170 Sep 07 11:55:32 debian9 kernel: close_ctree+0x152/0x5b3 [btrfs] Sep 07 11:55:32 debian9 kernel: ? evict_inodes+0x166/0x1c0 Sep 07 11:55:32 debian9 kernel: generic_shutdown_super+0x71/0x120 Sep 07 11:55:32 debian9 kernel: kill_anon_super+0x14/0x30 Sep 07 11:55:32 debian9 kernel: btrfs_kill_super+0x12/0x20 [btrfs] Sep 07 11:55:32 debian9 kernel: deactivate_locked_super+0x2e/0xa0 Sep 07 11:55:32 debian9 kernel: cleanup_mnt+0x100/0x160 Sep 07 11:55:32 debian9 kernel: task_work_run+0x59/0xa0 Sep 07 11:55:32 debian9 kernel: exit_to_user_mode_prepare+0x1a6/0x1b0 Sep 07 11:55:32 debian9 kernel: syscall_exit_to_user_mode+0x16/0x40 Sep 07 11:55:32 debian9 kernel: do_syscall_64+0x48/0x90 Sep 07 11:55:32 debian9 kernel: entry_SYSCALL_64_after_hwframe+0x63/0xcd Sep 07 11:55:32 debian9 kernel: RIP: 0033:0x7fcde59a57a7 Sep 07 11:55:32 debian9 kernel: RSP: 002b:00007ffe914217c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 Sep 07 11:55:32 debian9 kernel: RAX: 0000000000000000 RBX: 00007fcde5ae8264 RCX: 00007fcde59a57a7 Sep 07 11:55:32 debian9 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055b57556cdd0 Sep 07 11:55:32 debian9 kernel: RBP: 000055b57556cba0 R08: 0000000000000000 R09: 00007ffe91420570 Sep 07 11:55:32 debian9 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 Sep 07 11:55:32 debian9 kernel: R13: 000055b57556cdd0 R14: 000055b57556ccb8 R15: 0000000000000000 Sep 07 11:55:32 debian9 kernel: What happens is the following:1) The cleaner kthread tries to start a transaction to delete an unused block group, but the metadata reservation can not be satisfied right away, so a reservation ticket is created and it starts the async metadata reclaim task (fs_info->async_reclaim_work);2) Writeback for all the filler inodes with an i_size of 2K starts (generic/562 creates a lot of 2K files with the goal of filling metadata space). We try to create an inline extent for them, but we fail when trying to insert the inline extent with -ENOSPC (at cow_file_range_inline()) - since this is not critical, we fallback to non-inline mode (back to cow_file_range()), reserve extents---truncated---", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-34572", "An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.", "No PoCs found on GitHub currently.", "https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md"], ["2022", "CVE-2022-29912", "Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1692655"], ["2022", "CVE-2022-46875", "The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer. *Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.", "https://github.com/dlehgus1023/dlehgus1023", "https://bugzilla.mozilla.org/show_bug.cgi?id=1786188"], ["2022", "CVE-2022-27492", "An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-36477", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function AddWlanMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md"], ["2022", "CVE-2022-1269", "The Fast Flow WordPress plugin before 1.2.12 does not sanitise and escape the page parameter before outputting back in an attribute in an admin dashboard, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf"], ["2022", "CVE-2022-29611", "SAP NetWeaver Application Server for ABAP and ABAP Platform do not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-38565", "Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formEmailTest. This vulnerability allows attackers to cause a Denial of Service (DoS) via the mailpwd parameter.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd"], ["2022", "CVE-2022-33312", "Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_cert_file/` API is affected by command injection vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572"], ["2022", "CVE-2022-31097", "Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0imet/pyfetch", "No PoCs from references."], ["2022", "CVE-2022-31306", "Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/481"], ["2022", "CVE-2022-33192", "Four OS command injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A XCMD can lead to arbitrary command execution. An attacker can send a sequence of malicious commands to trigger these vulnerabilities.This vulnerability specifically focuses on the unsafe use of the `WL_SSID` and `WL_SSID_HEX` configuration values in the function at offset `0x1c7d28` of firmware 6.9Z.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559"], ["2022", "CVE-2022-25814", "PendingIntent hijacking vulnerability in Wearable Manager Installer prior to SMR Mar-2022 Release 1 allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-0385", "The Crazy Bone WordPress plugin through 0.6.0 does not sanitise and escape the username submitted via the login from when displaying them back in the log dashboard, leading to an unauthenticated Stored Cross-Site scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891"], ["2022", "CVE-2022-2111", "Unrestricted Upload of File with Dangerous Type in GitHub repository inventree/inventree prior to 0.7.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1"], ["2022", "CVE-2022-25486", "CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CuppaCMS/CuppaCMS/issues/15 https://github.com/CuppaCMS/CuppaCMS/issues/25 https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts"], ["2022", "CVE-2022-43102", "Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function.", "No PoCs found on GitHub currently.", "https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s"], ["2022", "CVE-2022-43293", "Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file write vulnerability via the component \\Wacom\\Wacom_Tablet.exe.", "https://github.com/LucaBarile/CVE-2022-43293 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/LucaBarile/CVE-2022-43293 https://lucabarile.github.io/Blog/CVE-2022-43293/index.html"], ["2022", "CVE-2022-41007", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'port redirect protocol (tcp|udp|tcp/udp) inport <1-65535> dstaddr A.B.C.D export <1-65535> description WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-41396", "Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain multiple command injection vulnerabilities in the function setIPsecTunnelList via the IPsecLocalNet and IPsecRemoteNet parameters.", "No PoCs found on GitHub currently.", "https://boschko.ca/tenda_ac1200_router https://boschko.ca/tenda_ac1200_router/"], ["2022", "CVE-2022-43042", "GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function FixSDTPInTRAF at isomedia/isom_intern.c.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2278"], ["2022", "CVE-2022-1238", "Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200"], ["2022", "CVE-2022-29640", "TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setPortForwardRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.", "No PoCs found on GitHub currently.", "https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md"], ["2022", "CVE-2022-38534", "TOTOLINK-720R v4.1.5cu.374 was discovered to contain a remote code execution (RCE) vulnerability via the setdiagnosicfg function.", "No PoCs found on GitHub currently.", "https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md"], ["2022", "CVE-2022-22037", "Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-27570", "Heap-based buffer overflow vulnerability in parser_single_iref function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-36604", "An access control issue in Canaan Avalon ASIC Miner 2020.3.30 and below allows unauthenticated attackers to arbitrarily change user passwords via a crafted POST request.", "https://github.com/Live-Hack-CVE/CVE-2022-36604", "No PoCs from references."], ["2022", "CVE-2022-0376", "The User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932"], ["2022", "CVE-2022-23179", "The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.7.0 does not escape some of its form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/"], ["2022", "CVE-2022-2273", "The Simple Membership WordPress plugin before 4.1.3 does not properly validate the membership_level parameter when editing a profile, allowing members to escalate to a higher membership level by using a crafted POST request.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84"], ["2022", "CVE-2022-40009", "SWFTools commit 772e55a was discovered to contain a heap-use-after-free via the function grow_unicode at /lib/ttf.c.", "No PoCs found on GitHub currently.", "https://github.com/matthiaskramm/swftools/issues/190"], ["2022", "CVE-2022-46505", "An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.", "https://github.com/SmallTown123/details-for-CVE-2022-46505 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-46694", "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, iOS 15.7.2 and iPadOS 15.7.2, tvOS 16.2, watchOS 9.2. Parsing a maliciously crafted video file may lead to kernel code execution.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-31064", "BigBlueButton is an open source web conferencing system. Users in meetings with private chat enabled are vulnerable to a cross site scripting attack in affected versions. The attack occurs when the attacker (with xss in the name) starts a chat. in the victim's client the JavaScript will be executed. This issue has been addressed in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2022/Jun/52"], ["2022", "CVE-2022-38716", "Cross-Site Request Forgery (CSRF) vulnerability in StylemixThemes Motors \u2013 Car Dealer, Classifieds & Listing plugin <=\u00a01.4.4 versions.", "https://github.com/1-tong/vehicle_cves https://github.com/Vu1nT0tal/Vehicle-Security https://github.com/VulnTotal-Team/Vehicle-Security https://github.com/VulnTotal-Team/vehicle_cves", "No PoCs from references."], ["2022", "CVE-2022-31124", "openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6, which no longer includes the raw field value in the error message. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/Lukembou/Vulnerability-Scanning https://github.com/scottcwang/openssh_key_parser", "No PoCs from references."], ["2022", "CVE-2022-40149", "Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0236", "The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/binganao/vulns-2022 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/qurbat/CVE-2022-0236 https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xiska62314/CVE-2022-0236 https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/qurbat/CVE-2022-0236"], ["2022", "CVE-2022-23039", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2333", "If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application\u2019s context and permissions.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/shirouQwQ/CVE-2022-2333 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-43320", "FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.", "No PoCs found on GitHub currently.", "https://github.com/liufee/feehicms/issues/4"], ["2022", "CVE-2022-41225", "Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0327", "The Master Addons for Elementor WordPress plugin before 1.8.5 does not sanitise and escape the error_message parameter before outputting it back in the response of the jltma_restrict_content AJAX action, available to unauthenticated and authenticated users, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883"], ["2022", "CVE-2022-2222", "The Download Monitor WordPress plugin before 4.5.91 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b"], ["2022", "CVE-2022-38844", "CSV Injection in Create Contacts in EspoCRM 7.1.8 allows remote authenticated users to run system commands via creating contacts with payloads capable of executing system commands. Admin user exporting contacts in CSV file may end up executing the malicious system commands on his system.", "No PoCs found on GitHub currently.", "https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76"], ["2022", "CVE-2022-31035", "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a `javascript:` link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). The script would be capable of doing anything which is possible in the UI or via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in the following Argo CD versions: v2.4.1, v2.3.5, v2.2.10 and v2.1.16. There are no completely-safe workarounds besides upgrading.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44451", "A use of uninitialized pointer vulnerability exists in the MSI format atom functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669"], ["2022", "CVE-2022-24599", "In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, in printinfo.c, which allows an attacker to leak sensitive information via a crafted file. The printfileinfo function calls the copyrightstring function to get data, however, it dosn't use zero bytes to truncate the data.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/mpruett/audiofile/issues/60"], ["2022", "CVE-2022-40118", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds_action.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection4.md https://github.com/zakee94/online-banking-system/issues/19"], ["2022", "CVE-2022-46785", "SquaredUp Dashboard Server SCOM edition before 5.7.1 GA allows XSS (issue 1 of 2).", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-33070", "Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.", "https://github.com/ARPSyndicate/cvemon https://github.com/GitHubForSnap/knot-resolver-gael", "No PoCs from references."], ["2022", "CVE-2022-34913", "** DISPUTED ** md2roff 1.7 has a stack-based buffer overflow via a Markdown file containing a large number of consecutive characters to be processed. NOTE: the vendor's position is that the product is not intended for untrusted input.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVE-2022-34913 https://github.com/Halcy0nic/Trophies https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skinnyrad/Trophies https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-34610", "H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the URL /ihomers/app.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/12"], ["2022", "CVE-2022-48506", "A flawed pseudorandom number generator in Dominion Voting Systems ImageCast Precinct (ICP and ICP2) and ImageCast Evolution (ICE) scanners allows anyone to determine the order in which ballots were cast from public ballot-level data, allowing deanonymization of voted ballots, in several types of scenarios. This issue was observed for use of the following versions of Democracy Suite: 5.2, 5.4-NM, 5.5, 5.5-A, 5.5-B, 5.5-C, 5.5-D, 5.7-A, 5.10, 5.10A, 5.15. NOTE: the Democracy Suite 5.17 EAC Certificate of Conformance mentions \"Improved pseudo random number algorithm,\" which may be relevant.", "No PoCs found on GitHub currently.", "https://dvsorder.org https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/"], ["2022", "CVE-2022-48697", "In the Linux kernel, the following vulnerability has been resolved:nvmet: fix a use-after-freeFix the following use-after-free complaint triggered by blktests nvme/004:BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]Call Trace: show_stack+0x52/0x58 dump_stack_lvl+0x49/0x5e print_report.cold+0x36/0x1e2 kasan_report+0xb9/0xf0 __asan_load4+0x6b/0x80 blk_mq_complete_request_remote+0xac/0x350 nvme_loop_queue_response+0x1df/0x275 [nvme_loop] __nvmet_req_complete+0x132/0x4f0 [nvmet] nvmet_req_complete+0x15/0x40 [nvmet] nvmet_execute_io_connect+0x18a/0x1f0 [nvmet] nvme_loop_execute_work+0x20/0x30 [nvme_loop] process_one_work+0x56e/0xa70 worker_thread+0x2d1/0x640 kthread+0x183/0x1c0 ret_from_fork+0x1f/0x30", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-36484", "TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the function setDiagnosisCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7"], ["2022", "CVE-2022-41274", "SAP Disclosure Management - version 10.1, allows an authenticated attacker to exploit certain misconfigured application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can lead to the exposure of data like financial reports.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-0267", "The AdRotate WordPress plugin before 5.8.22 does not sanitise and escape the adrotate_action before using it in a SQL statement via the adrotate_request_action function available to admins, leading to a SQL injection", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6"], ["2022", "CVE-2022-23068", "ToolJet versions v0.6.0 to v1.10.2 are vulnerable to HTML injection where an attacker can inject malicious code inside the first name and last name field while inviting a new user which will be reflected in the invitational e-mail.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23068"], ["2022", "CVE-2022-2362", "The Download Manager WordPress plugin before 3.2.50 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based download blocking restrictions.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653"], ["2022", "CVE-2022-28689", "A leftover debug code vulnerability exists in the console support functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521"], ["2022", "CVE-2022-48590", "A SQL injection vulnerability exists in the \u201cadmin dynamic app mib errors\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48590/"], ["2022", "CVE-2022-48601", "A SQL injection vulnerability exists in the \u201cnetwork print report\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48601/"], ["2022", "CVE-2022-29977", "There is an assertion failure error in stbi__jpeg_huff_decode, stb_image.h:1894 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://github.com/saitoha/libsixel/issues/165"], ["2022", "CVE-2022-43076", "A cross-site scripting (XSS) vulnerability in /admin/edit-admin.php of Web-Based Student Clearance System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtemail parameter.", "No PoCs found on GitHub currently.", "https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md"], ["2022", "CVE-2022-41173", "Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-20106", "In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-36880", "The Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.", "https://github.com/ARPSyndicate/cvemon https://github.com/ly1g3/webmin-usermin-vulnerabilities", "No PoCs from references."], ["2022", "CVE-2022-3098", "The Login Block IPs WordPress plugin through 1.0.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a"], ["2022", "CVE-2022-20046", "In Bluetooth, there is a possible memory corruption due to a logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06142410; Issue ID: ALPS06142410.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-27925", "Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.", "https://github.com/0xf4n9x/CVE-2022-37042 https://github.com/20142995/pocsuite3 https://github.com/2lambda123/panopticon-unattributed https://github.com/ARPSyndicate/cvemon https://github.com/Chocapikk/CVE-2022-27925-Revshell https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925 https://github.com/Inplex-sys/CVE-2022-27925 https://github.com/Josexv1/CVE-2022-27925 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Panopticon-Project/panopticon-unattributed https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/akincibor/CVE-2022-27925 https://github.com/dravenww/curated-article https://github.com/jam620/Zimbra https://github.com/k0mi-tg/CVE-POC https://github.com/k8gege/Ladon https://github.com/lions2012/Penetration_Testing_POC https://github.com/lolminerxmrig/CVE-2022-27925-Revshell https://github.com/luck-ying/Library-POC https://github.com/manas3c/CVE-POC https://github.com/miko550/CVE-2022-27925 https://github.com/mohamedbenchikh/CVE-2022-27925 https://github.com/navokus/CVE-2022-27925 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/onlyHerold22/CVE-2022-27925-PoC https://github.com/sponkmonk/Ladon_english_update https://github.com/touchmycrazyredhat/CVE-2022-27925-Revshell https://github.com/trhacknon/Pocingit https://github.com/vnhacker1337/CVE-2022-27925-PoC https://github.com/whoforget/CVE-POC https://github.com/xanszZZ/pocsuite3-poc https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html"], ["2022", "CVE-2022-38440", "Adobe Dimension versions 3.4.5 is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29734", "A cross-site scripting (XSS) vulnerability in ICT Protege GX/WX v2.08 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter.", "No PoCs found on GitHub currently.", "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php"], ["2022", "CVE-2022-3249", "The WP CSV Exporter WordPress plugin before 1.3.7 does not properly sanitise and escape some parameters before using them in a SQL statement, allowing high privilege users such as admin to perform SQL injection attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e"], ["2022", "CVE-2022-22143", "The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-CONVICT-2340604"], ["2022", "CVE-2022-25820", "A vulnerable design in fingerprint matching algorithm prior to SMR Mar-2022 Release 1 allows physical attackers to perform brute force attack on screen lock password.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-29837", "A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22018-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-8-12-0-178"], ["2022", "CVE-2022-4429", "Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service. The issue was fixed with Avira Security version 1.1.78", "No PoCs found on GitHub currently.", "https://support.norton.com/sp/static/external/tools/security-advisories.html"], ["2022", "CVE-2022-41033", "Windows COM+ Event System Service Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-0020", "A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171782/Palo-Alto-Cortex-XSOAR-6.5.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-2125", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 http://seclists.org/fulldisclosure/2022/Oct/45 https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705"], ["2022", "CVE-2022-48650", "In the Linux kernel, the following vulnerability has been resolved:scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()Commit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")made the __qlt_24xx_handle_abts() function return early iftcm_qla2xxx_find_cmd_by_tag() didn't find a command, but it missed to cleanup the allocated memory for the management command.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-44944", "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Announcement function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/14"], ["2022", "CVE-2022-43027", "Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the firewallEn parameter at /goform/SetFirewallCfg.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-5.md"], ["2022", "CVE-2022-46841", "Cross-Site Request Forgery (CSRF) vulnerability in Soflyy Oxygen Builder plugin <=\u00a04.4 versions.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-36443", "An issue was discovered in Zebra Enterprise Home Screen 4.1.19. The device allows the administrator to lock some communication channels (wireless and SD card) but it is still possible to use a physical connection (Ethernet cable) without restriction.", "No PoCs found on GitHub currently.", "https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html"], ["2022", "CVE-2022-2034", "The Sensei LMS WordPress plugin before 4.5.0 does not have proper permissions set in one of its REST endpoint, allowing unauthenticated users to access private messages sent to teachers", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/soxoj/information-disclosure-writeups-and-pocs", "https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426"], ["2022", "CVE-2022-27834", "Use after free vulnerability in dsp_context_unload_graph function of DSP driver prior to SMR Apr-2022 Release 1 allows attackers to perform malicious actions.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-3358", "OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decryption initialisation function will match the NULL cipher as being equivalent and will fetch this from the available providers. This will succeed if the default provider has been loaded (or if a third party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext. Applications are only affected by this issue if they call EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an encryption/decryption initialisation function. Applications that only use SSL/TLS are not impacted by this issue. Fixed in OpenSSL 3.0.6 (Affected 3.0.0-3.0.5).", "https://github.com/ARPSyndicate/cvemon https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/vulnersCom/vulners-sbom-parser", "No PoCs from references."], ["2022", "CVE-2022-25931", "All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code.", "No PoCs found on GitHub currently.", "https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9 https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539"], ["2022", "CVE-2022-33326", "Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/config_rollback/` API is affected by a command injection vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573"], ["2022", "CVE-2022-31363", "Cypress : https://www.infineon.com/ Cypress Bluetooth Mesh SDK BSA0107_05.01.00-BX8-AMESH-08 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: affected function is pb_transport_handle_frag_. \u00b6\u00b6 In Cypress Bluetooth Mesh SDK, there is an out-of-bound write vulnerability that can be triggered during mesh provisioning. Because there is no check for mismatched SegN and TotalLength in Transaction Start PDU.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-20386", "Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-3218", "Due to a reliance on client-side authentication, the WiFi Mouse (Mouse Server) from Necta LLC's authentication mechanism is trivially bypassed, which can result in remote code execution.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html https://www.exploit-db.com/exploits/49601 https://www.exploit-db.com/exploits/50972"], ["2022", "CVE-2022-34894", "In JetBrains Hub before 2022.2.14799, insufficient access control allowed the hijacking of untrusted services", "https://github.com/ARPSyndicate/cvemon https://github.com/yuriisanin/CVE-2022-25260 https://github.com/yuriisanin/yuriisanin", "No PoCs from references."], ["2022", "CVE-2022-25871", "All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488"], ["2022", "CVE-2022-22112", "In DayByDay CRM, versions 1.1 through 2.2.1 (latest) suffer from an application-wide Client-Side Template Injection (CSTI). A low privileged attacker can input template injection payloads in the application at various locations to execute JavaScript on the client browser.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22112"], ["2022", "CVE-2022-0071", "Incomplete fix for CVE-2021-3101. Hotdog, prior to v1.0.2, did not mimic the resource limits, device restrictions, or syscall filters of the target JVM process. This would allow a container to exhaust the resources of the host, modify devices, or make syscalls that would otherwise be blocked.", "No PoCs found on GitHub currently.", "https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities"], ["2022", "CVE-2022-2174", "Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607"], ["2022", "CVE-2022-35869", "This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). Authentication is not required to exploit this vulnerability. The specific flaw exists within com.inductiveautomation.ignition.gateway.web.pages. The issue results from the lack of proper authentication prior to access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17211.", "https://github.com/at4111/CVE_2022_35869", "No PoCs from references."], ["2022", "CVE-2022-34797", "A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to connect to an attacker-specified HTTP URL using attacker-specified credentials.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43167", "A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking \"Add\".", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/7"], ["2022", "CVE-2022-4478", "The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003"], ["2022", "CVE-2022-44804", "D-Link DIR-882 1.10B02 and1.20B06 is vulnerable to Buffer Overflow via the websRedirect function.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-29866", "OPC UA .NET Standard Stack 1.04.368 allows a remote attacker to exhaust the memory resources of a server via a crafted request that triggers Uncontrolled Resource Consumption.", "https://github.com/claroty/opcua-exploit-framework", "https://opcfoundation.org/security/"], ["2022", "CVE-2022-36503", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateMacClone.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17"], ["2022", "CVE-2022-0253", "livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303"], ["2022", "CVE-2022-21159", "A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467 https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467"], ["2022", "CVE-2022-2356", "The Frontend File Manager & Sharing WordPress plugin before 1.1.3 does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43"], ["2022", "CVE-2022-45649", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the endIp parameter in the formSetPPTPServer function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md"], ["2022", "CVE-2022-34624", "Mealie1.0.0beta3 does not terminate download tokens after a user logs out, allowing attackers to perform a man-in-the-middle attack via a crafted GET request.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25550", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the deviceName parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/9"], ["2022", "CVE-2022-27455", "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28097"], ["2022", "CVE-2022-38870", "Free5gc v3.2.1 is vulnerable to Information disclosure.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "No PoCs from references."], ["2022", "CVE-2022-25781", "Cross-site Scripting (XSS) vulnerability in Web UI of Secomea GateManager allows phishing attacker to inject javascript or html into logged in user session.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-41091", "Windows Mark of the Web Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Lonebear69/https-github.com-tanc7-PackMyPayload https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/delivr-to/delivrto_vectr_import https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mgeeky/PackMyPayload https://github.com/nmantani/archiver-MOTW-support-comparison https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-0313", "The Float menu WordPress plugin before 4.3.1 does not have CSRF check in place when deleting menu, which could allow attackers to make a logged in admin delete them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c"], ["2022", "CVE-2022-21388", "Vulnerability in the Oracle Communications Pricing Design Center product of Oracle Communications Applications (component: On Premise Install). Supported versions that are affected are 12.0.0.3.0 and 12.0.0.4.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Pricing Design Center executes to compromise Oracle Communications Pricing Design Center. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Pricing Design Center accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-45709", "IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple command injection vulnerabilities via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BkFpXcsSs"], ["2022", "CVE-2022-2187", "The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d"], ["2022", "CVE-2022-2216", "Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi", "https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1"], ["2022", "CVE-2022-45498", "An issue in the component tpi_systool_handle(0) (/goform/SysToolReboot) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md"], ["2022", "CVE-2022-28868", "An Address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted malicious webpage/URL, user may be tricked for a short period of time (until the page loads) to think content may be coming from a valid domain, while the content comes from the attacker controlled site.", "https://github.com/KirtiRamchandani/KirtiRamchandani", "No PoCs from references."], ["2022", "CVE-2022-42169", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/addWifiMacFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md"], ["2022", "CVE-2022-46560", "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetWan2Settings module.", "No PoCs found on GitHub currently.", "https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe https://hackmd.io/@0dayResearch/SetWan2Settings_pptp https://hackmd.io/@0dayResearch/rkXr4BQPi https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-31001", "Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31390", "Jizhicms v2.2.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via the Update function in app/admin/c/TemplateController.php.", "No PoCs found on GitHub currently.", "https://github.com/Cherry-toto/jizhicms/issues/75"], ["2022", "CVE-2022-25882", "Versions of the package onnx before 1.13.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory, for example \"../../../etc/passwd\"", "No PoCs found on GitHub currently.", "https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856 https://github.com/onnx/onnx/issues/3991 https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479"], ["2022", "CVE-2022-22270", "An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1"], ["2022", "CVE-2022-42078", "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md"], ["2022", "CVE-2022-28979", "Liferay Portal v7.1.0 through v7.4.2 and Liferay DXP 7.1 before fix pack 26, 7.2 before fix pack 15, and 7.3 before service pack 3 was discovered to contain a cross-site scripting (XSS) vulnerability in the Portal Search module's Custom Facet widget. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Parameter Name text field.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17381"], ["2022", "CVE-2022-35519", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter add_mac, which leads to command injection in page /cli_black_list.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi"], ["2022", "CVE-2022-26768", "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.4, watchOS 8.6, tvOS 15.5, macOS Big Sur 11.6.6. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31110", "RSSHub is an open source, extensible RSS feed generator. In commits prior to 5c4177441417 passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. This results in an impact on the performance of the servers and RSSHub services which may lead to a denial of service. This issue has been fixed in commit 5c4177441417 and all users are advised to upgrade. There are no known workarounds for this issue.", "No PoCs found on GitHub currently.", "https://github.com/DIYgod/RSSHub/issues/10045"], ["2022", "CVE-2022-27896", "Information Exposure Through Log Files vulnerability discovered in Foundry Code-Workbooks where the endpoint backing that console was generating service log records of any Python code being run. These service logs included the Foundry token that represents the Code-Workbooks Python console. Upgrade to Code-Workbooks version 4.461.0. This issue affects Palantir Foundry Code-Workbooks version 4.144 to version 4.460.0 and is resolved in 4.461.0.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md"], ["2022", "CVE-2022-4908", "Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)", "https://github.com/bhaveshharmalkar/learn365", "No PoCs from references."], ["2022", "CVE-2022-44574", "An improper authentication vulnerability exists in Avalanche version 6.3.x and below allows unauthenticated attacker to modify properties on specific port.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29687", "CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/user/level_del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/30#issue-1209049714"], ["2022", "CVE-2022-43085", "An arbitrary file upload vulnerability in add_product.php of Restaurant POS System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.", "No PoCs found on GitHub currently.", "https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md"], ["2022", "CVE-2022-34675", "NVIDIA Display Driver for Linux contains a vulnerability in the Virtual GPU Manager, where it does not check the return value from a null-pointer dereference, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-27404", "FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41180", "Due to lack of proper memory management, when a victim opens a manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41211", "Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-0193", "The Complianz WordPress plugin before 6.0.0 does not escape the s parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://plugins.trac.wordpress.org/changeset/2654225 https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864"], ["2022", "CVE-2022-21299", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0342", "An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.20 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.32 through 5.20, VPN series firmware versions 4.30 through 5.20, and NSG series firmware versions V1.20 through V1.33 Patch 4, which could allow an attacker to bypass the web authentication and obtain administrative access of the device.", "https://github.com/ARPSyndicate/cvemon https://github.com/f0cus77/awesome-iot-security-resource https://github.com/f1tao/awesome-iot-security-resource https://github.com/murchie85/twitterCyberMonitor https://github.com/pipiscrew/timeline", "No PoCs from references."], ["2022", "CVE-2022-32239", "When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "https://github.com/Live-Hack-CVE/CVE-2022-32239", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-43254", "GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_list_new at utils/list.c.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2284"], ["2022", "CVE-2022-25441", "Tenda AC9 v15.03.2.21 was discovered to contain a remote command execution (RCE) vulnerability via the vlanid parameter in the SetIPTVCfg function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12"], ["2022", "CVE-2022-46531", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/addWifiMacFilter.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md"], ["2022", "CVE-2022-4848", "Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc"], ["2022", "CVE-2022-26628", "Matrimony v1.0 was discovered to contain a SQL injection vulnerability via the Password parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony"], ["2022", "CVE-2022-36620", "D-link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img is vulnerable to Buffer Overflow via /goform/addRouting.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-25451", "Tenda AC6 V15.03.05.09_multi was discovered to contain a stack overflow via the list parameter in the setstaticroutecfg function.", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/Poc-Git https://github.com/CVEDB/cve https://github.com/SkyBelll/CVE-PoC https://github.com/jaeminLeee/cve https://github.com/trickest/cve https://github.com/w3security/PoCVE", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/9"], ["2022", "CVE-2022-38831", "Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/SetNetControlList", "No PoCs found on GitHub currently.", "https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md"], ["2022", "CVE-2022-43244", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/342"], ["2022", "CVE-2022-45748", "An issue was discovered with assimp 5.1.4, a use after free occurred in function ColladaParser::ExtractDataObjectFromChannel in file /code/AssetLib/Collada/ColladaParser.cpp.", "No PoCs found on GitHub currently.", "https://github.com/assimp/assimp/issues/4286"], ["2022", "CVE-2022-2257", "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89"], ["2022", "CVE-2022-0352", "Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717"], ["2022", "CVE-2022-42128", "The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17595"], ["2022", "CVE-2022-20334", "In Bluetooth, there are possible process crashes due to dereferencing a null pointer. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-178800552", "https://github.com/ARPSyndicate/cvemon https://github.com/liyansong2018/CVE", "No PoCs from references."], ["2022", "CVE-2022-36923", "Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Configuration Manager, NetFlow Analyzer, Firewall Analyzer, and OpUtils before 2022-07-27 through 2022-07-28 (125657, 126002, 126104, and 126118) allow unauthenticated attackers to obtain a user's API key, and then access external APIs.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/Henry4E36/POCS https://github.com/for-A1kaid/javasec", "No PoCs from references."], ["2022", "CVE-2022-44564", "Huawei Aslan Children's Watch has a path traversal vulnerability. Successful exploitation may allow attackers to access or modify protected system resources.", "https://github.com/ARPSyndicate/cvemon https://github.com/liyansong2018/CVE", "No PoCs from references."], ["2022", "CVE-2022-34966", "OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain an HTML injection vulnerability via the location parameter at http://ip_address/:port/ossn/home.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/GrimTheRipper", "https://grimthereaperteam.medium.com/cve-2022-34966-ossn-6-3-lts-html-injection-vulnerability-at-location-parameter-3fe791dd22c6"], ["2022", "CVE-2022-35509", "An issue was discovered in EyouCMS 1.5.8. There is a Storage XSS vulnerability that can allows an attacker to execute arbitrary Web scripts or HTML by injecting a special payload via the title parameter in the foreground contribution, allowing the attacker to obtain sensitive information.", "https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "No PoCs from references."], ["2022", "CVE-2022-35698", "Adobe Commerce versions 2.4.4-p1 (and earlier) and 2.4.5 (and earlier) are affected by a Stored Cross-site Scripting vulnerability. Exploitation of this issue does not require user interaction and could result in a post-authentication arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/EmicoEcommerce/Magento-APSB22-48-Security-Patches https://github.com/TuVanDev/TuVanDev https://github.com/Viper9x/Viper9x https://github.com/aneasystone/github-trending https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-28969", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGusetBasic. This vulnerability allows attackers to cause a Denial of Service (DoS).", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic"], ["2022", "CVE-2022-2317", "The Simple Membership WordPress plugin before 4.1.3 allows user to change their membership at the registration stage due to insufficient checking of a user supplied parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb"], ["2022", "CVE-2022-45599", "Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.", "https://github.com/ARPSyndicate/cvemon https://github.com/ethancunt/CVE-2022-45599 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/ethancunt/CVE-2022-45599"], ["2022", "CVE-2022-2086", "A vulnerability, which was classified as critical, has been found in SourceCodester Bank Management System 1.0. Affected by this issue is login.php. The manipulation of the argument password with the input 1'and 1=2 union select 1,sleep(10),3,4,5 --+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md https://vuldb.com/?id.202034"], ["2022", "CVE-2022-21289", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0212", "The SpiderCalendar WordPress plugin through 1.5.65 does not sanitise and escape the callback parameter before outputting it back in the page via the window AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47"], ["2022", "CVE-2022-41201", "Due to lack of proper memory management, when a victim opens a manipulated Right Hemisphere Binary (.rh, rh.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41190", "Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-36760", "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/karimhabush/cyberowl https://github.com/xonoxitron/cpe2cve", "No PoCs from references."], ["2022", "CVE-2022-25511", "An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.", "No PoCs found on GitHub currently.", "https://github.com/FreeTAKTeam/UI/issues/29"], ["2022", "CVE-2022-2206", "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668"], ["2022", "CVE-2022-45719", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the gotoUrl parameter in the formPortalAuth function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJ8I_DCBi"], ["2022", "CVE-2022-21398", "Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-43184", "D-Link DIR878 1.30B08 Hotfix_04 was discovered to contain a command injection vulnerability via the component /bin/proc.cgi.", "https://github.com/ARPSyndicate/cvemon https://github.com/HuangPayoung/CVE-request", "https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-29885", "The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the EncryptInterceptor incorrectly stated it enabled Tomcat clustering to run over an untrusted network. This was not correct. While the EncryptInterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly DoS risks.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/FrameVul https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/NorthShad0w/FINAL https://github.com/Penterep/ptvulnsearcher https://github.com/SYRTI/POC_to_review https://github.com/Secxt/FINAL https://github.com/Tim1995/FINAL https://github.com/WhooAmii/POC_to_review https://github.com/iveresk/CVE-2022-29885 https://github.com/k0mi-tg/CVE-POC https://github.com/larescze/ptvulnsearcher https://github.com/manas3c/CVE-POC https://github.com/nikkadim/guacamole140 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/quynhlab/CVE-2022-29885 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/yycunhua/4ra1n https://github.com/zecool/cve https://github.com/zisigui123123s/FINAL", "http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-4809", "Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29"], ["2022", "CVE-2022-29417", "Plugin Settings Update vulnerability in ShortPixel's ShortPixel Adaptive Images plugin <= 3.3.1 at WordPress allows an attacker with a low user role like a subscriber or higher to change the plugin settings.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25892", "The package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138 https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320"], ["2022", "CVE-2022-34877", "SQL Injection vulnerability in AST Agent Time Sheet interface ((/vicidial/AST_agent_time_sheet.php) of VICIdial via the agent parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46570", "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Password parameter in the SetWan3Settings module.", "No PoCs found on GitHub currently.", "https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe https://hackmd.io/@0dayResearch/SetWan3Settings_pptp https://hackmd.io/@0dayResearch/r1zsTSmDs https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-35558", "A stack overflow vulnerability exists in /goform/WifiMacFilterGet in Tenda W6 V1.0.0.9(4122) version, which can be exploited by attackers to cause a denial of service (DoS) via the index parameter.", "https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-29557", "LexisNexis Firco Compliance Link 3.7 allows CSRF.", "No PoCs found on GitHub currently.", "https://github.com/Q2Flc2FySec/CVE-List/blob/main/CVE-2022-29557.txt"], ["2022", "CVE-2022-34937", "Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://github.com/u5cms/u5cms/issues/51"], ["2022", "CVE-2022-46430", "TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.", "No PoCs found on GitHub currently.", "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi"], ["2022", "CVE-2022-27445", "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28081"], ["2022", "CVE-2022-48522", "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.", "https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/raylivesun/pldo https://github.com/raylivesun/ploa", "No PoCs from references."], ["2022", "CVE-2022-45659", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md"], ["2022", "CVE-2022-21149", "The package s-cart/s-cart before 6.9; the package s-cart/core before 6.9 are vulnerable to Cross-site Scripting (XSS) which can lead to cookie stealing of any victim that visits the affected URL so the attacker can gain unauthorized access to that user's account through the stolen cookie.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036 https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035"], ["2022", "CVE-2022-0243", "Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/fa538421-ae55-4288-928f-4e96aaed5803"], ["2022", "CVE-2022-22293", "admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter.", "No PoCs found on GitHub currently.", "https://github.com/Dolibarr/dolibarr/issues/20237"], ["2022", "CVE-2022-29775", "iSpyConnect iSpy v7.2.2.0 allows attackers to bypass authentication via a crafted URL.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-3199", "Use after free in Frames in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon https://github.com/Wi1L-Y/News https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html"], ["2022", "CVE-2022-3208", "The Simple File List WordPress plugin before 4.4.12 does not implement nonce checks, which could allow attackers to make a logged in admin create new page and change it's content via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7"], ["2022", "CVE-2022-31373", "SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Solar_AiConf.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/badboycxcc/SolarView_Compact_6.0_xss https://github.com/badboycxcc/badboycxcc", "https://github.com/badboycxcc/SolarView_Compact_6.0_xss"], ["2022", "CVE-2022-20007", "In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, there is a possible way to overlay an app that believes it's still in the foreground, when it is not, due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-211481342", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/PoC-List https://github.com/Live-Hack-CVE/CVE-2022-2000 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007 https://github.com/WhooAmii/POC_to_review https://github.com/asnelling/android-eol-security https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20007 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36513", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function edditactionlist.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5"], ["2022", "CVE-2022-27667", "Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Console (CMC) - version 430, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4468", "The WP Recipe Maker WordPress plugin before 8.6.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b"], ["2022", "CVE-2022-25762", "If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-48700", "In the Linux kernel, the following vulnerability has been resolved:vfio/type1: Unpin zero pagesThere's currently a reference count leak on the zero page. We incrementthe reference via pin_user_pages_remote(), but the page is later handledas an invalid/reserved page, therefore it's not accounted against theuser and not unpinned by our put_pfn().Introducing special zero page handling in put_pfn() would resolve theleak, but without accounting of the zero page, a single user couldstill create enough mappings to generate a reference count overflow.The zero page is always resident, so for our purposes there's no reasonto keep it pinned. Therefore, add a loop to walk pages returned frompin_user_pages_remote() and unpin any zero pages.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-35879", "Four format string injection vulnerabilities exist in the UPnP logging functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted UPnP negotiation can lead to memory corruption, information disclosure, and denial of service. An attacker can host a malicious UPnP service to trigger these vulnerabilities.This vulnerability arises from format string injection via `controlURL` XML tag, as used within the `DoUpdateUPnPbyService` action handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583"], ["2022", "CVE-2022-28788", "Improper buffer size check logic in aviextractor library prior to SMR May-2022 Release 1 allows out of bounds read leading to possible temporary denial of service. The patch adds buffer size check logic.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-26999", "Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-2024", "OS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97"], ["2022", "CVE-2022-0121", "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hoppscotch hoppscotch/hoppscotch.This issue affects hoppscotch/hoppscotch before 2.1.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b70a6191-8226-4ac6-b817-cae7332a68ee"], ["2022", "CVE-2022-44954", "webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /contacts/listcontacts.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name field after clicking \"Add\".", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/webtareas/issues/10"], ["2022", "CVE-2022-25622", "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.", "https://github.com/Live-Hack-CVE/CVE-2022-25622", "No PoCs from references."], ["2022", "CVE-2022-34556", "PicoC v3.2.2 was discovered to contain a NULL pointer dereference at variable.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVE-2022-34556 https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skinnyrad/Trophies https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-25921", "All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the Function constructor.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193"], ["2022", "CVE-2022-22042", "Windows Hyper-V Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-27824", "Improper size check of in sapefd_parse_meta_DESCRIPTION function of libsapeextractor library prior to SMR Apr-2022 Release 1 allows out of bounds read via a crafted media file", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-3259", "Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31322", "Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb"], ["2022", "CVE-2022-2135", "The affected product is vulnerable to multiple SQL injections, which may allow an unauthorized attacker to disclose information.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0030", "An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41023", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn pptp advanced name WORD dns (yes|no) mtu <128-16384> mru <128-16384> mppe (on|off) stateful (on|off)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-29827", "Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project files or execute programs illegally.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf"], ["2022", "CVE-2022-34447", "PowerPath Management Appliance with versions 3.3 & 3.2*, 3.1 & 3.0* contains OS Command Injection vulnerability. An authenticated remote attacker with administrative privileges could potentially exploit the issue and execute commands on the system as the root user.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/000205404"], ["2022", "CVE-2022-27776", "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-36402", "An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "No PoCs found on GitHub currently.", "https://bugzilla.openanolis.cn/show_bug.cgi?id=2072"], ["2022", "CVE-2022-48580", "A command injection vulnerability exists in the ARP ping device tool feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for\u00a0the injection of arbitrary commands to the underlying operating system.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48580/"], ["2022", "CVE-2022-35968", "TensorFlow is an open source platform for machine learning. The implementation of `AvgPoolGrad` does not fully validate the input `orig_input_shape`. This results in a `CHECK` failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28508", "An XSS issue was discovered in browser_search_plugin.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.", "https://github.com/ARPSyndicate/cvemon https://github.com/YavuzSahbaz/CVE-2022-28508 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-0170", "peertube is vulnerable to Improper Access Control", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f2a003fc-b911-43b6-81ec-f856cdfeaefc"], ["2022", "CVE-2022-29664", "CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/pl_save.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/23#issue-1207644525"], ["2022", "CVE-2022-38510", "Tenda_TX9pro V22.03.02.10 was discovered to contain a buffer overflow via the component httpd/SetNetControlList.", "https://github.com/whiter6666/CVE", "https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md"], ["2022", "CVE-2022-31262", "An exploitable local privilege escalation vulnerability exists in GOG Galaxy 2.0.46. Due to insufficient folder permissions, an attacker can hijack the %ProgramData%\\GOG.com folder structure and change the GalaxyCommunication service executable to a malicious file, resulting in code execution as SYSTEM.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/secure-77/CVE-2022-31262 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/secure-77/CVE-2022-31262 https://secure77.de/category/subjects/researches/ https://secure77.de/gog-galaxy-cve-2022-31262/ https://www.youtube.com/watch?v=Bgdbx5TJShI"], ["2022", "CVE-2022-34903", "GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.", "https://github.com/ARPSyndicate/cvemon", "http://www.openwall.com/lists/oss-security/2022/07/02/1 https://www.openwall.com/lists/oss-security/2022/06/30/1"], ["2022", "CVE-2022-40299", "In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24589", "Burden v3.0 was discovered to contain a stored cross-site scripting (XSS) in the Add Category function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the task parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE", "No PoCs from references."], ["2022", "CVE-2022-2372", "The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45"], ["2022", "CVE-2022-23078", "In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23078"], ["2022", "CVE-2022-30209", "Windows IIS Server Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0277", "Incorrect Permission Assignment for Critical Resource in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316"], ["2022", "CVE-2022-47768", "Serenissima Informatica Fast Checkin 1.0 is vulnerable to Directory Traversal.", "No PoCs found on GitHub currently.", "https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/"], ["2022", "CVE-2022-41264", "Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-36494", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function edditactionlist.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7"], ["2022", "CVE-2022-48516", "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-34600", "H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the EditSTList interface at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/3"], ["2022", "CVE-2022-27531", "A maliciously crafted TIF file can be forced to read beyond allocated boundaries in Autodesk 3ds Max 2022, and 2021 when parsing the TIF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.", "No PoCs found on GitHub currently.", "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010"], ["2022", "CVE-2022-25434", "Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the firewallen parameter in the SetFirewallCfg function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/6"], ["2022", "CVE-2022-43221", "open5gs v2.4.11 was discovered to contain a memory leak in the component src/upf/pfcp-path.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PFCP packet.", "No PoCs found on GitHub currently.", "https://github.com/ToughRunner/Open5gs_bugreport3"], ["2022", "CVE-2022-23138", "ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.", "https://github.com/ARPSyndicate/cvemon https://github.com/satyamisme/ZTE-MF297D_Nordic1_B0X-WPA3 https://github.com/wuseman/ZTE-MF297D_Nordic1_B0X-WPA3", "No PoCs from references."], ["2022", "CVE-2022-0337", "Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)", "https://github.com/ARPSyndicate/cvemon https://github.com/Ghostasky/ALLStarRepo https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera https://github.com/Puliczek/puliczek https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anquanscan/sec-tools https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/maldev866/ChExp-CVE-2022-0337- https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xdavidhu/awesome-google-vrp-writeups https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zer0ne1/CVE-2022-0337-RePoC", "No PoCs from references."], ["2022", "CVE-2022-38757", "A vulnerability has been identified in Micro Focus ZENworks 2020 Update 3a and prior versions. This vulnerability allows administrators with rights to perform actions (e.g., install a bundle) on a set of managed devices, to be able to exercise these rights on managed devices in the ZENworks zone but which are outside the scope of the administrator. This vulnerability does not result in the administrators gaining additional rights on the managed devices, either in the scope or outside the scope of the administrator.", "https://github.com/Live-Hack-CVE/CVE-2022-38757", "No PoCs from references."], ["2022", "CVE-2022-36946", "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb->len.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Pwnzer0tt1/CVE-2022-36946 https://github.com/SYRTI/POC_to_review https://github.com/Satheesh575555/linux-4.19.72_CVE-2022-36946 https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-36946 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nik012003/nik012003 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-46544", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the cmdinput parameter at /goform/exeCommand.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md"], ["2022", "CVE-2022-41235", "Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-48547", "A reflected cross-site scripting (XSS) vulnerability in Cacti 0.8.7g and earlier allows unauthenticated remote attackers to inject arbitrary web script or HTML in the \"ref\" parameter at auth_changepassword.php.", "No PoCs found on GitHub currently.", "https://github.com/Cacti/cacti/issues/1882"], ["2022", "CVE-2022-0226", "livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f"], ["2022", "CVE-2022-2263", "A vulnerability was found in Online Hotel Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file edit_room_cat.php of the component Room Handler. The manipulation of the argument roomname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_room_cat.php%20id%20SQL%20inject.md https://vuldb.com/?id.202982"], ["2022", "CVE-2022-30318", "Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-36614", "TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a hardcoded password for root at /etc/shadow.sample.", "https://github.com/whiter6666/CVE", "No PoCs from references."], ["2022", "CVE-2022-25465", "Espruino 2v11 release was discovered to contain a stack buffer overflow via src/jsvar.c in jsvGetNextSibling.", "No PoCs found on GitHub currently.", "https://github.com/espruino/Espruino/issues/2136"], ["2022", "CVE-2022-34711", "Windows Defender Credential Guard Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html"], ["2022", "CVE-2022-29472", "An OS command injection vulnerability exists in the web interface util_set_serial_mac functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566"], ["2022", "CVE-2022-38497", "LIEF commit 365a16a was discovered to contain a segmentation violation via the component CoreFile.tcc:69.", "No PoCs found on GitHub currently.", "https://github.com/lief-project/LIEF/issues/766"], ["2022", "CVE-2022-33171", "** DISPUTED ** The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html"], ["2022", "CVE-2022-24709", "@awsui/components-react is the main AWS UI package which contains React components, with TypeScript definitions designed for user interface development. Multiple components in versions before 3.0.367 have been found to not properly neutralize user input and may allow for javascript injection. Users are advised to upgrade to version 3.0.367 or later. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2041", "The Brizy WordPress plugin before 2.4.2 does not sanitise and escape some element content, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109"], ["2022", "CVE-2022-0144", "shelljs is vulnerable to Improper Privilege Management", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/Haxatron https://github.com/tomjfrog-org/frogbot-npm-demo https://github.com/tomjfrog/frogbot-demo", "https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c"], ["2022", "CVE-2022-36436", "OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthenticator authentication-bypass vulnerability that could allow a malicious actor to gain unauthorized access to a VNC session or to disconnect a legitimate user from a VNC session. A remote attacker with network access to the proxy server could leverage this vulnerability to connect to VNC servers protected by the proxy server without providing any authentication credentials. Exploitation of this issue requires that the proxy server is currently accepting connections for the target VNC server.", "https://github.com/ARPSyndicate/cvemon https://github.com/mam-dev/security-constraints", "https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/"], ["2022", "CVE-2022-44931", "Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md"], ["2022", "CVE-2022-29953", "The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-25647", "The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/CGCL-codes/PHunter https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/scordero1234/java_sec_demo-main", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-29650", "Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the Search parameter at /online-food-order/food-search.php.", "No PoCs found on GitHub currently.", "https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection"], ["2022", "CVE-2022-27841", "Improper exception handling in Samsung Pass prior to version 3.7.07.5 allows physical attacker to view the screen that is previously running without authentication", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-20122", "The PowerVR GPU driver allows unprivileged apps to allocated pinned memory, unpin it (which makes it available to be freed), and continue using the page in GPU calls. No privileges required and this results in kernel memory corruption.Product: AndroidVersions: Android SoCAndroid ID: A-232441339", "https://github.com/ARPSyndicate/cvemon https://github.com/Live-Hack-CVE/CVE-2022-20122 https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/ndk191/linux-kernel-exploitation https://github.com/ssr-111/linux-kernel-exploitation https://github.com/xairy/linux-kernel-exploitation", "No PoCs from references."], ["2022", "CVE-2022-29481", "A leftover debug code vulnerability exists in the console nvram functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518"], ["2022", "CVE-2022-29710", "A cross-site scripting (XSS) vulnerability in uploadConfirm.php of LimeSurvey v5.3.9 and below allows attackers to execute arbitrary web scripts or HTML via a crafted plugin.", "https://github.com/ARPSyndicate/cvemon https://github.com/p0dalirius/p0dalirius", "No PoCs from references."], ["2022", "CVE-2022-27593", "An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-41017", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn basic protocol (l2tp|pptp) name WORD server WORD username WORD passsword WORD firmwall (on|off) defroute (on|off) localip A.B.C.D' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-43283", "wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.", "No PoCs found on GitHub currently.", "https://github.com/WebAssembly/wabt/issues/1985"], ["2022", "CVE-2022-2290", "Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf"], ["2022", "CVE-2022-2101", "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `file[files][]` parameter in versions up to, and including, 3.2.46 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor level permissions and above to inject arbitrary web scripts on the file's page that will execute whenever an administrator accesses the editor area for the injected file page.", "No PoCs found on GitHub currently.", "https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c https://packetstormsecurity.com/files/167573/"], ["2022", "CVE-2022-0395", "Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-36467", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function EditMacList.d.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md"], ["2022", "CVE-2022-44960", "webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /general/search.php?searchtype=simple. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/webtareas/issues/4"], ["2022", "CVE-2022-43003", "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the pskValue parameter in the setRepeaterSecurity function.", "https://github.com/ARPSyndicate/cvemon https://github.com/hunzi0/Vullnfo", "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-34562", "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the status box.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-2381", "The E Unlocked - Student Result WordPress plugin through 1.0.4 is lacking CSRF and validation when uploading the School logo, which could allow attackers to make a logged in admin upload arbitrary files, such as PHP via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f"], ["2022", "CVE-2022-2010", "Out of bounds read in compositing in Google Chrome prior to 102.0.5005.115 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "https://github.com/Live-Hack-CVE/CVE-2022-2010", "No PoCs from references."], ["2022", "CVE-2022-0284", "A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service and information disclosure.", "No PoCs found on GitHub currently.", "https://github.com/ImageMagick/ImageMagick/issues/4729"], ["2022", "CVE-2022-37808", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the index parameter in the function formWifiWpsOOB.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15"], ["2022", "CVE-2022-31207", "The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-33242", "Memory corruption due to improper authentication in Qualcomm IPC while loading unsigned lib in audio PD.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25855", "All versions of the package create-choo-app3 are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951"], ["2022", "CVE-2022-1339", "SQL injection in ElementController.php in GitHub repository pimcore/pimcore prior to 10.3.5. This vulnerability is capable of steal the data", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9"], ["2022", "CVE-2022-27950", "In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11"], ["2022", "CVE-2022-29842", "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability that could allow an attacker to execute code in the context of the root user on a vulnerable CGI file was discovered in Western Digital My Cloud OS 5 devicesThis issue affects My Cloud OS 5: before 5.26.119.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119"], ["2022", "CVE-2022-43143", "A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container.", "https://github.com/goseungduk/beekeeper https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/beekeeper-studio/beekeeper-studio/issues/1393"], ["2022", "CVE-2022-21551", "Vulnerability in Oracle GoldenGate (component: Oracle GoldenGate). The supported version that is affected is 21c: prior to 21.7.0.0.0; 19c: prior to 19.1.0.0.220719. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle GoldenGate. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle GoldenGate. CVSS 3.1 Base Score 6.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-36329", "An improper privilege management issue that could allow an attacker to cause a denial of service over the OTA mechanism was discovered in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi devices.This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191"], ["2022", "CVE-2022-1537", "file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.", "https://github.com/ARPSyndicate/cvemon https://github.com/HotDB-Community/HotDB-Engine https://github.com/shawnhooper/restful-localized-scripts https://github.com/shawnhooper/wpml-rest-api", "https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d"], ["2022", "CVE-2022-31549", "The olmax99/helm-flask-celery repository before 2022-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726 https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f"], ["2022", "CVE-2022-22738", "Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3432", "A potential vulnerability in a driver used during manufacturing process on the Ideapad Y700-14ISK that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.", "https://github.com/ARPSyndicate/cvemon https://github.com/river-li/awesome-uefi-security", "No PoCs from references."], ["2022", "CVE-2022-30926", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the EditMacList parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/18"], ["2022", "CVE-2022-0958", "The Mark Posts WordPress plugin before 2.0.1 does not escape new markers, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022"], ["2022", "CVE-2022-35000", "JPEGDEC commit be4843c was discovered to contain a segmentation fault via fseek at /libio/fseek.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-24374", "Cross-site scripting vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. This vulnerability is different from CVE-2022-23916.", "https://github.com/wild0ni0n/wild0ni0n", "No PoCs from references."], ["2022", "CVE-2022-0818", "The WooCommerce Affiliate Plugin WordPress plugin before 4.16.4.5 does not have authorization and CSRF checks on a specific action handler, as well as does not sanitize its settings, which enables an unauthenticated attacker to inject malicious XSS payloads into the settings page of the plugin.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b"], ["2022", "CVE-2022-1477", "Use after free in Vulkan in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31798", "Nortek Linear eMerge E3-Series 0.32-07p devices are vulnerable to /card_scan.php?CardFormatNo= XSS with session fixation (via PHPSESSID) when they are chained together. This would allow an attacker to take over an admin account or a user account.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/omarhashem123/CVE-2022-31798 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html https://eg.linkedin.com/in/omar-1-hashem https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79"], ["2022", "CVE-2022-25018", "Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary code via crafted PHP code inserted into static pages.", "https://github.com/ARPSyndicate/cvemon https://github.com/MoritzHuppert/CVE-2022-25018 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/erlaplante/pluxml-rce https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-25389", "DCN Firewall DCME-520 was discovered to contain an arbitrary file download vulnerability via the path parameter in the file /audit/log/log_management.php.", "No PoCs found on GitHub currently.", "https://www.adminxe.com/3246.html"], ["2022", "CVE-2022-47195", "An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `facebook` field for a user.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686"], ["2022", "CVE-2022-21411", "Vulnerability in the RDBMS Gateway / Generic ODBC Connectivity component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise RDBMS Gateway / Generic ODBC Connectivity. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of RDBMS Gateway / Generic ODBC Connectivity accessible data as well as unauthorized read access to a subset of RDBMS Gateway / Generic ODBC Connectivity accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-28363", "Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability (XSS) in the /goform/login_process username parameter via GET. No authentication is required.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html https://seclists.org/fulldisclosure/2022/Apr/1"], ["2022", "CVE-2022-4203", "A read buffer overrun can be triggered in X.509 certificate verification,specifically in name constraint checking. Note that this occursafter certificate chain signature verification and requires either aCA to have signed the malicious certificate or for the application tocontinue certificate verification despite failure to construct a pathto a trusted issuer.The read buffer overrun might result in a crash which could lead toa denial of service attack. In theory it could also result in the disclosureof private memory contents (such as private keys, or sensitive plaintext)although we are not aware of any working exploit leading to memorycontents disclosure as of the time of release of this advisory.In a TLS client, this can be triggered by connecting to a maliciousserver. In a TLS server, this can be triggered if the server requestsclient authentication and a malicious client connects.", "https://github.com/ARPSyndicate/cvemon https://github.com/Tuttu7/Yum-command https://github.com/a23au/awe-base-images https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-25298", "This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.", "https://github.com/ARPSyndicate/cvemon https://github.com/Kirill89/Kirill89", "https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182"], ["2022", "CVE-2022-21500", "Vulnerability in Oracle E-Business Suite (component: Manage Proxies). The supported version that is affected is 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Suite. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Suite accessible data. Note: Authentication is required for successful attack, however the user may be self-registered. Oracle E-Business Suite 12.1 is not impacted by this vulnerability. Customers should refer to the Patch Availability Document for details. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-32771", "A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the \"success\" parameter which is inserted into the document with insufficient sanitization.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538"], ["2022", "CVE-2022-45210", "Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.", "No PoCs found on GitHub currently.", "https://github.com/jeecgboot/jeecg-boot/issues/4125"], ["2022", "CVE-2022-24265", "Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE-1 https://github.com/oxf5/CVE https://github.com/truonghuuphuc/CVE", "https://github.com/CuppaCMS/CuppaCMS/issues/14"], ["2022", "CVE-2022-35111", "SWFTools commit 772e55a2 was discovered to contain a stack overflow via __sanitizer::StackDepotNode::hash(__sanitizer::StackTrace const&) at /sanitizer_common/sanitizer_stackdepot.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/matthiaskramm/swftools/issues/184"], ["2022", "CVE-2022-32872", "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16, iOS 15.7 and iPadOS 15.7. A person with physical access to an iOS device may be able to access photos from the lock screen.", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Oct/39 http://seclists.org/fulldisclosure/2022/Oct/40"], ["2022", "CVE-2022-26360", "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0909", "Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.", "https://github.com/ARPSyndicate/cvemon https://github.com/mzs555557/SosReverterbench https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/393"], ["2022", "CVE-2022-1566", "The Quotes llama WordPress plugin before 1.0.0 does not sanitise and escape Quotes, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed. The attack could also be performed by tricking an admin to import a malicious CSV file", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c"], ["2022", "CVE-2022-31518", "The JustAnotherSoftwareDeveloper/Python-Recipe-Database repository through 2021-03-31 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-3463", "The Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364"], ["2022", "CVE-2022-22629", "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/parsdefense/CVE-2022-22629 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3523", "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33"], ["2022", "CVE-2022-32932", "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/ox1111/CVE-2022-32932", "No PoCs from references."], ["2022", "CVE-2022-35051", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b55af.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md"], ["2022", "CVE-2022-0849", "Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.", "No PoCs found on GitHub currently.", "https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6"], ["2022", "CVE-2022-21440", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-39046", "An issue was discovered in the GNU C Library (glibc) 2.36. When the syslog function is passed a crafted input string larger than 1024 bytes, it reads uninitialized memory from the heap and prints it to the target log file, potentially revealing a portion of the contents of the heap.", "https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2024/Feb/3 http://www.openwall.com/lists/oss-security/2024/01/30/6 http://www.openwall.com/lists/oss-security/2024/01/30/8"], ["2022", "CVE-2022-1595", "The HC Custom WP-Admin URL WordPress plugin through 1.4 leaks the secret login URL when sending a specific crafted request", "https://github.com/0xPugal/One-Liners https://github.com/0xPugazh/One-Liners https://github.com/ARPSyndicate/kenzer-templates https://github.com/bhavesh-pardhi/One-Liner", "https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b"], ["2022", "CVE-2022-1604", "The MailerLite WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/agrawalsmart7/scodescanner", "https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845"], ["2022", "CVE-2022-3490", "The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136"], ["2022", "CVE-2022-38108", "SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.", "https://github.com/f0ur0four/Insecure-Deserialization", "http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html"], ["2022", "CVE-2022-37376", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Editor 11.1.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arrays. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16599.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-26002", "A stack-based buffer overflow vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476"], ["2022", "CVE-2022-21662", "WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/Afetter618/WordPress-PenTest https://github.com/namhikelo/Symfonos1-Vulnhub-CEH", "No PoCs from references."], ["2022", "CVE-2022-45172", "An issue was discovered in LIVEBOX Collaboration vDesk before v018. Broken Access Control can occur under the /api/v1/registration/validateEmail endpoint, the /api/v1/vdeskintegration/user/adduser endpoint, and the /api/v1/registration/changePasswordUser endpoint. The web application is affected by flaws in authorization logic, through which a malicious user (with no privileges) is able to perform privilege escalation to the administrator role, and steal the accounts of any users on the system.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-28281", "If a compromised content process sent an unexpected number of WebAuthN Extensions in a Register command to the parent process, an out of bounds write would have occurred leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.", "https://github.com/0vercl0k/0vercl0k https://github.com/0vercl0k/CVE-2022-28281 https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28110", "Hotel Management System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at the login page.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176"], ["2022", "CVE-2022-22899", "Core FTP / SFTP Server v2 Build 725 was discovered to allow unauthenticated attackers to cause a Denial of Service (DoS) via a crafted packet through the SSH service.", "No PoCs found on GitHub currently.", "https://yoursecuritybores.me/coreftp-vulnerabilities/"], ["2022", "CVE-2022-4161", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_start POST parameter before concatenating it to an SQL query in copy-gallery-images.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16 https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b"], ["2022", "CVE-2022-3802", "A vulnerability has been found in IBAX go-ibax and classified as critical. This vulnerability affects unknown code of the file /api/v2/open/rowsInfo. The manipulation of the argument where leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-212638 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/IBAX-io/go-ibax/issues/2063"], ["2022", "CVE-2022-1907", "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4eb0fa3e-4480-4fb5-8ec0-fbcd71de6012"], ["2022", "CVE-2022-3942", "A vulnerability was found in SourceCodester Sanitization Management System and classified as problematic. This issue affects some unknown processing of the file php-sms/?p=request_quote. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-213449 was assigned to this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/maikroservice/CVE-2022-3942 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1847", "The Rotating Posts WordPress plugin through 1.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6"], ["2022", "CVE-2022-21722", "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master` branch. There are no known workarounds.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40854", "Tenda AC18 router contained a stack overflow vulnerability in /goform/fast_setting_wifi_set", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md"], ["2022", "CVE-2022-0428", "The Content Egg WordPress plugin before 5.3.0 does not sanitise and escape the page parameter before outputting back in an attribute in the Autoblogging admin dashboard, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab"], ["2022", "CVE-2022-38048", "Microsoft Office Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24156", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetVirtualSer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-23835", "** DISPUTED ** The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a \"concrete and exploitable risk.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3750", "The has a CSRF vulnerability that allows the deletion of a post without using a nonce or prompting for confirmation.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676"], ["2022", "CVE-2022-48258", "In Eternal Terminal 6.2.1, etserver and etclient have world-readable logfiles.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-3853", "Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514"], ["2022", "CVE-2022-1956", "The Shortcut Macros WordPress plugin through 1.3 does not have authorisation and CSRF checks in place when updating its settings, which could allow any authenticated users, such as subscriber, to update them.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a"], ["2022", "CVE-2022-30547", "A directory traversal vulnerability exists in the unzipDirectory functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547"], ["2022", "CVE-2022-21633", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0539", "Cross-site Scripting (XSS) - Stored in Packagist ptrofimov/beanstalk_console prior to 1.7.14.", "https://github.com/ARPSyndicate/cvemon https://github.com/noobpk/noobpk", "https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af"], ["2022", "CVE-2022-28141", "Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-42840", "The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2. An app may be able to execute arbitrary code with kernel privileges.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25"], ["2022", "CVE-2022-32442", "u5cms version 8.3.5 is vulnerable to Cross Site Scripting (XSS). When a user accesses the default home page if the parameter passed in is http://127.0.0.1/? \"Onmouseover=%27tzgl (96502)%27bad=\", it can cause html injection.", "https://github.com/Sharpforce/cybersecurity", "No PoCs from references."], ["2022", "CVE-2022-0479", "The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816"], ["2022", "CVE-2022-28390", "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28001", "Movie Seat Reservation v1 was discovered to contain a SQL injection vulnerability at /index.php?page=reserve via the id parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md"], ["2022", "CVE-2022-45063", "xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.", "https://github.com/ARPSyndicate/cvemon https://github.com/dgl/houdini-kubectl-poc https://github.com/kherrick/hacker-news", "No PoCs from references."], ["2022", "CVE-2022-42900", "Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32502", "An issue was discovered on certain Nuki Home Solutions devices. There is a buffer overflow over the encrypted token parsing logic in the HTTP service that allows remote code execution. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/"], ["2022", "CVE-2022-22988", "File and directory permissions have been corrected to prevent unintended users from modifying or accessing resources. It would be more difficult for an authenticated attacker to now traverse through the files and directories. This can only be exploited once an attacker has already found a way to get authenticated access to the device.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22003-edgerover-desktop-app-version-1-5-0-576"], ["2022", "CVE-2022-4070", "Insufficient Session Expiration in GitHub repository librenms/librenms prior to 22.10.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775"], ["2022", "CVE-2022-1816", "A vulnerability, which was classified as problematic, has been found in Zoo Management System 1.0. Affected by this issue is /zoo/admin/public_html/view_accounts?type=zookeeper of the content module. The manipulation of the argument admin_name with the input leads to an authenticated cross site scripting. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md"], ["2022", "CVE-2022-1484", "Heap buffer overflow in Web UI Settings in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1715", "Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.07.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/58918962-ccb5-47f9-bb43-ffd8cae1ef24"], ["2022", "CVE-2022-3610", "The Jeeng Push Notifications WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb"], ["2022", "CVE-2022-24016", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the mesh_status_check binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-2978", "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-35065", "OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x65f724.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md"], ["2022", "CVE-2022-37160", "Claroline 13.5.7 and prior allows an authenticated attacker to elevate privileges via the arbitrary creation of a privileged user. By combining the XSS vulnerability present in several upload forms and a javascript request to the present API, it is possible to trigger the creation of a user with administrative rights by opening an SVG file as an administrator user.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/matthieu-hackwitharts/claroline-CVEs", "https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md"], ["2022", "CVE-2022-26214", "Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function NTPSyncWithHost. This vulnerability allows attackers to execute arbitrary commands via the host_time parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-1412", "The Log WP_Mail WordPress plugin through 0.1 saves sent email in a publicly accessible directory using predictable filenames, allowing any unauthenticated visitor to obtain potentially sensitive information like generated passwords.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2"], ["2022", "CVE-2022-20489", "In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460", "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489 https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20489_old https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-20718", "Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc"], ["2022", "CVE-2022-3517", "A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.", "https://github.com/ARPSyndicate/cvemon https://github.com/anthonykirby/lora-packet https://github.com/git-kick/ioBroker.e3dc-rscp https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-44008", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation, arbitrary local files can be retrieved by accessing the back-end Tomcat server directly.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt"], ["2022", "CVE-2022-3985", "The Videojs HTML5 Player WordPress plugin before 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc"], ["2022", "CVE-2022-27178", "A denial of service vulnerability exists in the confctl_set_wan_cfg functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to denial of service. An attacker can send packets to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506"], ["2022", "CVE-2022-21474", "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-21534", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23431", "An improper boundary check in RPMB ldfw prior to SMR Feb-2022 Release 1 allows arbitrary memory write and code execution.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-45224", "Web-Based Student Clearance System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in Admin/add-admin.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtfullname parameter.", "No PoCs found on GitHub currently.", "https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e"], ["2022", "CVE-2022-4237", "The Welcart e-Commerce WordPress plugin before 2.8.6 does not validate user input before using it in file_exist() functions via various AJAX actions available to any authenticated users, which could allow users with a role as low as subscriber to perform PHAR deserialisation when they can upload a file and a suitable gadget chain is present on the blog", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f"], ["2022", "CVE-2022-1552", "A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3457", "Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nithisssh/CVE-2022-3457 https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-24251", "Extensis Portfolio v4.0 was discovered to contain an authenticated unrestricted file upload vulnerability via the Catalog Asset Upload function.", "No PoCs found on GitHub currently.", "https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/"], ["2022", "CVE-2022-26354", "A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions <= 6.2.0.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20749", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-3546", "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /csms/admin/?page=user/list of the component Create User Handler. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-211046 is the identifier assigned to this vulnerability.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/thehackingverse/CVE-2022-3546 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/thehackingverse/Stored-xss-/blob/main/Poc"], ["2022", "CVE-2022-2929", "In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35034", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e7e3d.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md"], ["2022", "CVE-2022-30852", "Known v1.3.1 was discovered to contain an Insecure Direct Object Reference (IDOR).", "No PoCs found on GitHub currently.", "https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/"], ["2022", "CVE-2022-21425", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-32654", "In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705011; Issue ID: GN20220705011.", "https://github.com/efchatz/WPAxFuzz", "No PoCs from references."], ["2022", "CVE-2022-23520", "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "https://github.com/2lambda123/bomber https://github.com/devops-kung-fu/bomber", "https://hackerone.com/reports/1654310"], ["2022", "CVE-2022-27129", "An arbitrary file upload vulnerability at /admin/ajax.php in zbzcms v1.0 allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-4266", "The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d"], ["2022", "CVE-2022-3894", "The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.5 does not have CSRF check when deleting a client, and does not ensure that the object to be deleted is actually a client, which could allow attackers to make a logged in admin delete arbitrary client and post via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8"], ["2022", "CVE-2022-1991", "A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo \"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 https://vuldb.com/?id.201276"], ["2022", "CVE-2022-40982", "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "https://github.com/EGI-Federation/SVG-advisories https://github.com/bcoles/kasld https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/giterlizzi/secdb-feeds https://github.com/hughsie/python-uswid https://github.com/rosvik/cve-import https://github.com/speed47/spectre-meltdown-checker", "https://downfall.page"], ["2022", "CVE-2022-21565", "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-30580", "Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either \"..com\" or \"..exe\" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"], ["2022", "CVE-2022-28217", "Some part of SAP NetWeaver (EP Web Page Composer) does not sufficiently validate an XML document accepted from an untrusted source, which allows an adversary to exploit unprotected XML parking at endpoints, and a possibility to conduct SSRF attacks that could compromise system\ufffds Availability by causing system to crash.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-28186", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly, which may lead to denial of service or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-2869", "libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42784", "A vulnerability has been identified in LOGO! 12/24RCE (All versions >= V8.3), LOGO! 12/24RCEo (All versions >= V8.3), LOGO! 230RCE (All versions >= V8.3), LOGO! 230RCEo (All versions >= V8.3), LOGO! 24CE (All versions >= V8.3), LOGO! 24CEo (All versions >= V8.3), LOGO! 24RCE (All versions >= V8.3), LOGO! 24RCEo (All versions >= V8.3), SIPLUS LOGO! 12/24RCE (All versions >= V8.3), SIPLUS LOGO! 12/24RCEo (All versions >= V8.3), SIPLUS LOGO! 230RCE (All versions >= V8.3), SIPLUS LOGO! 230RCEo (All versions >= V8.3), SIPLUS LOGO! 24CE (All versions >= V8.3), SIPLUS LOGO! 24CEo (All versions >= V8.3), SIPLUS LOGO! 24RCE (All versions >= V8.3), SIPLUS LOGO! 24RCEo (All versions >= V8.3). Affected devices are vulnerable to an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the product CA. The generation of a custom certificate allows communication with, and impersonation of, any device of the same version.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-24191", "In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow.", "No PoCs found on GitHub currently.", "https://github.com/michaelrsweet/htmldoc/issues/470"], ["2022", "CVE-2022-35174", "A stored cross-site scripting (XSS) vulnerability in Kirby's Starterkit v3.7.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tags field.", "https://github.com/ARPSyndicate/cvemon", "https://www.youtube.com/watch?v=0lngc_zPTSg"], ["2022", "CVE-2022-26305", "An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26094", "Null pointer dereference vulnerability in parser_auxC function in libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by remote attacker.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-37071", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateOne2One.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18"], ["2022", "CVE-2022-30912", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the UpdateWanParams parameter at /goform/aspForm.", "https://github.com/ARPSyndicate/cvemon https://github.com/ilovekeer/IOT_Vul https://github.com/zhefox/IOT_Vul", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4"], ["2022", "CVE-2022-1503", "A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.", "No PoCs found on GitHub currently.", "https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md https://vuldb.com/?id.198542"], ["2022", "CVE-2022-1692", "The CP Image Store with Slideshow WordPress plugin before 1.0.68 does not sanitise and escape the ordering_by query parameter before using it in a SQL statement in pages where the [codepeople-image-store] is embed, allowing unauthenticated users to perform an SQL injection attack", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/cp-image-store_1-0-67 https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571"], ["2022", "CVE-2022-3797", "A vulnerability was found in eolinker apinto-dashboard. It has been rated as problematic. This issue affects some unknown processing of the file /login. The manipulation of the argument callback leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212633 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.212633"], ["2022", "CVE-2022-4044", "A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-23642", "Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.", "https://github.com/ARPSyndicate/cvemon https://github.com/Altelus1/CVE-2022-23642 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/wuhan005/wuhan005 https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html"], ["2022", "CVE-2022-24022", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the pannn binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-37253", "Persistent cross-site scripting (XSS) in Crime Reporting System 1.0 allows a remote attacker to introduce arbitary Javascript via manipulation of an unsanitized POST parameter", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-1721", "Path Traversal in WellKnownServlet in GitHub repository jgraph/drawio prior to 18.0.5. Read local files of the web application.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/000931cc-6d0e-4a4f-b4d8-4ba46ba0e699"], ["2022", "CVE-2022-29359", "A stored cross-site scripting (XSS) vulnerability in /scas/?page=clubs/application_form&id=7 of School Club Application System v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ZSECURE/CVE-2022-29359 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3764", "The plugin does not filter the \"delete_entries\" parameter from user requests, leading to an SQL Injection vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/"], ["2022", "CVE-2022-24162", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the time parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-37082", "TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the host_time parameter at the function NTPSyncWithHost.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3"], ["2022", "CVE-2022-37313", "OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Nov/18"], ["2022", "CVE-2022-21904", "Windows GDI Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/DanielEbert/winafl https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-26067", "An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492"], ["2022", "CVE-2022-21607", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21596", "Vulnerability in the Oracle Database - Advanced Queuing component of Oracle Database Server. The supported version that is affected is 19c. Easily exploitable vulnerability allows high privileged attacker having DBA user privilege with network access via Oracle Net to compromise Oracle Database - Advanced Queuing. Successful attacks of this vulnerability can result in takeover of Oracle Database - Advanced Queuing. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-47012", "Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21.", "https://github.com/fusion-scan/fusion-scan.github.io", "No PoCs from references."], ["2022", "CVE-2022-47383", "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-39190", "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6"], ["2022", "CVE-2022-2799", "The Affiliates Manager WordPress plugin before 2.9.14 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4"], ["2022", "CVE-2022-2408", "The Guest account feature in Mattermost version 6.7.0 and earlier fails to properly restrict the permissions, which allows a guest user to fetch a list of all public channels in the team, in spite of not being part of those channels.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-23493", "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).xrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade.", "https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-4104", "A loop with an unreachable exit condition can be triggered by passing a crafted JPEG file to the Lepton image compression tool, resulting in a denial-of-service.", "No PoCs found on GitHub currently.", "https://tenable.com/security/research/TRA-2022-35"], ["2022", "CVE-2022-4295", "The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56"], ["2022", "CVE-2022-1962", "Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-21716", "Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/vin01/CVEs", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-21487", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-40860", "Tenda AC15 router V15.03.05.19 contains a stack overflow vulnerability in the function formSetQosBand->FUN_0007dd20 with request /goform/SetNetControlList", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md"], ["2022", "CVE-2022-42965", "An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the undocumented get_file_transfer_type method", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/"], ["2022", "CVE-2022-2519", "There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39081", "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-32567", "The Appfire Jira Misc Custom Fields (JMCF) app 2.4.6 for Atlassian Jira allows XSS via a crafted project name to the Add Auto Indexing Rule function.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt"], ["2022", "CVE-2022-4015", "A vulnerability, which was classified as critical, was found in Sports Club Management System 119. This affects an unknown part of the file admin/make_payments.php. The manipulation of the argument m_id/plan leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213789 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/shreyansh225/Sports-Club-Management-System/issues/6 https://vuldb.com/?id.213789"], ["2022", "CVE-2022-4384", "The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.", "https://github.com/HotDB-Community/HotDB-Engine", "https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5"], ["2022", "CVE-2022-1873", "Insufficient policy enforcement in COOP in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-1770", "Improper Privilege Management in GitHub repository polonel/trudesk prior to 1.2.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/74a252a2-8bf6-4f88-a180-b90338a239fa"], ["2022", "CVE-2022-35096", "SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via draw_stroke at /gfxpoly/stroke.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md"], ["2022", "CVE-2022-37193", "Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerable to Incorrect Access Control. Chipolo devices suffer from access revocation evasion attacks once the malicious sharee obtains the access credentials.", "https://github.com/Live-Hack-CVE/CVE-2022-37193", "No PoCs from references."], ["2022", "CVE-2022-37202", "JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/advicefeedback/list", "https://github.com/ARPSyndicate/cvemon https://github.com/AgainstTheLight/CVE-2022-37202 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md"], ["2022", "CVE-2022-23850", "xhtml_translate_entity in xhtml.c in epub2txt (aka epub2txt2) through 2.02 allows a stack-based buffer overflow via a crafted EPUB document.", "https://github.com/ARPSyndicate/cvemon https://github.com/Asteriska001/Poc_Fuzzing https://github.com/Asteriska8/Poc_Fuzzing", "https://github.com/kevinboone/epub2txt2/issues/17"], ["2022", "CVE-2022-40623", "The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 does not utilize anti-CSRF tokens, which, when combined with other issues (such as CVE-2022-35518), can lead to remote, unauthenticated command execution.", "No PoCs found on GitHub currently.", "https://youtu.be/cSileV8YbsQ?t=1028"], ["2022", "CVE-2022-1630", "The WP-EMail WordPress plugin before 2.69.0 does not protect its log deletion functionality with nonce checks, allowing attacker to make a logged in admin delete logs via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3"], ["2022", "CVE-2022-3836", "The Seed Social WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/"], ["2022", "CVE-2022-4155", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6 https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d"], ["2022", "CVE-2022-1933", "The CDI WordPress plugin before 5.1.9 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf"], ["2022", "CVE-2022-30522", "If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.", "https://github.com/ARPSyndicate/cvemon https://github.com/Totes5706/TotesHTB", "No PoCs from references."], ["2022", "CVE-2022-21656", "Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a \"type confusion\" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-42825", "This issue was addressed by removing additional entitlements. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39250", "Matrix JavaScript SDK is the Matrix Client-Server software development kit (SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users\u2019 identities. This would lead to the other device trusting/verifying the user identity under the control of the homeserver instead of the intended one. The vulnerability is a bug in the matrix-js-sdk, caused by checking and signing user identities and devices in two separate steps, and inadequately fixing the keys to be signed between those steps. Even though the attack is partly made possible due to the design decision of treating cross-signing user identities as Matrix devices on the server side (with their device ID set to the public part of the user identity key), no other examined implementations were vulnerable. Starting with version 19.7.0, the matrix-js-sdk has been modified to double check that the key signed is the one that was verified instead of just referencing the key by ID. An additional check has been made to report an error when one of the device ID matches a cross-signing key. As this attack requires coordination between a malicious homeserver and an attacker, those who trust their homeservers do not need a particular workaround.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26156", "An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. Injection of a malicious payload within the RelayState= parameter of the HTTP request body results in the hijacking of the form action. Form-action hijacking vulnerabilities arise when an application places user-supplied input into the action URL of an HTML form. An attacker can use this vulnerability to construct a URL that, if visited by another application user, will modify the action URL of a form to point to the attacker's server.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/karimhabush/cyberowl https://github.com/l00neyhacker/CVE-2022-26156 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-29328", "D-Link DAP-1330_OSS-firmware_1.00b21 was discovered to contain a stack overflow via the function checkvalidupgrade.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/1 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-1853", "Use after free in Indexed DB in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-3956", "A vulnerability classified as critical has been found in tsruban HHIMS 2.1. Affected is an unknown function of the component Patient Portrait Handler. The manipulation of the argument PID leads to sql injection. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. VDB-213462 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/tsruban/HHIMS/issues/1"], ["2022", "CVE-2022-45026", "An issue in Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom allows attackers to execute arbitrary commands during the GFM export process.", "https://github.com/ARPSyndicate/cvemon https://github.com/yuriisanin/yuriisanin", "https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640"], ["2022", "CVE-2022-40840", "ndk design NdkAdvancedCustomizationFields 3.5.0 is vulnerable to Cross Site Scripting (XSS) via createPdf.php.", "No PoCs found on GitHub currently.", "https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt"], ["2022", "CVE-2022-21736", "Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditions that these arguments must satisfy but these are not validated in the implementation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-23773", "cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/YouShengLiu/CVE-2022-23773-Reproduce https://github.com/danbudris/CVE-2022-23773-repro https://github.com/danbudris/CVE-2022-23773-repro-target https://github.com/henriquebesing/container-security https://github.com/k0mi-tg/CVE-POC https://github.com/kb5fls/container-security https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ruzickap/malware-cryptominer-container https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-32407", "Softr v2.0 was discovered to contain a Cross-Site Scripting (XSS) vulnerability via the First Name parameter under the Create A New Account module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", "No PoCs found on GitHub currently.", "https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766"], ["2022", "CVE-2022-42805", "An integer overflow was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/0x36/weightBufs https://github.com/ARPSyndicate/cvemon https://github.com/DRACULA-HACK/test https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-28104", "Foxit PDF Editor v11.3.1 was discovered to contain an arbitrary file upload vulnerability.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166430"], ["2022", "CVE-2022-21676", "Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix has been released for each major branch, namely `4.1.2` for the `4.x.x` branch, `5.2.1` for the `5.x.x` branch, and `6.1.1` for the `6.x.x` branch. There is no known workaround except upgrading to a safe version.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1913", "The Add Post URL WordPress plugin through 2.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead"], ["2022", "CVE-2022-4175", "Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3816", "A vulnerability, which was classified as problematic, was found in Axiomatic Bento4. Affected is an unknown function of the component mp4decrypt. The manipulation leads to memory leak. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212682 is the identifier assigned to this vulnerability.", "https://github.com/z1r00/fuzz_vuln", "https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip https://github.com/axiomatic-systems/Bento4/issues/792"], ["2022", "CVE-2022-3484", "The WPB Show Core WordPress plugin does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.", "https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464"], ["2022", "CVE-2022-3715", "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.", "https://github.com/1g-v/DevSec_Docker_lab https://github.com/ARPSyndicate/cvemon https://github.com/L-ivan7/-.-DevSec_Docker https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/carbonetes/jacked-action https://github.com/carbonetes/jacked-jenkins https://github.com/cdupuis/image-api https://github.com/fokypoky/places-list https://github.com/frida963/ThousandEyesChallenge", "No PoCs from references."], ["2022", "CVE-2022-1581", "The WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations.", "https://github.com/Live-Hack-CVE/CVE-2022-1581", "No PoCs from references."], ["2022", "CVE-2022-1610", "The Seamless Donations WordPress plugin before 5.1.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93"], ["2022", "CVE-2022-26387", "When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.mozilla.org/show_bug.cgi?id=1752979"], ["2022", "CVE-2022-30990", "Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Linux) before build 29240, Acronis Agent (Linux) before build 28037", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24282", "A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35267", "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_https_cert_file/` API.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575"], ["2022", "CVE-2022-32895", "A race condition was addressed with improved state handling. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file system.", "https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-3604", "The Contact Form Entries WordPress plugin before 1.3.0 does not validate data when its output in a CSV file, which could lead to CSV injection.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/"], ["2022", "CVE-2022-1701", "SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions uses a shared and hard-coded encryption key to store data.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21864", "Windows UI Immersive Server API Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26296", "BOOM: The Berkeley Out-of-Order RISC-V Processor commit d77c2c3 was discovered to allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "No PoCs found on GitHub currently.", "https://github.com/riscv-boom/riscv-boom/issues/577"], ["2022", "CVE-2022-26107", "When a user opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-40712", "An issue was discovered in NOKIA 1350OMS R14.2. Reflected XSS exists under different /cgi-bin/R14.2* endpoints.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-28384", "An issue was discovered in certain Verbatim drives through 2022-03-31. Due to an insecure design, they allow an offline brute-force attack for determining the correct passcode, and thus gaining unauthorized access to the stored encrypted data. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428 and Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html http://seclists.org/fulldisclosure/2022/Jun/17 http://seclists.org/fulldisclosure/2022/Jun/8 http://seclists.org/fulldisclosure/2022/Oct/3 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt"], ["2022", "CVE-2022-28015", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\cashadvance_edit.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-21767", "In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784430; Issue ID: ALPS06784430.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-1802", "If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ajblkf/microscope https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mistymntncop/CVE-2022-1802 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4064", "A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/petergoldstein/dalli/issues/932"], ["2022", "CVE-2022-3907", "The Clerk WordPress plugin before 4.0.0 is affected by time-based attacks in the validation function for all API requests due to the usage of comparison operators to verify API keys against the ones stored in the site options.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c"], ["2022", "CVE-2022-1942", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071"], ["2022", "CVE-2022-3847", "The Showing URL in QR Code WordPress plugin through 0.0.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin or editor add Stored XSS payloads via a CSRF attack", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/ https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6"], ["2022", "CVE-2022-4124", "The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF checks when deleting popups, which could allow unauthenticated users to delete them", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2"], ["2022", "CVE-2022-32456", "Digiwin BPM\u2019s function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL command to access, modify, delete database or disrupt service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42854", "The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.2, macOS Ventura 13.1. An app may be able to disclose kernel memory.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/24"], ["2022", "CVE-2022-21627", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-37333", "SQL injection vulnerability in the Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows remote authenticated attackers to execute arbitrary SQL commands.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24142", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetFirewallCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the firewallEn parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-1641", "Use after free in Web UI Diagnostics in Google Chrome on Chrome OS prior to 101.0.4951.64 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-4097", "The All-In-One Security (AIOS) WordPress plugin before 5.0.8 is susceptible to IP Spoofing attacks, which can lead to bypassed security features (like IP blocks, rate limiting, brute force protection, and more).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4"], ["2022", "CVE-2022-43588", "A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647"], ["2022", "CVE-2022-4306", "The Panda Pods Repeater Field WordPress plugin before 1.5.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a user having at least Contributor permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe"], ["2022", "CVE-2022-45315", "Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet.", "No PoCs found on GitHub currently.", "https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md"], ["2022", "CVE-2022-21405", "Vulnerability in the OSS Support Tools product of Oracle Support Tools (component: Oracle Explorer). The supported version that is affected is 18.3. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where OSS Support Tools executes to compromise OSS Support Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in OSS Support Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all OSS Support Tools accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-40470", "Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.", "https://github.com/RashidKhanPathan/CVE-2022-40470 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing"], ["2022", "CVE-2022-26265", "Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.", "https://github.com/Inplex-sys/CVE-2022-26265 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/redteamsecurity2023/CVE-2022-26265 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-24360", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15744.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-35014", "Advancecomp v2.3 contains a segmentation fault.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md"], ["2022", "CVE-2022-2909", "A vulnerability was found in SourceCodester Simple and Nice Shopping Cart Script. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /mkshop/Men/profile.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206845 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206845"], ["2022", "CVE-2022-44079", "pycdc commit 44a730f3a889503014fec94ae6e62d8401cb75e5 was discovered to contain a stack overflow via the component __sanitizer::StackDepotBase<__sanitizer::StackDepotNode.", "No PoCs found on GitHub currently.", "https://github.com/zrax/pycdc/issues/291"], ["2022", "CVE-2022-20769", "A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3426", "The Advanced WP Columns WordPress plugin through 2.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f"], ["2022", "CVE-2022-37051", "An issue was discovered in Poppler 22.07.0. There is a reachable abort which leads to denial of service because the main function in pdfunite.cc lacks a stream check before saving an embedded file.", "No PoCs found on GitHub currently.", "https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276"], ["2022", "CVE-2022-32837", "This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to cause unexpected system termination or write kernel memory.", "https://github.com/ARPSyndicate/cvemon https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-35154", "Shopro Mall System v1.3.8 was discovered to contain a SQL injection vulnerability via the value parameter.", "No PoCs found on GitHub currently.", "https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md"], ["2022", "CVE-2022-2849", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e"], ["2022", "CVE-2022-30631", "Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-21545", "Vulnerability in the Oracle iRecruitment product of Oracle E-Business Suite (component: Candidate Self Service Registration). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iRecruitment. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle iRecruitment accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-4246", "A vulnerability classified as problematic has been found in Kakao PotPlayer. This affects an unknown part of the component MID File Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214623.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Nov/16"], ["2022", "CVE-2022-21454", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-30720", "Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-4357", "The LetsRecover WordPress plugin before 1.2.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626"], ["2022", "CVE-2022-3537", "The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e"], ["2022", "CVE-2022-20738", "A vulnerability in the Cisco Umbrella Secure Web Gateway service could allow an unauthenticated, remote attacker to bypass the file inspection feature. This vulnerability is due to insufficient restrictions in the file inspection feature. An attacker could exploit this vulnerability by downloading a crafted payload through specific methods. A successful exploit could allow the attacker to bypass file inspection protections and download a malicious payload.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p"], ["2022", "CVE-2022-1432", "Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf"], ["2022", "CVE-2022-37140", "PayMoney 3.3 is vulnerable to Client Side Remote Code Execution (RCE). The vulnerability exists on the reply ticket function and upload the malicious file. A calculator will open when the victim who download the file open the RTF file.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://github.com/saitamang/POC-DUMP/tree/main/PayMoney"], ["2022", "CVE-2022-35045", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0d63.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md"], ["2022", "CVE-2022-2958", "The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a"], ["2022", "CVE-2022-30963", "Jenkins JDK Parameter Plugin 1.0 and earlier does not escape the name and description of JDK parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.", "https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-21986", ".NET Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/actions-marketplace-validations/xt0rted_dotnet-sdk-updater https://github.com/xt0rted/dotnet-sdk-updater", "No PoCs from references."], ["2022", "CVE-2022-35105", "SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via /bin/png2swf+0x552cea.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-35294", "An attacker with basic business user privileges could craft and upload a malicious file to SAP NetWeaver Application Server ABAP, which is then downloaded and viewed by other users resulting in a stored Cross-Site-Scripting attack. This could lead to information disclosure including stealing authentication information and impersonating the affected user.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-2818", "Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository cockpit-hq/cockpit prior to 2.2.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491"], ["2022", "CVE-2022-3477", "The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address", "https://github.com/truocphan/VulnBox", "https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef"], ["2022", "CVE-2022-1572", "The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in an AJAX action, available to any authenticated users such as subscriber, which could allow them to delete arbitrary file", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5"], ["2022", "CVE-2022-34269", "An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution.", "No PoCs found on GitHub currently.", "https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver"], ["2022", "CVE-2022-4186", "Insufficient validation of untrusted input in Downloads in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to bypass Downloads restrictions via a crafted HTML page. (Chromium security severity: Medium)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4217", "The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_key' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e"], ["2022", "CVE-2022-39112", "In Music service, there is a missing permission check. This could lead to local denial of service in Music service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-45204", "GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2307"], ["2022", "CVE-2022-32765", "An OS command injection vulnerability exists in the sysupgrade command injection functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576"], ["2022", "CVE-2022-21514", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Remote Administration Daemon). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23716", "A flaw was discovered in ECE before 3.1.1 that could lead to the disclosure of the SAML signing private key used for the RBAC features, in deployment logs in the Logging and Monitoring cluster.", "No PoCs found on GitHub currently.", "https://www.elastic.co/community/security/"], ["2022", "CVE-2022-39215", "Tauri is a framework for building binaries for all major desktop platforms. Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked. The issue has been resolved in version 1.0.6 and the implementation now properly checks if the requested (sub) directory is a symbolic link outside of the defined `scope`. Users are advised to upgrade. Users unable to upgrade should disable the `readDir` endpoint in the `allowlist` inside the `tauri.conf.json`.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0688", "Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/Nithisssh/CVE-2022-0688 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-0519", "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3"], ["2022", "CVE-2022-21613", "Vulnerability in the Oracle Enterprise Data Quality product of Oracle Fusion Middleware (component: Dashboard). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Data Quality. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Data Quality, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Data Quality accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Data Quality accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Enterprise Data Quality. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21582", "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-4110", "The Eventify\u2122 WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c"], ["2022", "CVE-2022-3873", "Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/drawio prior to 20.5.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/52a4085e-b687-489b-9ed6-f0987583ed77"], ["2022", "CVE-2022-38179", "JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/motoyasu-saburi/reported_vulnerability", "No PoCs from references."], ["2022", "CVE-2022-26073", "A denial of service vulnerability exists in the libxm_av.so DemuxCmdInBuffer functionality of Anker Eufy Homebase 2 2.1.8.5h. A specially-crafted set of network packets can lead to a device reboot. An attacker can send packets to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480"], ["2022", "CVE-2022-37096", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EnableIpv6.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11"], ["2022", "CVE-2022-37307", "OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Nov/18"], ["2022", "CVE-2022-35193", "TestLink v1.9.20 was discovered to contain a SQL injection vulnerability via /lib/execute/execNavigator.php.", "No PoCs found on GitHub currently.", "https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193"], ["2022", "CVE-2022-26133", "SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.", "https://github.com/0xAbbarhSF/CVE-2022-26133 https://github.com/0xStarFord/CVE-2022-26133 https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet https://github.com/BrittanyKuhn/javascript-tutorial https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet https://github.com/HimmelAward/Goby_POC https://github.com/Holyshitbruh/2022-2021-RCE https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Pear1y/CVE-2022-26133 https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/d4n-sec/d4n-sec.github.io https://github.com/f0ur0four/Insecure-Deserialization https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tanjiti/sec_profile https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1735", "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9"], ["2022", "CVE-2022-3933", "The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4"], ["2022", "CVE-2022-4050", "The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f"], ["2022", "CVE-2022-28021", "Purchase Order Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via /purchase_order/admin/?page=user.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md"], ["2022", "CVE-2022-42920", "Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/binkley/modern-java-practices", "No PoCs from references."], ["2022", "CVE-2022-45043", "Tenda AX12 V22.03.01.16_cn is vulnerable to command injection via goform/fast_setting_internet_set.", "No PoCs found on GitHub currently.", "https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2"], ["2022", "CVE-2022-30427", "In ginadmin through 05-10-2022 the incoming path value is not filtered, resulting in directory traversal.", "No PoCs found on GitHub currently.", "https://github.com/gphper/ginadmin/issues/8"], ["2022", "CVE-2022-1927", "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777"], ["2022", "CVE-2022-3822", "The Donations via PayPal WordPress plugin before 1.9.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13"], ["2022", "CVE-2022-4141", "Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f"], ["2022", "CVE-2022-39244", "PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42732", "A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper read access control that could allow files to be retrieved from any folder accessible to the account assigned to the website\u2019s application pool.", "No PoCs found on GitHub currently.", "https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697"], ["2022", "CVE-2022-24127", "A Stored Cross-Site Scripting (XSS) vulnerability was discovered in ProjectGeneral/edit_project_settings.php in REDCap 12.0.11. This issue allows any user with project management permissions to inject arbitrary code into the project title (app_title) field when editing an existing project. The payload is then reflected within the title tag of the page.", "No PoCs found on GitHub currently.", "https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/"], ["2022", "CVE-2022-3721", "Code Injection in GitHub repository froxlor/froxlor prior to 0.10.39.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a3c506f0-5f8a-4eaa-b8cc-46fb9e35cf7a"], ["2022", "CVE-2022-1624", "The Latest Tweets Widget WordPress plugin through 1.1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7"], ["2022", "CVE-2022-41889", "TensorFlow is an open source platform for machine learning. If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in `tf.compat.v1.extract_volume_patches` by passing in quantized tensors as input `ksizes`. We have patched the issue in GitHub commit e9e95553e5411834d215e6770c81a83a3d0866ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-1764", "The WP-chgFontSize WordPress plugin through 1.8 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868"], ["2022", "CVE-2022-21801", "A denial of service vulnerability exists in the netserver recv_command functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted network request can lead to a reboot. An attacker can send a malicious packet to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1450"], ["2022", "CVE-2022-32573", "A directory traversal vulnerability exists in the AssetActions.aspx addDoc functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file upload. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528"], ["2022", "CVE-2022-23596", "Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.", "No PoCs found on GitHub currently.", "https://github.com/junrar/junrar/issues/73"], ["2022", "CVE-2022-39095", "In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-0408", "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d"], ["2022", "CVE-2022-40874", "Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow vulnerability in the GetParentControlInfo function, which can cause a denial of service attack through a carefully constructed http request.", "No PoCs found on GitHub currently.", "https://www.cnblogs.com/L0g4n-blog/p/16695155.html"], ["2022", "CVE-2022-30476", "Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a stack-based buffer overflow in the httpd module when handling /goform/SetFirewallCfg request.", "https://github.com/ARPSyndicate/cvemon https://github.com/lcyfrank/VulnRepo", "https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6"], ["2022", "CVE-2022-21702", "Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/happyhacking-k/happyhacking-k", "No PoCs from references."], ["2022", "CVE-2022-21493", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-1867", "Insufficient validation of untrusted input in Data Transfer in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass same origin policy via a crafted clipboard content.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-3443", "Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page. (Chromium security severity: Low)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31538", "The joaopedro-fg/mp-m08-interface repository through 2020-12-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46059", "AeroCMS v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-CSRF/add_user_csrf/add_user_csrf.md"], ["2022", "CVE-2022-1546", "The WooCommerce - Product Importer WordPress plugin through 1.5.2 does not sanitise and escape the imported data before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595"], ["2022", "CVE-2022-0929", "XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03"], ["2022", "CVE-2022-30957", "A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.", "https://github.com/ARPSyndicate/cvemon https://github.com/EMLamban/jenkins https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-35131", "Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/ly1g3/Joplin-CVE-2022-35131 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/laurent22/joplin/releases/tag/v2.9.1 https://github.com/ly1g3/Joplin-CVE-2022-35131"], ["2022", "CVE-2022-32751", "IBM Security Verify Directory 10.0.0 could disclose sensitive server information that could be used in further attacks against the system. IBM X-Force ID: 228437.", "https://github.com/NaInSec/CVE-LIST", "No PoCs from references."], ["2022", "CVE-2022-23425", "Improper input validation in Exynos baseband prior to SMR Feb-2022 Release 1 allows attackers to send arbitrary NAS signaling messages with fake base station.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-21520", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Fluid Core). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-41639", "A heap based buffer overflow vulnerability exists in tile decoding code of TIFF image parser in OpenImageIO master-branch-9aeece7a and v2.3.19.0. A specially-crafted TIFF file can lead to an out of bounds memory corruption, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633"], ["2022", "CVE-2022-36358", "Cross-Site Request Forgery (CSRF) vulnerability in SEO Scout plugin <= 0.9.83 at WordPress allows attackers to trick users with administrative rights to unintentionally change the plugin settings.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4223", "The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.", "https://github.com/Threekiii/Awesome-POC", "No PoCs from references."], ["2022", "CVE-2022-1894", "The Popup Builder WordPress plugin before 4.1.11 does not escape and sanitize some settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfiltred_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971"], ["2022", "CVE-2022-39066", "There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/v0lp3/CVE-2022-39066 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-21460", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-30714", "Information exposure vulnerability in SemIWCMonitor prior to SMR Jun-2022 Release 1 allows local attackers to get MAC address information.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-40887", "SourceCodester Best Student Result Management System 1.0 is vulnerable to SQL Injection.", "https://github.com/karimhabush/cyberowl", "https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md"], ["2022", "CVE-2022-0869", "Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342"], ["2022", "CVE-2022-32912", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/39 http://seclists.org/fulldisclosure/2022/Oct/40 http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/47 http://seclists.org/fulldisclosure/2022/Oct/49 http://seclists.org/fulldisclosure/2022/Oct/50"], ["2022", "CVE-2022-3503", "A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the component Supplier Handler. The manipulation of the argument Supplier Name/Address/Contact person/Contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210832.", "No PoCs found on GitHub currently.", "https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC"], ["2022", "CVE-2022-31478", "The UserTakeOver plugin before 4.0.1 for ILIAS allows an attacker to list all users via the search function.", "No PoCs found on GitHub currently.", "https://medium.com/@bcksec/ilias-lms-usertakeover-4-0-1-vulnerability-b2824679403"], ["2022", "CVE-2022-26311", "Couchbase Operator 2.2.x before 2.2.3 exposes Sensitive Information to an Unauthorized Actor. Secrets are not redacted in logs collected from Kubernetes environments.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22489", "IBM MQ 8.0, (9.0, 9.1, 9.2 LTS), and (9.1 and 9.2 CD) are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 226339.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22718", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Al1ex/WindowsElevation https://github.com/J0hnbX/2022-22718 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ahmetfurkans/CVE-2022-22718 https://github.com/binganao/vulns-2022 https://github.com/clearbluejar/cve-markdown-charts https://github.com/k0mi-tg/CVE-POC https://github.com/ly4k/SpoolFool https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/tzwlhack/SpoolFool https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1686", "The Five Minute Webshop WordPress plugin through 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2 https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71"], ["2022", "CVE-2022-41668", "A CWE-704: Incorrect Project Conversion vulnerability exists that allows adversaries with local user privileges to load a project file from an adversary-controlled network share which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).", "No PoCs found on GitHub currently.", "https://www.se.com/ww/en/download/document/SEVD-2022-284-01/"], ["2022", "CVE-2022-36309", "Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4"], ["2022", "CVE-2022-3880", "The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan WordPress plugin before 4.20 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e"], ["2022", "CVE-2022-4272", "A vulnerability, which was classified as critical, has been found in FeMiner wms. Affected by this issue is some unknown functionality of the file /product/savenewproduct.php?flag=1. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214760.", "No PoCs found on GitHub currently.", "https://github.com/FeMiner/wms/issues/14"], ["2022", "CVE-2022-42893", "A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow to write data in any folder accessible to the account assigned to the website\u2019s application pool.", "No PoCs found on GitHub currently.", "https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697"], ["2022", "CVE-2022-28192", "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-23474", "Editor.js is a block-style editor with clean JSON output. Versions prior to 2.26.0 are vulnerable to Code Injection via pasted input. The processHTML method passes pasted input into wrapper\u2019s innerHTML. This issue is patched in version 2.26.0.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/"], ["2022", "CVE-2022-30594", "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "https://github.com/ARPSyndicate/cvemon https://github.com/Lay0us1/linux-4.19.72_CVE-2022-30594 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/linux-4.19.72_CVE-2022-30594 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2"], ["2022", "CVE-2022-30605", "A privilege escalation vulnerability exists in the session id functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535"], ["2022", "CVE-2022-21571", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.36. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-40996", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no firmwall srcmac (WORD|null) srcip (A.B.C.D|null) dstip (A.B.C.D|null) protocol (none|tcp|udp|icmp) srcport (<1-65535>|null) dstport (<1-65535>|null) policy (drop|accept) description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-21431", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.4 and 12.0.0.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via TCP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-3552", "Unrestricted Upload of File with Dangerous Type in GitHub repository boxbilling/boxbilling prior to 0.0.1.", "https://github.com/kabir0x23/CVE-2022-3552 https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html https://huntr.dev/bounties/c6e2973d-386d-4667-9426-10d10828539b"], ["2022", "CVE-2022-22658", "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 16.0.3. Processing a maliciously crafted email message may lead to a denial-of-service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1457", "Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046"], ["2022", "CVE-2022-40444", "ZZCMS 2022 was discovered to contain a full path disclosure vulnerability via the page /admin/index.PHP? _server.", "No PoCs found on GitHub currently.", "https://github.com/liong007/ZZCMS/issues/2"], ["2022", "CVE-2022-0838", "Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bd2fb1f1-cc8b-4ef7-8e2b-4ca686d8d614"], ["2022", "CVE-2022-26251", "The HTTP interface of Synaman v5.1 and below was discovered to allow authenticated attackers to execute arbitrary code and escalate privileges.", "No PoCs found on GitHub currently.", "https://www.bencteux.fr/posts/synaman/"], ["2022", "CVE-2022-37125", "D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/NTPSyncWithHost.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-24354", "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835.", "https://github.com/0vercl0k/zenith https://github.com/ARPSyndicate/cvemon https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/ndk191/linux-kernel-exploitation https://github.com/ssr-111/linux-kernel-exploitation https://github.com/xairy/linux-kernel-exploitation", "No PoCs from references."], ["2022", "CVE-2022-32943", "The issue was addressed with improved bounds checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Shake-to-undo may allow a deleted photo to be re-surfaced without authentication.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/23"], ["2022", "CVE-2022-35020", "Advancecomp v2.3 was discovered to contain a heap buffer overflow via the component __interceptor_memcpy at /sanitizer_common/sanitizer_common_interceptors.inc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md"], ["2022", "CVE-2022-27830", "Improper validation vulnerability in SemBlurInfo prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-38555", "Linksys E1200 v1.0.04 is vulnerable to Buffer Overflow via ej_get_web_page_name.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/1"], ["2022", "CVE-2022-33322", "Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf"], ["2022", "CVE-2022-0135", "An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2030", "A directory traversal vulnerability caused by specific character sequences within an improperly sanitized URL was identified in some CGI programs of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.11 through 4.72, that could allow an authenticated attacker to access some restricted files on a vulnerable device.", "https://github.com/ARPSyndicate/cvemon https://github.com/f0cus77/awesome-iot-security-resource https://github.com/f1tao/awesome-iot-security-resource", "No PoCs from references."], ["2022", "CVE-2022-25636", "net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/B0nfee/CVE-2022-25636 https://github.com/Bonfee/CVE-2022-25636 https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Ch4nc3n/PublicExploitation https://github.com/EGI-Federation/SVG-advisories https://github.com/GhostTroops/TOP https://github.com/JERRY123S/all-poc https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/Meowmycks/OSCPprep-Cute https://github.com/Meowmycks/OSCPprep-Sar https://github.com/Meowmycks/OSCPprep-hackme1 https://github.com/Metarget/metarget https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SnailDev/github-hot-hub https://github.com/WhooAmii/POC_to_review https://github.com/boustrophedon/extrasafe https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/carmilea/carmilea https://github.com/chenaotian/CVE-2022-25636 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/hancp2016/news https://github.com/hardenedvault/ved https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/jakescheetz/OWASP-JuiceShop https://github.com/jbmihoub/all-poc https://github.com/jpacg/awesome-stars https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/lonnyzhang423/github-hot-hub https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pipiscrew/timeline https://github.com/soosmile/POC https://github.com/ssr-111/linux-kernel-exploitation https://github.com/taielab/awesome-hacking-lists https://github.com/trhacknon/Pocingit https://github.com/veritas501/CVE-2022-25636-PipeVersion https://github.com/veritas501/pipe-primitive https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/yaobinwen/robin_on_rails https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zhaoolee/garss https://github.com/zzcentury/PublicExploitation", "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html https://github.com/Bonfee/CVE-2022-25636 https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/ https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-48654", "In the Linux kernel, the following vulnerability has been resolved:netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()nf_osf_find() incorrectly returns true on mismatch, this leads tocopying uninitialized memory area in nft_osf which can be used to leakstale kernel stack data to userspace.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-43023", "OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the importID parameter in the Import viewerrors function.", "No PoCs found on GitHub currently.", "https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_imports_errors.md"], ["2022", "CVE-2022-36447", "An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted tokens minted on the Chia blockchain using the CAT1 standard can be inflated to an arbitrary extent by any holder of any amount of the token. The total amount of the token can be increased as high as the malicious actor pleases. This is true for every CAT1 on the Chia blockchain regardless of issuance rules. This attack is auditable on chain, so maliciously altered coins can potentially be marked by off-chain observers as malicious.", "No PoCs found on GitHub currently.", "https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html"], ["2022", "CVE-2022-29862", "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.", "No PoCs found on GitHub currently.", "https://opcfoundation.org/security/"], ["2022", "CVE-2022-36507", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function AddWlanMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12"], ["2022", "CVE-2022-37968", "Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability. ", "https://github.com/ARPSyndicate/cvemon https://github.com/wiz-sec-public/cloud-middleware-dataset https://github.com/wiz-sec/cloud-middleware-dataset", "No PoCs from references."], ["2022", "CVE-2022-2170", "The Microsoft Advertising Universal Event Tracking (UET) WordPress plugin before 1.0.4 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. Due to the nature of this plugin, well crafted XSS can also leak into the frontpage.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed"], ["2022", "CVE-2022-31367", "Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.", "https://github.com/ARPSyndicate/cvemon https://github.com/kos0ng/CVEs", "https://github.com/strapi/strapi/releases/tag/v3.6.10 https://github.com/strapi/strapi/releases/tag/v4.1.10"], ["2022", "CVE-2022-1088", "The Page Security & Membership WordPress plugin through 1.5.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b"], ["2022", "CVE-2022-1319", "A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-38784", "Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "https://github.com/jeffssh/CVE-2021-30860"], ["2022", "CVE-2022-22116", "In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim\u2019s browser when they open the image URL.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116"], ["2022", "CVE-2022-25875", "The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-SVELTE-2931080"], ["2022", "CVE-2022-36884", "The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.", "https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-1208", "The Ultimate Member plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Biography field featured on individual user profile pages due to insufficient input sanitization and output escaping that allows users to encode malicious web scripts with HTML encoding that is reflected back on the page. This affects versions up to, and including, 2.3.2. Please note this issue was only partially fixed in version 2.3.2.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46486", "A lack of pointer-validation logic in the __scone_dispatch component of SCONE before v5.8.0 for Intel SGX allows attackers to access sensitive information.", "No PoCs found on GitHub currently.", "https://jovanbulck.github.io/files/ccs19-tale.pdf"], ["2022", "CVE-2022-29670", "CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/21#issue-1207638326"], ["2022", "CVE-2022-48594", "A SQL injection vulnerability exists in the \u201cticket watchers email\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48594/"], ["2022", "CVE-2022-34682", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a null-pointer dereference, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-41177", "Due to lack of proper memory management, when a victim opens a manipulated Iges Part and Assembly (.igs, .iges, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-0164", "The Coming soon and Maintenance mode WordPress plugin before 3.5.3 does not have authorisation and CSRF checks in its coming_soon_send_mail AJAX action, allowing any authenticated users, with a role as low as subscriber to send arbitrary emails to all subscribed users", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51"], ["2022", "CVE-2022-2061", "Heap-based Buffer Overflow in GitHub repository hpjansson/chafa prior to 1.12.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/365ab61f-9a63-421c-97e6-21d4653021f0"], ["2022", "CVE-2022-24999", "qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has \"deps: qs@6.9.7\" in its release description, is not vulnerable).", "https://github.com/ARPSyndicate/cvemon https://github.com/HotDB-Community/HotDB-Engine https://github.com/OpsMx/Scout-Service https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0imet/pyfetch https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/n8tz/CVE-2022-24999 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/norefice-github/juvenile https://github.com/seal-community/patches https://github.com/whoforget/CVE-POC https://github.com/xiangzaixiansheng/nodejs_tool https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/n8tz/CVE-2022-24999"], ["2022", "CVE-2022-0024", "A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls. This issue does not impact Panorama appliances or Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.23; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29833", "Insufficiently Protected Credentials vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users could access to MELSEC safety CPU modules illgally.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf"], ["2022", "CVE-2022-20042", "In Bluetooth, there is a possible information disclosure due to incorrect error handling. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108487; Issue ID: ALPS06108487.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-29730", "USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device.", "No PoCs found on GitHub currently.", "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php"], ["2022", "CVE-2022-38444", "Adobe Dimension versions 3.4.5 is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0206", "The NewStatPress WordPress plugin before 1.3.6 does not properly escape the whatX parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9"], ["2022", "CVE-2022-0197", "phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2"], ["2022", "CVE-2022-2092", "The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 2.16.0 doesn't escape a parameter on its setting page, making it possible for attackers to conduct reflected cross-site scripting attacks.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d"], ["2022", "CVE-2022-43081", "Fast Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /fastfood/purchase.php.", "No PoCs found on GitHub currently.", "https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md"], ["2022", "CVE-2022-25505", "Taocms v3.0.2 was discovered to contain a SQL injection vulnerability via the id parameter in \\include\\Model\\Category.php.", "https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-34671", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user-mode layer, where an unprivileged user can cause an out-of-bounds write, which may lead to code execution, information disclosure, and denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721"], ["2022", "CVE-2022-27791", "Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) is affected by a stack-based buffer overflow vulnerability due to insecure processing of a font, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41215", "SAP NetWeaver ABAP Server and ABAP Platform allows an unauthenticated attacker to redirect users to a malicious site due to insufficient URL validation. This could lead to the user being tricked to disclose personal information.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41184", "Due to lack of proper memory management, when a victim opens a manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-46475", "D-Link DIR 645A1 1.06B01_Beta01 was discovered to contain a stack overflow via the service= variable in the genacgi_main function.", "No PoCs found on GitHub currently.", "https://github.com/Insight8991/iot/blob/main/DIR-645%20genacgi%20Stack%20overflow.md"], ["2022", "CVE-2022-31285", "An issue was discovered in Bento4 1.2. The allocator is out of memory in /Source/C++/Core/Ap4Array.h.", "https://github.com/ARPSyndicate/cvemon https://github.com/a4865g/Cheng-fuzz", "https://github.com/axiomatic-systems/Bento4/issues/702"], ["2022", "CVE-2022-34972", "So Filter Shop v3.x was discovered to contain multiple blind SQL injection vulnerabilities via the att_value_id , manu_value_id , opt_value_id , and subcate_value_id parameters at /index.php?route=extension/module/so_filter_shop_by/filter_data.", "https://github.com/nomi-sec/PoC-in-GitHub", "https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html"], ["2022", "CVE-2022-33011", "Known v1.3.1+2020120201 was discovered to allow attackers to perform an account takeover via a host header injection attack.", "No PoCs found on GitHub currently.", "https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/"], ["2022", "CVE-2022-29683", "CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/Label/page_del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/34#issue-1209056912"], ["2022", "CVE-2022-44570", "A denial of service vulnerability in the Range header parsing component of Rack >= 1.5.0. A Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.", "https://github.com/ARPSyndicate/cvemon https://github.com/holmes-py/reports-summary", "No PoCs from references."], ["2022", "CVE-2022-24729", "CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-46535", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/SetClientState.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md"], ["2022", "CVE-2022-29452", "Authenticated (editor or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Export All URLs plugin <= 4.1 at WordPress.", "https://github.com/ARPSyndicate/cvemon https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-43250", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_0_0_fallback_16 in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/346"], ["2022", "CVE-2022-25445", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/1"], ["2022", "CVE-2022-36634", "An access control issue in ZKTeco ZKBioSecurity V5000 3.0.5_r allows attackers to arbitrarily create admin users via a crafted HTTP request.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Sep/29"], ["2022", "CVE-2022-47659", "GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2354"], ["2022", "CVE-2022-0346", "The XML Sitemap Generator for Google WordPress plugin before 2.0.4 does not validate a parameter which can be set to an arbitrary value, thus causing XSS via error message or RCE if allow_url_include is turned on.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6"], ["2022", "CVE-2022-38934", "readelf in ToaruOS 2.0.1 has some arbitrary address read vulnerabilities when parsing a crafted ELF file.", "https://github.com/liyansong2018/CVE", "https://github.com/klange/toaruos/issues/244"], ["2022", "CVE-2022-25554", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function saveParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS) via the deviceId parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10"], ["2022", "CVE-2022-27451", "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28094"], ["2022", "CVE-2022-0257", "pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenGitLab/Bug-Storage", "https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6"], ["2022", "CVE-2022-23058", "ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the \u2018username\u2019 field in \u2018my settings\u2019 which can lead to full account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23058"], ["2022", "CVE-2022-2352", "The Post SMTP Mailer/Email Log WordPress plugin before 2.1.7 does not have proper authorisation in some AJAX actions, which could allow high privilege users such as admin to perform blind SSRF on multisite installations for example.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c"], ["2022", "CVE-2022-38637", "Hospital Management System v1.0 was discovered to contain multiple SQL injection vulnerabilities via the Username and Password parameters on the Login page.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://www.youtube.com/watch?v=m8nW0p69UHU"], ["2022", "CVE-2022-27983", "RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain an arbitrary file read vulnerability via the url parameter in check.php.", "No PoCs found on GitHub currently.", "https://www.adminxe.com/3687.html"], ["2022", "CVE-2022-22274", "A Stack-based buffer overflow vulnerability in the SonicOS via HTTP request allows a remote unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution in the firewall.", "https://github.com/4lucardSec/Sonic_CVE-2022-22274_poc https://github.com/ARPSyndicate/cvemon https://github.com/BishopFox/CVE-2022-22274_CVE-2023-0656 https://github.com/forthisvideo/CVE-2022-22274_poc https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pwneddr/Sonic_CVE-2022-22274_poc https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-38777", "An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.", "No PoCs found on GitHub currently.", "https://www.elastic.co/community/security"], ["2022", "CVE-2022-24778", "The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40068", "Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: formSetQosBand.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10"], ["2022", "CVE-2022-0086", "uppy is vulnerable to Server-Side Request Forgery (SSRF)", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/Haxatron", "https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122"], ["2022", "CVE-2022-23118", "Jenkins Debian Package Builder Plugin 1.6.11 and earlier implements functionality that allows agents to invoke command-line `git` at an attacker-specified path on the controller, allowing attackers able to control agent processes to invoke arbitrary OS commands on the controller.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-2212", "A vulnerability was found in SourceCodester Library Management System 1.0. It has been classified as critical. Affected is an unknown function of the component /card/index.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/File_Upload/POC.md https://vuldb.com/?id.202758"], ["2022", "CVE-2022-2183", "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975"], ["2022", "CVE-2022-48476", "In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible", "https://github.com/trailofbits/publications", "No PoCs from references."], ["2022", "CVE-2022-25414", "Tenda AC9 V15.03.2.21_cn was discovered to contain a stack overflow via the parameter NPTR.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1"], ["2022", "CVE-2022-25785", "Stack-based Buffer Overflow vulnerability in SiteManager allows logged-in or local user to cause arbitrary code execution. This issue affects: Secomea SiteManager all versions prior to 9.7.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-27511", "Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.", "https://github.com/ARPSyndicate/cvemon https://github.com/rbowes-r7/doltool", "No PoCs from references."], ["2022", "CVE-2022-41304", "An Out-Of-Bounds Write Vulnerability in Autodesk FBX SDK 2020 version and prior may lead to code execution through maliciously crafted FBX files or information disclosure.", "https://github.com/Live-Hack-CVE/CVE-2022-41304", "No PoCs from references."], ["2022", "CVE-2022-43106", "Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the schedStartTime parameter in the setSchedWifi function.", "No PoCs found on GitHub currently.", "https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setschedwifi-strcpychar-ptr--2-v8"], ["2022", "CVE-2022-4788", "The Embed PDF WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024"], ["2022", "CVE-2022-29807", "A SQL injection vulnerability exists within Quest KACE Systems Management Appliance (SMA) through 12.0 that can allow for remote code execution via download_agent_installer.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/jeffssh/KACE-SMA-RCE", "No PoCs from references."], ["2022", "CVE-2022-41392", "A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings.", "https://github.com/ARPSyndicate/cvemon", "https://www.edoardoottavianelli.it/CVE-2022-41392/ https://www.youtube.com/watch?v=BOPLYnveBqk"], ["2022", "CVE-2022-41003", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'ip nat outside source (udp|tcp|all) (WORD|null) WORD to A.B.C.D (WORD|null) description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-0381", "The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/BugBlocker/lotus-scripts https://github.com/rusty-sec/lotus-scripts", "https://gist.github.com/Xib3rR4dAr/4b3ea7960914e23c3a875b973a5b37a3"], ["2022", "CVE-2022-2284", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874"], ["2022", "CVE-2022-2115", "The Popup Anything WordPress plugin before 2.1.7 does not sanitise and escape a parameter before outputting it back in a frontend page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39"], ["2022", "CVE-2022-28468", "Payroll Management System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System"], ["2022", "CVE-2022-29704", "BrowsBox CMS v4.0 was discovered to contain a SQL injection vulnerability.", "No PoCs found on GitHub currently.", "https://www.youtube.com/watch?v=ECTu2QVAl1c"], ["2022", "CVE-2022-25810", "The Transposh WordPress Translation WordPress plugin through 1.0.8 exposes a couple of sensitive actions such has \u201ctp_reset\u201d under the Utilities tab (/wp-admin/admin.php?page=tp_utils), which can be used/executed as the lowest-privileged user. Basically all Utilities functionalities are vulnerable this way, which involves resetting configurations and backup/restore operations.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrTuxracer/advisories", "https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892"], ["2022", "CVE-2022-33207", "Four OS command injection vulnerabilities exists in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability focuses on a second unsafe use of the `default_key_id` HTTP parameter to construct an OS Command at offset `0x19B234` of the `/root/hpgw` binary included in firmware 6.9Z.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568"], ["2022", "CVE-2022-3339", "A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 Update 14 allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.", "No PoCs found on GitHub currently.", "https://kcm.trellix.com/corporate/index?page=content&id=SB10387"], ["2022", "CVE-2022-38530", "GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2216"], ["2022", "CVE-2022-0150", "The WP Accessibility Helper (WAH) WordPress plugin before 0.6.0.7 does not sanitise and escape the wahi parameter before outputting back its base64 decode value in the page, leading to a Reflected Cross-Site Scripting issue", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5"], ["2022", "CVE-2022-35948", "undici is an HTTP/1.1 client, written from scratch for Node.js.`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\\r\\n\\r\\nGET /foo2 HTTP/1.1' await request('http://localhost:3000, { method: 'GET', headers: { 'content-type': unsanitizedContentTypeInput }, }) ``` The above snippet will perform two requests in a single `request` API call: 1) `http://localhost:3000/` 2) `http://localhost:3000/foo2` This issue was patched in Undici v5.8.1. Sanitize input when sending content-type headers using user input as a workaround.", "https://github.com/ARPSyndicate/cvemon https://github.com/happyhacking-k/happyhacking-k", "No PoCs from references."], ["2022", "CVE-2022-34527", "D-Link DSL-3782 v1.03 and below was discovered to contain a command injection vulnerability via the function byte_4C0160.", "https://github.com/1160300418/Vuls https://github.com/ARPSyndicate/cvemon https://github.com/FzBacon/CVE-2022-34527_D-Link_DSL-3782_Router_command_injection https://github.com/nomi-sec/PoC-in-GitHub", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-43046", "Food Ordering Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /foms/place-order.php.", "No PoCs found on GitHub currently.", "https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md"], ["2022", "CVE-2022-28439", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&&action=delete&userid=4.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-2144", "The Jquery Validation For Contact Form 7 WordPress plugin before 5.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change Blog options like default_role, users_can_register via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a"], ["2022", "CVE-2022-34436", "Dell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker could exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/iDRAC-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-29856", "A hardcoded cryptographic key in Automation360 22 allows an attacker to decrypt exported RPA packages.", "https://github.com/ARPSyndicate/cvemon https://github.com/Flo451/CVE-2022-29856-PoC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://dolosgroup.io/blog"], ["2022", "CVE-2022-4448", "The GiveWP WordPress plugin before 2.24.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b"], ["2022", "CVE-2022-27647", "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874.", "No PoCs found on GitHub currently.", "https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327"], ["2022", "CVE-2022-27944", "Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow an exportXFAData NULL pointer dereference.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-20027", "In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126826; Issue ID: ALPS06126826.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-3228", "Using custom code, an attacker can write into name or description fields larger than the appropriate buffer size causing a stack-based buffer overflow on Host Engineering H0-ECOM100 Communications Module Firmware versions v5.0.155 and prior. This may allow an attacker to crash the affected device or cause it to become unresponsive.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-33256", "Memory corruption due to improper validation of array index in Multi-mode call processor.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31213", "An issue was discovered in dbus-broker before 31. Multiple NULL pointer dereferences can be found when supplying a malformed XML config file.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/"], ["2022", "CVE-2022-27804", "An os command injection vulnerability exists in the web interface util_set_abode_code functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567"], ["2022", "CVE-2022-29615", "SAP NetWeaver Developer Studio (NWDS) - version 7.50, is based on Eclipse, which contains the logging framework log4j in version 1.x. The application's confidentiality and integrity could have a low impact due to the vulnerabilities associated with version 1.x.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-3368", "A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.", "https://github.com/ARPSyndicate/cvemon https://github.com/Wh04m1001/CVE-2022-3368 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://support.norton.com/sp/static/external/tools/security-advisories.html"], ["2022", "CVE-2022-33087", "A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50&A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.", "No PoCs found on GitHub currently.", "https://github.com/cilan2/iot/blob/main/4.md"], ["2022", "CVE-2022-25901", "Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.", "https://github.com/trong0dn/eth-todo-list", "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681 https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984"], ["2022", "CVE-2022-34576", "A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to execute arbitrary code via a crafted POST request.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/tr3ss/gofetch", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md"], ["2022", "CVE-2022-48660", "In the Linux kernel, the following vulnerability has been resolved:gpiolib: cdev: Set lineevent_state::irq after IRQ register successfullyWhen running gpio test on nxp-ls1028 platform with below commandgpiomon --num-events=3 --rising-edge gpiochip1 25There will be a warning trace as below:Call trace:free_irq+0x204/0x360lineevent_free+0x64/0x70gpio_ioctl+0x598/0x6a0__arm64_sys_ioctl+0xb4/0x100invoke_syscall+0x5c/0x130......el0t_64_sync+0x1a0/0x1a4The reason of this issue is that calling request_threaded_irq()function failed, and then lineevent_free() is invoked to releasethe resource. Since the lineevent_state::irq was already set, sothe subsequent invocation of free_irq() would trigger the abovewarning call trace. To fix this issue, set the lineevent_state::irqafter the IRQ register successfully.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-29916", "Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1760674"], ["2022", "CVE-2022-4508", "The ConvertKit WordPress plugin before 2.0.5 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high-privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab"], ["2022", "CVE-2022-4699", "The MediaElement.js WordPress plugin through 4.2.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9"], ["2022", "CVE-2022-43017", "OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the indexFile component.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_indexFile.md"], ["2022", "CVE-2022-46871", "An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-36473", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Edit_BasicSSID_5G.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md"], ["2022", "CVE-2022-0290", "Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html"], ["2022", "CVE-2022-28579", "It is found that there is a command injection vulnerability in the setParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/4"], ["2022", "CVE-2022-2395", "The weForms WordPress plugin before 1.6.14 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b"], ["2022", "CVE-2022-2004", "AutomationDirect DirectLOGIC is vulnerable to a a specially crafted packet can be sent continuously to the PLC to prevent access from DirectSoft and other devices, causing a denial-of-service condition. This issue affects: AutomationDirect DirectLOGIC D0-06 series CPUs D0-06DD1 versions prior to 2.72; D0-06DD2 versions prior to 2.72; D0-06DR versions prior to 2.72; D0-06DA versions prior to 2.72; D0-06AR versions prior to 2.72; D0-06AA versions prior to 2.72; D0-06DD1-D versions prior to 2.72; D0-06DD2-D versions prior to 2.72; D0-06DR-D versions prior to 2.72;", "https://github.com/Live-Hack-CVE/CVE-2022-2004", "No PoCs from references."], ["2022", "CVE-2022-35919", "MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.", "https://github.com/drparbahrami/Mining-Simulator-codes https://github.com/ifulxploit/Minio-Security-Vulnerability-Checker https://github.com/spart9k/INT-18", "http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html"], ["2022", "CVE-2022-42159", "D-Link COVR 1200,1202,1203 v1.08 was discovered to have a predictable seed in a Pseudo-Random Number Generator.", "No PoCs found on GitHub currently.", "https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-46550", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the urls parameter at /goform/saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md"], ["2022", "CVE-2022-4829", "The Show-Hide / Collapse-Expand WordPress plugin before 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7"], ["2022", "CVE-2022-43235", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_epel_pixels_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/337"], ["2022", "CVE-2022-38840", "cgi-bin/xmlstatus.cgi in G\u00fcralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html"], ["2022", "CVE-2022-25420", "NTT Resonant Incorporated goo blog App Web Application 1.0 is vulnerable to CLRF injection. This vulnerability allows attackers to execute arbitrary code via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/abhiunix/goo-blog-App-CVE", "No PoCs from references."], ["2022", "CVE-2022-0323", "Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7"], ["2022", "CVE-2022-0263", "Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore prior to 10.2.7.", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenGitLab/Bug-Storage", "https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6"], ["2022", "CVE-2022-21169", "The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4 https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443"], ["2022", "CVE-2022-32089", "MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26410"], ["2022", "CVE-2022-32318", "Fast Food Ordering System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via the component /ffos/classes/Master.php?f=save_category.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-2366", "Incorrect default configuration for trusted IP header in Mattermost version 6.7.0 and earlier allows attacker to bypass some of the rate limitations in place or use manipulated IPs for audit logging via manipulating the request headers.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-38900", "decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.", "https://github.com/ARPSyndicate/cvemon https://github.com/git-kick/ioBroker.e3dc-rscp https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-48693", "In the Linux kernel, the following vulnerability has been resolved:soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugsIn brcmstb_pm_probe(), there are two kinds of leak bugs:(1) we need to add of_node_put() when for_each__matching_node() breaks(2) we need to add iounmap() for each iomap in fail path", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-48502", "An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2"], ["2022", "CVE-2022-25560", "Tenda AX12 v22.03.01.21 was discovered to contain a stack overflow in the function sub_4327CC. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4"], ["2022", "CVE-2022-36480", "TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8"], ["2022", "CVE-2022-46882", "A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29577", "OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-26709", "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26498", "An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html"], ["2022", "CVE-2022-46690", "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-38712", "\"IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Web services could allow a man-in-the-middle attacker to conduct SOAPAction spoofing to execute unwanted or unauthorized operations. IBM X-Force ID: 234762.\"", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26589", "A Cross-Site Request Forgery (CSRF) in Pluck CMS v4.7.15 allows attackers to delete arbitrary pages.", "No PoCs found on GitHub currently.", "https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c https://owasp.org/www-community/attacks/csrf"], ["2022", "CVE-2022-0372", "Cross-site Scripting (XSS) - Stored in Packagist bytefury/crater prior to 6.0.2.", "https://github.com/1d8/publications https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1"], ["2022", "CVE-2022-32209", "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```<%= sanitize @comment.body, tags: [\"select\", \"style\"] %>```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45768", "Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function.", "No PoCs found on GitHub currently.", "https://github.com/Erebua/CVE/blob/main/Edimax.md https://www.lovesandy.cc/2022/11/20/EDIMAX%E6%BC%8F%E6%B4%9E/"], ["2022", "CVE-2022-43264", "Arobas Music Guitar Pro for iPad and iPhone before v1.10.2 allows attackers to perform directory traversal and download arbitrary files via a crafted web request.", "No PoCs found on GitHub currently.", "https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/"], ["2022", "CVE-2022-34705", "Windows Defender Credential Guard Elevation of Privilege Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html"], ["2022", "CVE-2022-34494", "rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4"], ["2022", "CVE-2022-36600", "BlogEngine v3.3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /blogengine/api/posts. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field.", "https://github.com/ARPSyndicate/cvemon https://github.com/tuando243/tuando243", "No PoCs from references."], ["2022", "CVE-2022-27574", "Improper input validation vulnerability in parser_iloc and sheifd_find_itemIndexin fuctions of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds write by privileged attacker.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-27434", "UNIT4 TETA Mobile Edition (ME) before 29.5.HF17 was discovered to contain a SQL injection vulnerability via the ProfileName parameter in the errorReporting page.", "https://github.com/ARPSyndicate/cvemon https://github.com/LongWayHomie/CVE-2022-27434 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41221", "The client in OpenText Archive Center Administration through 21.2 allows XXE attacks. Authenticated users of the OpenText Archive Center Administration client (Versions 16.2.3, 21.2, and older versions) could upload XML files to the application that it did not sufficiently validate. As a result, attackers could craft XML files that, when processed by the application, would cause a negative security impact such as data exfiltration or localized denial of service against the application instance and system of the user running it.", "No PoCs found on GitHub currently.", "https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability"], ["2022", "CVE-2022-2337", "A crafted HTTP packet with a missing HTTP URI can create a denial-of-service condition in Softing Secure Integration Server V1.22.", "https://github.com/ARPSyndicate/cvemon https://github.com/rdomanski/Exploits_and_Advisories", "No PoCs from references."], ["2022", "CVE-2022-33025", "LibreDWG v0.12.4.4608 was discovered to contain a heap-use-after-free via the function decode_preR13_section at decode_r11.c.", "No PoCs found on GitHub currently.", "https://github.com/LibreDWG/libredwg/issues/487"], ["2022", "CVE-2022-29526", "Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.", "https://github.com/ARPSyndicate/cvemon https://github.com/upsideon/shoveler", "No PoCs from references."], ["2022", "CVE-2022-25521", "NUUO v03.11.00 was discovered to contain access control issue.", "No PoCs found on GitHub currently.", "https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0"], ["2022", "CVE-2022-34956", "Pligg CMS v2.0.2 was discovered to contain a time-based SQL injection vulnerability via the page_size parameter at load_data_for_groups.php.", "No PoCs found on GitHub currently.", "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261"], ["2022", "CVE-2022-42058", "Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setRemoteWebManage function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.", "No PoCs found on GitHub currently.", "https://boschko.ca/tenda_ac1200_router https://boschko.ca/tenda_ac1200_router/"], ["2022", "CVE-2022-28959", "Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.", "No PoCs found on GitHub currently.", "https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/"], ["2022", "CVE-2022-42289", "NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure and data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-42118", "A Cross-site scripting (XSS) vulnerability in the Portal Search module in Liferay Portal 7.1.0 through 7.4.2, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 15, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the `tag` parameter.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17342"], ["2022", "CVE-2022-4868", "Improper Authorization in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b"], ["2022", "CVE-2022-33175", "Power Distribution Units running on Powertek firmware (multiple brands) before 3.30.30 have an insecure permissions setting on the user.token field that is accessible to everyone through the /cgi/get_param.cgi HTTP API. This leads to disclosing active session ids of currently logged-in administrators. The session id can then be reused to act as the administrator, allowing reading of the cleartext password, or reconfiguring the device.", "No PoCs found on GitHub currently.", "https://gynvael.coldwind.pl/?lang=en&id=748"], ["2022", "CVE-2022-22190", "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-36581", "Online Ordering System v2.3.2 was discovered to contain a SQL injection vulnerability via the user_email parameter at /admin/login.php.", "No PoCs found on GitHub currently.", "https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md"], ["2022", "CVE-2022-36610", "TOTOLINK A720R V4.1.5cu.532_B20210610 was discovered to contain a hardcoded password for root at /etc/shadow.sample.", "https://github.com/whiter6666/CVE", "No PoCs from references."], ["2022", "CVE-2022-34715", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Starssgo/CVE-2022-34715-POC https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-25461", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the startip parameter in the SetPptpServerCfg function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16"], ["2022", "CVE-2022-2267", "The Mailchimp for WooCommerce WordPress plugin before 2.7.1 has an AJAX action that allows any logged in users (such as subscriber) to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870"], ["2022", "CVE-2022-0362", "SQL Injection in Packagist showdoc/showdoc prior to 2.10.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091"], ["2022", "CVE-2022-41260", "SAP Financial Consolidation - version 1010, does not sufficiently encode user-controlled input which may allow an unauthenticated attacker to inject a web script via a GET request. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-36490", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EditMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5"], ["2022", "CVE-2022-34595", "Tenda AX1803 v1.0.0.1_2890 was discovered to contain a command injection vulnerability via the function setipv6status.", "https://github.com/ARPSyndicate/cvemon https://github.com/ilovekeer/IOT_Vul https://github.com/zhefox/IOT_Vul", "https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/readme_en.md"], ["2022", "CVE-2022-34604", "H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the INTF parameter at /dotrace.asp.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/11"], ["2022", "CVE-2022-48512", "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-43365", "IP-COM EW9 V15.11.0.14(9732) was discovered to contain a buffer overflow in the formSetDebugCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/ARPSyndicate/cvemon https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-45669", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterGet function.", "https://github.com/ARPSyndicate/cvemon https://github.com/iceyjchen/VulnerabilityProjectRecords", "https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formWifiMacFilterGet/formWifiMacFilterGet.md"], ["2022", "CVE-2022-2376", "The Directorist WordPress plugin before 7.3.1 discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad"], ["2022", "CVE-2022-32308", "Cross Site Scripting (XSS) vulnerability in uBlock Origin extension before 1.41.1 allows remote attackers to run arbitrary code via a spoofed 'MessageSender.url' to the browser renderer process.", "No PoCs found on GitHub currently.", "https://github.com/uBlockOrigin/uBlock-issues/issues/1992"], ["2022", "CVE-2022-0273", "Improper Access Control in Pypi calibreweb prior to 0.6.16.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/8f27686f-d698-4ab6-8ef0-899125792f13"], ["2022", "CVE-2022-26488", "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/techspence/PyPATHPwner", "No PoCs from references."], ["2022", "CVE-2022-26719", "A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28908", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the ipdoamin parameter in /setting/setDiagnosisCfg.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/4"], ["2022", "CVE-2022-38582", "Incorrect access control in the anti-virus driver wsdkd.sys of Watchdog Antivirus v1.4.158 allows attackers to write arbitrary files.", "No PoCs found on GitHub currently.", "https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30"], ["2022", "CVE-2022-34907", "An authentication bypass vulnerability exists in FileWave before 14.6.3 and 14.7.x before 14.7.2. Exploitation could allow an unauthenticated actor to gain access to the system with the highest authority possible and gain full control over the FileWave platform.", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/ https://kb.filewave.com/pages/viewpage.action?pageId=55544244"], ["2022", "CVE-2022-31161", "Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html"], ["2022", "CVE-2022-4839", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ad954cab-f026-4895-8003-99f5e3b507ed"], ["2022", "CVE-2022-33124", "** DISPUTED ** AIOHTTP 3.8.1 can report a \"ValueError: Invalid IPv6 URL\" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application.", "No PoCs found on GitHub currently.", "https://github.com/aio-libs/aiohttp/issues/6772"], ["2022", "CVE-2022-46540", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the entrys parameter at /goform/addressNat.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md"], ["2022", "CVE-2022-26659", "Docker Desktop installer on Windows in versions before 4.6.0 allows an attacker to overwrite any administrator writable files by creating a symlink in place of where the installer writes its log file. Starting from version 4.6.0, the Docker Desktop installer, when run elevated, will write its log files to a location not writable by non-administrator users.", "No PoCs found on GitHub currently.", "https://docs.docker.com/docker-for-windows/release-notes/"], ["2022", "CVE-2022-45729", "A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-45729 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-32248", "Due to missing input validation in the Manage Checkbooks component of SAP S/4HANA - version 101, 102, 103, 104, 105, 106, an attacker could insert or edit the value of an existing field in the database. This leads to an impact on the integrity of the data.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-27535", "Kaspersky VPN Secure Connection for Windows version up to 21.5 was vulnerable to arbitrary file deletion via abuse of its 'Delete All Service Data And Reports' feature by the local authenticated attacker.", "No PoCs found on GitHub currently.", "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822"], ["2022", "CVE-2022-38571", "Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow in the function formSetGuideListItem.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem"], ["2022", "CVE-2022-27814", "SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35909", "In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2014", "Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/911a4ada-7fd6-467a-a464-b88604b16ffc"], ["2022", "CVE-2022-2385", "A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-36463", "TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the command parameter in the function setTracerouteCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md"], ["2022", "CVE-2022-4689", "Improper Access Control in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3"], ["2022", "CVE-2022-43396", "In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.", "https://github.com/Threekiii/CVE", "No PoCs from references."], ["2022", "CVE-2022-27657", "A highly privileged remote attacker, can gain unauthorized access to display contents of restricted directories by exploiting insufficient validation of path information in SAP Focused Run (Simple Diagnostics Agent 1.0) - version 1.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/Onapsis/vulnerability_advisories", "http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-36523", "D-Link Go-RT-AC750 GORTAC750_revA_v101b03 & GO-RT-AC750_revB_FWv200b02 is vulnerable to command injection via /htdocs/upnpinc/gena.php.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-41042", "Visual Studio Code Information Disclosure Vulnerability", "https://github.com/trailofbits/publications", "No PoCs from references."], ["2022", "CVE-2022-4458", "The amr shortcode any widget WordPress plugin through 4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c"], ["2022", "CVE-2022-29846", "In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28429", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=delete&msgid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-25851", "The package jpeg-js before 0.4.4 are vulnerable to Denial of Service (DoS) where a particular piece of input will cause to enter an infinite loop and never return.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295 https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218"], ["2022", "CVE-2022-44727", "The EU Cookie Law GDPR (Banner + Blocker) module before 2.1.3 for PrestaShop allows SQL Injection via a cookie ( lgcookieslaw or __lglaw ).", "No PoCs found on GitHub currently.", "https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf"], ["2022", "CVE-2022-46622", "A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-46622 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-25940", "All versions of package lite-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse.", "No PoCs found on GitHub currently.", "https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617 https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540"], ["2022", "CVE-2022-29654", "Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm before 2.15.05 allows attackers to cause a denial of service via crafted file.", "No PoCs found on GitHub currently.", "https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f"], ["2022", "CVE-2022-31252", "A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20126", "In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36432", "The Preview functionality in the Amasty Blog Pro 2.10.3 plugin for Magento 2 uses eval unsafely. This allows attackers to perform Cross-site Scripting attacks on admin panel users by manipulating the generated preview application response.", "https://github.com/afine-com/CVE-2022-36432 https://github.com/afine-com/research https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-29957", "The Emerson DeltaV Distributed Control System (DCS) through 2022-04-29 mishandles authentication. It utilizes several proprietary protocols for a wide variety of functionality. These protocols include Firmware upgrade (18508/TCP, 18518/TCP); Plug-and-Play (18510/UDP); Hawk services (18507/UDP); Management (18519/TCP); Cold restart (18512/UDP); SIS communications (12345/TCP); and Wireless Gateway Protocol (18515/UDP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-4549", "The Tickera WordPress plugin before 3.5.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged-in admin change them via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701"], ["2022", "CVE-2022-0140", "The Visual Form Builder WordPress plugin before 3.0.6 does not perform access control on entry form export, allowing unauthenticated users to see the form entries or export it as a CSV File using the vfb-export endpoint.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336"], ["2022", "CVE-2022-28478", "SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The \"Remove file\" functionality inside the \"Log files management\" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.", "https://github.com/ARPSyndicate/cvemon https://github.com/looCiprian/Responsible-Vulnerability-Disclosure", "https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478"], ["2022", "CVE-2022-2294", "Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/tr3ss/gofetch", "No PoCs from references."], ["2022", "CVE-2022-0391", "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\\r' and '\\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.", "https://github.com/ARPSyndicate/cvemon https://github.com/GitHubForSnap/matrix-commander-gael", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-36572", "Sinsiu Sinsiu Enterprise Website System v1.1.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /upload/admin.php?/deal/.", "No PoCs found on GitHub currently.", "https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem"], ["2022", "CVE-2022-41013", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'static dhcp mac WORD (WORD|null) ip A.B.C.D hostname (WORD|null) description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-4798", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae"], ["2022", "CVE-2022-4409", "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.1.9.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c"], ["2022", "CVE-2022-44875", "KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.", "https://github.com/AesirSec/CVE-2022-44875-Test https://github.com/c0d30d1n/CVE-2022-44875-Test https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-25800", "Best Practical RT for Incident Response (RTIR) before 4.0.3 and 5.x before 5.0.3 allows SSRF via the whois lookup tool.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3269", "Session Fixation in GitHub repository ikus060/rdiffweb prior to 2.4.7.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6"], ["2022", "CVE-2022-20066", "In atf (hwfde), there is a possible leak of sensitive information due to incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171729; Issue ID: ALPS06171729.", "https://github.com/Live-Hack-CVE/CVE-2022-20066", "No PoCs from references."], ["2022", "CVE-2022-24768", "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges. A patch for this vulnerability has been released in Argo CD versions 2.3.2, 2.2.8, and 2.1.14. Some mitigation measures are available but do not serve as a substitute for upgrading. To avoid privilege escalation, limit who has push access to Application source repositories or `sync` + `override` access to Applications; and limit which repositories are available in projects where users have `update` access to Applications. To avoid unauthorized resource inspection/tampering, limit who has `delete`, `get`, or `action` access to Applications.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-34873", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16777.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-22264", "Improper sanitization of incoming intent in Dressroom prior to SMR Jan-2022 Release 1 allows local attackers to read and write arbitrary files without permission.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1"], ["2022", "CVE-2022-31384", "Directory Management System v1.0 was discovered to contain a SQL injection vulnerability via the fullname parameter in add-directory.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/laotun-s/POC", "https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt"], ["2022", "CVE-2022-20361", "In btif_dm_auth_cmpl_evt of btif_dm.cc, there is a possible vulnerability in Cross-Transport Key Derivation due to Weakness in Bluetooth Standard. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-231161832", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/engn33r/awesome-bluetooth-security https://github.com/francozappa/blur https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/system_bt_AOSP_10_r33_CVE-2022-20361 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-25795", "A Memory Corruption Vulnerability in Autodesk TrueView 2022 and 2021 may lead to remote code execution through maliciously crafted DWG files.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2342", "Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba"], ["2022", "CVE-2022-23048", "Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at \"themes/simpletheme/{rce}.php\" from where can be accessed in order to execute commands.", "No PoCs found on GitHub currently.", "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460 https://fluidattacks.com/advisories/dylan/"], ["2022", "CVE-2022-30239", "An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Athena JDBC Driver 2.0.25 through 2.0.28 may allow a local user to execute code. NOTE: this is different from CVE-2022-29971.", "No PoCs found on GitHub currently.", "https://www.magnitude.com/products/data-connectivity"], ["2022", "CVE-2022-47758", "Nanoleaf firmware v7.1.1 and below is missing TLS verification, allowing attackers to execute arbitrary code via a DNS hijacking attack.", "https://github.com/Notselwyn/exploits", "https://pwning.tech/cve-2022-47758 https://pwning.tech/cve-2022-47758/"], ["2022", "CVE-2022-38627", "Nortek Linear eMerge E3-Series 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e were discovered to contain a SQL injection vulnerability via the idt parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/baimao-box/Ba1_Ma0_356_day_study_plan https://github.com/fardeen-ahmed/Bug-bounty-Writeups", "https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml"], ["2022", "CVE-2022-46434", "An issue in the firmware update process of TP-Link TL-WA7510N v1 v3.12.6 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.", "No PoCs found on GitHub currently.", "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws"], ["2022", "CVE-2022-30328", "An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The username and password setup for the web interface does not require entering the existing password. A malicious user can change the username and password of the interface.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ https://research.nccgroup.com/?research=Technical+advisories"], ["2022", "CVE-2022-34721", "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Haera/NTCrawler https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-25455", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the list parameter in the SetIpMacBind function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/11"], ["2022", "CVE-2022-43240", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via ff_hevc_put_hevc_qpel_h_2_v_1_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/335"], ["2022", "CVE-2022-41194", "Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Postscript (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41205", "SAP GUI allows an authenticated attacker to execute scripts in the local network. On successful exploitation, the attacker can gain access to registries which can cause a limited impact on confidentiality and high impact on availability of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-27781", "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-36764", "EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.", "https://github.com/Jolx77/TP3_SISTCOMP https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-25515", "** DISPUTED ** stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttULONG() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.", "https://github.com/ARPSyndicate/cvemon https://github.com/starseeker/struetype", "https://github.com/nothings/stb/issues/1286 https://github.com/nothings/stb/issues/1288"], ["2022", "CVE-2022-2313", "A DLL hijacking vulnerability in the MA Smart Installer for Windows prior to 5.7.7, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL into the folder from where the Smart installer is being executed.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US"], ["2022", "CVE-2022-0216", "A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.", "https://github.com/ARPSyndicate/cvemon", "https://starlabs.sg/advisories/22/22-0216/"], ["2022", "CVE-2022-37799", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter at the function setSmartPowerManagement.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2"], ["2022", "CVE-2022-39988", "A cross-site scripting (XSS) vulnerability in Centreon 22.04.0 allows attackers to execute arbitrary web script or HTML via a crafted payload injected into the Service>Templates service_alias parameter.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-29693", "Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/liyansong2018/CVE", "https://github.com/unicorn-engine/unicorn/issues/1586"], ["2022", "CVE-2022-29502", "SchedMD Slurm 21.08.x through 20.11.x has Incorrect Access Control that leads to Escalation of Privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories", "No PoCs from references."], ["2022", "CVE-2022-34962", "OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Group Timeline module.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bypazs/CVE-2022-34962 https://github.com/bypazs/GrimTheRipper https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034"], ["2022", "CVE-2022-27882", "slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.", "No PoCs found on GitHub currently.", "https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html"], ["2022", "CVE-2022-31295", "An issue in the delete_post() function of Online Discussion Forum Site 1 allows unauthenticated attackers to arbitrarily delete posts.", "https://github.com/ARPSyndicate/cvemon https://github.com/ColordStudio/CVE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigzooooz/CVE-2022-31295 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36546", "Edoc-doctor-appointment-system v1.0.1 was discovered to contain a Cross-Site Request Forgery (CSRF) via /patient/settings.php.", "No PoCs found on GitHub currently.", "https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md"], ["2022", "CVE-2022-41027", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn schedule name1 WORD name2 WORD policy (failover|backup) description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-22017", "Remote Desktop Client Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38685", "In bluetooth service, there is a possible missing permission check. This could lead to local denial of service in bluetooth service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-29660", "CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/pic/del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/25#issue-1207649017"], ["2022", "CVE-2022-1218", "The Domain Replace WordPress plugin through 1.3.8 does not sanitise and escape a parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65"], ["2022", "CVE-2022-31266", "In ILIAS through 7.10, lack of verification when changing an email address (on the Profile Page) allows remote attackers to take over accounts.", "No PoCs found on GitHub currently.", "https://medium.com/@bcksec/in-ilias-through-7-10-620c0de685ee"], ["2022", "CVE-2022-24989", "TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ArrestX/--POC https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io https://github.com/h00die-gr3y/Metasploit", "https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990 https://packetstormsecurity.com/files/172904"], ["2022", "CVE-2022-2071", "The Name Directory WordPress plugin before 1.25.4 does not have CSRF check when importing names, and is also lacking sanitisation as well as escaping in some of the imported data, which could allow attackers to make a logged in admin import arbitrary names with XSS payloads in them.", "https://github.com/ARPSyndicate/cvemon https://github.com/dipa96/my-days-and-not", "https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d"], ["2022", "CVE-2022-0174", "Improper Validation of Specified Quantity in Input vulnerability in dolibarr dolibarr/dolibarr.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db"], ["2022", "CVE-2022-27772", "** UNSUPPORTED WHEN ASSIGNED ** spring-boot versions prior to version v2.2.11.RELEASE was vulnerable to temporary directory hijacking. This vulnerability impacted the org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir method. NOTE: This vulnerability only affects products and/or versions that are no longer supported by the maintainer.", "https://github.com/ADP-Dynatrace/dt-appsec-powerup https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/puneetbehl/grails3-cve-2022-27772 https://github.com/scordero1234/java_sec_demo-main https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41167", "Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29963", "The Emerson DeltaV Distributed Control System (DCS) controllers and IO cards through 2022-04-29 misuse passwords. TELNET on port 18550 provides access to a root shell via hardcoded credentials. This affects S-series, P-series, and CIOC/EIOC nodes. NOTE: this is different from CVE-2014-2350.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-48584", "A command injection vulnerability exists in the download and convert report feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48584/"], ["2022", "CVE-2022-48615", "An improper access control vulnerability exists in a Huawei datacom product. Attackers can exploit this vulnerability to obtain partial device information.", "No PoCs found on GitHub currently.", "https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/"], ["2022", "CVE-2022-36517", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function debug_wlan_advance.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7"], ["2022", "CVE-2022-41076", "PowerShell Remote Code Execution Vulnerability", "https://github.com/5l1v3r1/CVE-2022-41076 https://github.com/ARPSyndicate/cvemon https://github.com/FDlucifer/Proxy-Attackchain https://github.com/balki97/OWASSRF-CVE-2022-41082-POC https://github.com/bigherocenter/CVE-2022-41082-POC https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-25766", "The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/dellalibera/dellalibera https://github.com/vovikhangcdv/codeql-extended-libraries", "https://github.com/FredrikNoren/ungit/pull/1510 https://snyk.io/vuln/SNYK-JS-UNGIT-2414099"], ["2022", "CVE-2022-25865", "The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/dellalibera/dellalibera https://github.com/martinthong125/POC-workspace-tools", "https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201"], ["2022", "CVE-2022-22297", "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiWeb version 6.4.0 through 6.4.1, FortiWeb version 6.3.0 through 6.3.17, FortiWeb all versions 6.2, FortiWeb all versions 6.1, FortiWeb all versions 6.0, FortiRecorder version 6.4.0 through 6.4.3, FortiRecorder all versions 6.0, FortiRecorder all versions 2.7 may allow an authenticated user to read arbitrary files via specially crafted command arguments.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-38794", "Zaver through 2020-12-15 allows directory traversal via the GET /.. substring.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/Live-Hack-CVE/CVE-2022-38794", "No PoCs from references."], ["2022", "CVE-2022-29631", "Jodd HTTP v6.0.9 was discovered to contain multiple CLRF injection vulnerabilities via the components jodd.http.HttpRequest#set and `jodd.http.HttpRequest#send. These vulnerabilities allow attackers to execute Server-Side Request Forgery (SSRF) via a crafted TCP payload.", "No PoCs found on GitHub currently.", "https://github.com/oblac/jodd-http/issues/9 https://github.com/oblac/jodd/issues/787"], ["2022", "CVE-2022-31237", "Dell PowerScale OneFS, versions 9.2.0 up to and including 9.2.1.12 and 9.3.0.5 contain an improper preservation of permissions vulnerability in SyncIQ. A low privileged local attacker may potentially exploit this vulnerability, leading to limited information disclosure.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en"], ["2022", "CVE-2022-44950", "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/10"], ["2022", "CVE-2022-29932", "The HTTP Server in PRIMEUR SPAZIO 2.5.1.954 (File Transfer) allows an unauthenticated attacker to obtain sensitive data (related to the content of transferred files) via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Off3nS3c/CVE-2022-29932 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md"], ["2022", "CVE-2022-2020", "A vulnerability, which was classified as problematic, has been found in SourceCodester Prison Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/?page=system_info of the component System Name Handler. The manipulation with the input leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md https://vuldb.com/?id.201368"], ["2022", "CVE-2022-0125", "An issue has been discovered in GitLab affecting all versions starting from 12.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not verifying that a maintainer of a project had the right access to import members from a target project.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0125.json"], ["2022", "CVE-2022-36259", "A SQL injection vulnerability in ConnectionFactory.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as \"username\", \"password\", etc.", "No PoCs found on GitHub currently.", "https://gist.github.com/ziyishen97/47666f584cd4cdad1d0f6af5f33a56db https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-21421", "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Web General). Supported versions that are affected are 5.5.0.0.0, 5.9.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-28353", "In the External Redirect Warning Plugin 1.3 for MyBB, the redirect URL (aka external.php?url=) is vulnerable to XSS.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html"], ["2022", "CVE-2022-45331", "AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the p_id parameter at \\post.php. This vulnerability allows attackers to access database information.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_sql_injection/post_sql_injection.md"], ["2022", "CVE-2022-35030", "OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fe954.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md"], ["2022", "CVE-2022-0828", "The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb"], ["2022", "CVE-2022-22648", "This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to read restricted memory.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1507", "chafa: NULL Pointer Dereference in function gif_internal_decode_frame at libnsgif.c:599 allows attackers to cause a denial of service (crash) via a crafted input file. in GitHub repository hpjansson/chafa prior to 1.10.2. chafa: NULL Pointer Dereference in function gif_internal_decode_frame at libnsgif.c:599 allows attackers to cause a denial of service (crash) via a crafted input file.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95"], ["2022", "CVE-2022-31579", "The ralphjzhang/iasset repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-35170", "SAP NetWeaver Enterprise Portal does - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (XSS) vulnerability, therefore changing the scope of the attack. This leads to limited impact on confidentiality and integrity of data.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-30916", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the Asp_SetTelnetDebug parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/9"], ["2022", "CVE-2022-37075", "TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the ip parameter in the function setDiagnosisCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7"], ["2022", "CVE-2022-26090", "Improper access control vulnerability in SamsungContacts prior to SMR Apr-2022 Release 1 allows that attackers can access contact information without permission.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-26301", "TuziCMS v2.0.6 was discovered to contain a SQL injection vulnerability via the component App\\Manage\\Controller\\ZhuantiController.class.php.", "No PoCs found on GitHub currently.", "https://github.com/yeyinshi/tuzicms/issues/11"], ["2022", "CVE-2022-40685", "Insufficiently protected credentials in the Intel(R) DCM software before version 5.0.1 may allow an authenticated user to potentially enable information disclosure via network access.", "https://github.com/MrTuxracer/advisories", "No PoCs from references."], ["2022", "CVE-2022-0968", "The microweber application allows large characters to insert in the input field \"fist & last name\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e"], ["2022", "CVE-2022-40986", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the '(ddns1|ddns2) mx WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-30615", "\"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227592.", "https://github.com/ARPSyndicate/cvemon https://github.com/DojoSecurity/DojoSecurity https://github.com/afine-com/research https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-30584", "Archer Platform 6.3 before 6.11 (6.11.0.0) contains an Improper Access Control Vulnerability within SSO ADFS functionality that could potentially be exploited by malicious users to compromise the affected system. 6.10 P3 (6.10.0.3) and 6.9 SP3 P4 (6.9.3.4) are also fixed releases.", "No PoCs found on GitHub currently.", "https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341"], ["2022", "CVE-2022-21561", "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime). Supported versions that are affected are 9.2.6.3 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23464", "Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate\u2019s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch available for this issue at time of publication. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/"], ["2022", "CVE-2022-28182", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), where an unauthorized attacker on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution to cause denial of service, escalation of privileges, information disclosure, and data tampering. The scope of the impact may extend to other components.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-28213", "When a user access SOAP Web services in SAP BusinessObjects Business Intelligence Platform - version 420, 430, it does not sufficiently validate the XML document accepted from an untrusted source, which might result in arbitrary files retrieval from the server and in successful exploits of DoS.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4262", "Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon https://github.com/Marcuccio/kevin https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Threekiii/CVE https://github.com/Wi1L-Y/News https://github.com/aneasystone/github-trending https://github.com/bjrjk/CVE-2022-4262 https://github.com/fireinrain/github-trending https://github.com/mistymntncop/CVE-2022-4262 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/quangnh89/CVE-2022-4262", "No PoCs from references."], ["2022", "CVE-2022-25168", "Apache Hadoop's FileUtil.unTar(File, File) API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. \"Check existence of file before untarring/zipping\", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136).", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-36319", "When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1737722 https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-1995", "The Malware Scanner WordPress plugin before 4.5.2 does not sanitise and escape some of its settings, leading to malicious users with administrator privileges to store malicious Javascript code leading to Cross-Site Scripting attacks when unfiltered_html is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903"], ["2022", "CVE-2022-41678", "Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.\u00a0In details, in ActiveMQ configurations, jetty allowsorg.jolokia.http.AgentServlet to handler request to /api/jolokiaorg.jolokia.http.HttpRequestHandler#handlePostRequest is able tocreate JmxRequest through JSONObject. And calls toorg.jolokia.http.HttpRequestHandler#executeRequest.Into deeper calling stacks,org.jolokia.handler.ExecHandler#doHandleRequest is able to invokethrough refection.And then, RCE is able to be achieved viajdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.1 Call newRecording.2 Call setConfiguration. And a webshell data hides in it.3 Call startRecording.4 Call copyTo method. The webshell will be written to a .jsp file.The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.", "https://github.com/20142995/sectool https://github.com/Marco-zcl/POC https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/CVE https://github.com/Threekiii/Vulhub-Reproduce https://github.com/bakery312/Vulhub-Reproduce https://github.com/d4n-sec/d4n-sec.github.io https://github.com/tanjiti/sec_profile https://github.com/wjlin0/poc-doc https://github.com/wy876/POC https://github.com/xingchennb/POC-", "No PoCs from references."], ["2022", "CVE-2022-40897", "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.", "https://github.com/ARPSyndicate/cvemon https://github.com/Fred090821/devops https://github.com/Fred090821/devopsdocker https://github.com/GitHubForSnap/matrix-commander-gael https://github.com/SenhorDosSonhos1/projeto-voluntario-lacrei https://github.com/Viselabs/zammad-google-cloud-docker https://github.com/efrei-ADDA84/20200511 https://github.com/fredrkl/trivy-demo https://github.com/jbugeja/test-repo https://github.com/mansi1811-s/samp https://github.com/seal-community/patches", "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"], ["2022", "CVE-2022-21470", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Process Scheduler). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-42992", "Multiple stored cross-site scripting (XSS) vulnerabilities in Train Scheduler App v1.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Train Code, Train Name, and Destination text fields.", "No PoCs found on GitHub currently.", "https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS"], ["2022", "CVE-2022-4373", "The Quote-O-Matic WordPress plugin through 1.0.5 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02"], ["2022", "CVE-2022-3981", "The Icegram Express WordPress plugin before 5.5.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscriber", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028"], ["2022", "CVE-2022-25079", "TOTOLink A810R V4.1.2cu.5182_B20201026 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A810R/README.md"], ["2022", "CVE-2022-1787", "The Sideblog WordPress plugin through 6.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d"], ["2022", "CVE-2022-46109", "Tenda AC15 V15.03.06.23 is vulnerable to Buffer Overflow via function formSetClientState.", "No PoCs found on GitHub currently.", "https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState"], ["2022", "CVE-2022-1416", "Missing sanitization of data in Pipeline error messages in GitLab CE/EE affecting all versions starting from 1.0.2 before 14.8.6, all versions from 14.9.0 before 14.9.4, and all versions from 14.10.0 before 14.10.1 allows for rendering of attacker controlled HTML tags and CSS styling", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/342988"], ["2022", "CVE-2022-31468", "OX App Suite through 8.2 allows XSS via an attachment or OX Drive content when a client uses the len or off parameter.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html"], ["2022", "CVE-2022-22588", "A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 15.2.1 and iPadOS 15.2.1. Processing a maliciously crafted HomeKit accessory name may cause a denial of service.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/PyterSmithDarkGhost/0DAYIPHONE13IOS15.2CVE-2022-22588 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trevorspiniolas/homekitdos https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-32902", "A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13, macOS Monterey 12.6, macOS Big Sur 11.7. An app may be able to bypass Privacy preferences.", "https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-35061", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e412a.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md"], ["2022", "CVE-2022-26181", "Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.", "No PoCs found on GitHub currently.", "https://github.com/dropbox/lepton/issues/154"], ["2022", "CVE-2022-26210", "Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-40405", "WoWonder Social Network Platform v4.1.2 was discovered to contain a SQL injection vulnerability via the offset parameter at requests.php?f=load-my-blogs.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "No PoCs from references."], ["2022", "CVE-2022-0879", "The Caldera Forms WordPress plugin before 1.9.7 does not validate and escape the cf-api parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d"], ["2022", "CVE-2022-24255", "Extensis Portfolio v4.0 was discovered to contain hardcoded credentials which allows attackers to gain administrator privileges.", "No PoCs found on GitHub currently.", "https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/"], ["2022", "CVE-2022-0939", "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.", "https://github.com/416e6e61/My-CVEs", "https://huntr.dev/bounties/768fd7e2-a767-4d8d-a517-e9dda849c6e4"], ["2022", "CVE-2022-1556", "The StaffList WordPress plugin before 3.1.5 does not properly sanitise and escape a parameter before using it in a SQL statement when searching for Staff in the admin dashboard, leading to an SQL Injection", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166918/ https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4"], ["2022", "CVE-2022-31528", "The bonn-activity-maps/bam_annotation_tool repository through 2021-08-31 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22759", "If a document created a sandboxed iframe without allow-scripts, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1739957 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-3453", "A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /transcation.php. The manipulation of the argument buyer_name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210437 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.210437"], ["2022", "CVE-2022-4233", "A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /event/admin/?page=user/list. The manipulation of the argument First Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-214591.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.214591"], ["2022", "CVE-2022-25139", "njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/451"], ["2022", "CVE-2022-21530", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23435", "decoding.c in android-gif-drawable before 1.2.24 does not limit the maximum length of a comment, leading to denial of service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-35092", "SWFTools commit 772e55a2 was discovered to contain a segmentation violation via convert_gfxline at /gfxpoly/convert.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md"], ["2022", "CVE-2022-37197", "IOBit IOTransfer V4 is vulnerable to Unquoted Service Path.", "https://github.com/ARPSyndicate/cvemon", "https://www.exploit-db.com/exploits/51029"], ["2022", "CVE-2022-1774", "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.0.7.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6ac07c49-bb7f-47b5-b361-33e6757b8757"], ["2022", "CVE-2022-3671", "A vulnerability classified as critical was found in SourceCodester eLearning System 1.0. This vulnerability affects unknown code of the file /admin/students/manage.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-212014 is the identifier assigned to this vulnerability.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-3972", "A vulnerability was found in Pingkon HMS-PHP. It has been rated as critical. This issue affects some unknown processing of the file admin/adminlogin.php. The manipulation of the argument uname/pass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213551.", "No PoCs found on GitHub currently.", "https://github.com/Pingkon/HMS-PHP/issues/1"], ["2022", "CVE-2022-4011", "A vulnerability was found in Simple History Plugin. It has been rated as critical. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213785 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.213785"], ["2022", "CVE-2022-30466", "joyebike Joy ebike Wolf Manufacturing year 2022 is vulnerable to Authentication Bypass by Capture-replay.", "No PoCs found on GitHub currently.", "https://github.com/nsbogam/ebike"], ["2022", "CVE-2022-21483", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-21712", "twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twited.web.RedirectAgent` and `twisted.web. BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40864", "Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function setSmartPowerManagement with the request /goform/PowerSaveSet", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSmartPowerManagement.md https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md"], ["2022", "CVE-2022-0418", "The Event List WordPress plugin before 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon https://github.com/akashrpatil/akashrpatil", "https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0"], ["2022", "CVE-2022-39085", "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-28060", "SQL Injection vulnerability in Victor CMS v1.0, via the user_name parameter to /includes/login.php.", "https://github.com/superlink996/chunqiuyunjingbachang", "https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md"], ["2022", "CVE-2022-32563", "An issue was discovered in Couchbase Sync Gateway 3.x before 3.0.2. Admin credentials are not verified when using X.509 client-certificate authentication from Sync Gateway to Couchbase Server. When Sync Gateway is configured to authenticate with Couchbase Server using X.509 client certificates, the admin credentials provided to the Admin REST API are ignored, resulting in privilege escalation for unauthenticated users. The Public REST API is not impacted by this issue. A workaround is to replace X.509 certificate based authentication with Username and Password authentication inside the bootstrap configuration.", "https://github.com/ARPSyndicate/cvemon https://github.com/Xeus-Territory/Robust_Scanner https://github.com/Xeus-Territory/robust_scanner", "No PoCs from references."], ["2022", "CVE-2022-30526", "A privilege escalation vulnerability was identified in the CLI command of Zyxel USG FLEX 100(W) firmware versions 4.50 through 5.30, USG FLEX 200 firmware versions 4.50 through 5.30, USG FLEX 500 firmware versions 4.50 through 5.30, USG FLEX 700 firmware versions 4.50 through 5.30, USG FLEX 50(W) firmware versions 4.16 through 5.30, USG20(W)-VPN firmware versions 4.16 through 5.30, ATP series firmware versions 4.32 through 5.30, VPN series firmware versions 4.30 through 5.30, USG/ZyWALL series firmware versions 4.09 through 4.72, which could allow a local attacker to execute some OS commands with root privileges in some directories on a vulnerable device.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/greek0x0/CVE-2022-30526 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html"], ["2022", "CVE-2022-0558", "Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/Nithisssh/CVE-2022-0558 https://github.com/nomi-sec/PoC-in-GitHub", "https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c"], ["2022", "CVE-2022-45142", "The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-42821", "A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.6.2, macOS Big Sur 11.7.2, macOS Ventura 13. An app may bypass Gatekeeper checks.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io", "http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25"], ["2022", "CVE-2022-4151", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id GET parameter before concatenating it to an SQL query in export-images-data.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2 https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377"], ["2022", "CVE-2022-3832", "The External Media WordPress plugin before 1.0.36 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92"], ["2022", "CVE-2022-1937", "The Awin Data Feed WordPress plugin before 1.8 does not sanitise and escape a parameter before outputting it back via an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9"], ["2022", "CVE-2022-1634", "Use after free in Browser UI in Google Chrome prior to 101.0.4951.64 allowed a remote attacker who had convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific user interactions.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-23854", "AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/KayCHENvip/vulnerability-poc https://github.com/Live-Hack-CVE/CVE-2022-23854 https://github.com/Miraitowa70/POC-Notes https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io", "https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal"], ["2022", "CVE-2022-42722", "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "https://github.com/SatyrDiamond/my-stars https://github.com/karimhabush/cyberowl https://github.com/oscomp/proj283-Automated-Security-Testing-of-Protocol-Stacks-in-OS-kernels", "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html http://www.openwall.com/lists/oss-security/2022/10/13/5"], ["2022", "CVE-2022-1725", "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c"], ["2022", "CVE-2022-24026", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the telnet_ate_monitor binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-40736", "An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp.", "https://github.com/karimhabush/cyberowl", "https://github.com/axiomatic-systems/Bento4/issues/755"], ["2022", "CVE-2022-21840", "Microsoft Office Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/zerosorai/Update-Office-2013", "No PoCs from references."], ["2022", "CVE-2022-0449", "The Flexi WordPress plugin before 4.20 does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387"], ["2022", "CVE-2022-32532", "Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/Lay0us1/CVE-2022-32532 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/NorthShad0w/FINAL https://github.com/Radon6/2022HW https://github.com/SYRTI/POC_to_review https://github.com/Secxt/FINAL https://github.com/Tim1995/FINAL https://github.com/WhooAmii/POC_to_review https://github.com/Whoopsunix/PPPVULNS https://github.com/https-feigoss-com/test3 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/muneebaashiq/MBProjects https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/yycunhua/4ra1n https://github.com/zecool/cve https://github.com/zisigui123123s/FINAL", "No PoCs from references."], ["2022", "CVE-2022-3923", "The ActiveCampaign for WooCommerce WordPress plugin before 1.9.8 does not have authorisation check when cleaning up its error logs via an AJAX action, which could allow any authenticated users, such as subscriber to call it and remove error logs.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2"], ["2022", "CVE-2022-1826", "The Cross-Linker WordPress plugin through 3.0.1.9 does not have CSRF check in place when creating Cross-Links, which could allow attackers to make a logged in admin perform such action via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66"], ["2022", "CVE-2022-4291", "The aswjsflt.dll library from Avast Antivirus windows contained a potentially exploitable heap corruption vulnerability that could enable an attacker to bypass the sandbox of the application it was loaded into, if applicable. This issue was fixed in version 18.0.1478 of the Script Shield Component.", "No PoCs found on GitHub currently.", "https://support.norton.com/sp/static/external/tools/security-advisories.html"], ["2022", "CVE-2022-1966", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/ASkyeye/CVE-2022-1966 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-21592", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21603", "Vulnerability in the Oracle Database - Sharding component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows high privileged attacker having Local Logon privilege with network access via Local Logon to compromise Oracle Database - Sharding. Successful attacks of this vulnerability can result in takeover of Oracle Database - Sharding. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-40975", "Missing Authorization vulnerability in Aazztech Post Slider.This issue affects Post Slider: from n/a through 1.6.7.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-0509", "Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.3.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenGitLab/Bug-Storage", "https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b"], ["2022", "CVE-2022-47387", "An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-47016", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28171", "The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.", "https://github.com/ARPSyndicate/cvemon https://github.com/NyaMeeEain/CVE-2022-28171-POC https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html"], ["2022", "CVE-2022-24166", "Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the manualTime parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-35212", "osCommerce2 before v2.3.4.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the function tep_db_error().", "https://github.com/ARPSyndicate/cvemon https://github.com/cuhk-seclab/TChecker", "No PoCs from references."], ["2022", "CVE-2022-40676", "A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 allows attacker to execute unauthorized code or commands via specially crafted http requests.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-37086", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3"], ["2022", "CVE-2022-41988", "An information disclosure vulnerability exists in the OpenImageIO::decode_iptc_iim() functionality of OpenImageIO Project OpenImageIO v2.3.19.0. A specially-crafted TIFF file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643"], ["2022", "CVE-2022-1562", "The Enable SVG WordPress plugin before 1.4.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615"], ["2022", "CVE-2022-35284", "IBM Security Verify Information Queue 10.0.2 could disclose sensitive information due to a missing or insecure SameSite attribute for a sensitive cookie. IBM X-Force ID: 230811.", "https://github.com/octane23/CASE-STUDY-1", "No PoCs from references."], ["2022", "CVE-2022-26364", "x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html"], ["2022", "CVE-2022-32775", "An integer overflow vulnerability exists in the web interface /action/ipcamRecordPost functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to memory corruption. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564"], ["2022", "CVE-2022-23790", "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Firmanet Software and Technology Customer Relation Manager allows Cross-Site Scripting (XSS).This issue affects Customer Relation Manager: before 2022.03.13.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39293", "Azure RTOS USBX is a high-performance USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. The case is, in [_ux_host_class_pima_read](https://github.com/azure-rtos/usbx/blob/master/common/usbx_host_classes/src/ux_host_class_pima_read.c), there is data length from device response, returned in the very first packet, and read by [L165 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L165), as header_length. Then in [L178 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L178), there is a \u201cif\u201d branch, which check the expression of \u201c(header_length - UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE) > data_length\u201d where if header_length is smaller than UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE, calculation could overflow and then [L182 code](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L182) the calculation of data_length is also overflow, this way the later [while loop start from L192](https://github.com/azure-rtos/usbx/blob/082fd9db09a3669eca3358f10b8837a5c1635c0b/common/usbx_host_classes/src/ux_host_class_pima_read.c#L192) can move data_pointer to unexpected address and cause write buffer overflow. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). The following can be used as a workaround: Add check of `header_length`: 1. It must be greater than `UX_HOST_CLASS_PIMA_DATA_HEADER_SIZE`. 1. It should be greater or equal to the current returned data length (`transfer_request -> ux_transfer_request_actual_length`).", "https://github.com/ARPSyndicate/cvemon https://github.com/szymonh/szymonh", "No PoCs from references."], ["2022", "CVE-2022-39102", "In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-4196", "The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88"], ["2022", "CVE-2022-43718", "Upload data forms do not correctly render user input leading to possible XSS attack vectors that can be performed by authenticated users with database connection update permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27008", "nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/471"], ["2022", "CVE-2022-4347", "A vulnerability was found in xiandafu beetl-bbs. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file WebUtils.java. The manipulation of the argument user leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215107.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.215107"], ["2022", "CVE-2022-34339", "\"IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 229963.\"", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27148", "GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2067"], ["2022", "CVE-2022-21444", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-23541", "jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/zvigrinberg/exhort-service-readiness-experiment", "https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3"], ["2022", "CVE-2022-45354", "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.7.60.", "https://github.com/RandomRobbieBF/CVE-2022-45354 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-35055", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0473.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md"], ["2022", "CVE-2022-37150", "An issue was discovered in Online Diagnostic Lab Management System 1.0. There is a stored XSS vulnerability via firstname, address, middlename, lastname , gender, email, contact parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-1422", "The Discy WordPress theme before 5.2 does not check for CSRF tokens in the AJAX action discy_reset_options, allowing an attacker to trick an admin into resetting the site settings back to defaults.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b"], ["2022", "CVE-2022-20728", "A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-44038", "Russound XSourcePlayer 777D v06.08.03 was discovered to contain a remote code execution vulnerability via the scriptRunner.cgi component.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44038"], ["2022", "CVE-2022-2859", "Use after free in Chrome OS Shell in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via specific UI interactions.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32827", "A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 16, macOS Ventura 13. An app may be able to cause a denial-of-service.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html"], ["2022", "CVE-2022-30922", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the EditWlanMacList parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/11"], ["2022", "CVE-2022-1533", "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3"], ["2022", "CVE-2022-3436", "A vulnerability classified as critical was found in SourceCodester Web-Based Student Clearance System 1.0. Affected by this vulnerability is an unknown functionality of the file edit-photo.php of the component Photo Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-210367.", "https://github.com/1337-L3V1ATH0N/Exploit_Development https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html"], ["2022", "CVE-2022-4256", "The All-in-One Addons for Elementor WordPress plugin before 2.4.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89"], ["2022", "CVE-2022-21555", "Vulnerability in the MySQL Shell for VS Code product of Oracle MySQL (component: Shell: GUI). Supported versions that are affected are 1.1.8 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Shell for VS Code executes to compromise MySQL Shell for VS Code. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Shell for VS Code, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell for VS Code accessible data as well as unauthorized read access to a subset of MySQL Shell for VS Code accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-47191", "Generex UPS CS141 below 2.06 version, could allow a remote attacker to upload a firmware file containing a file with modified permissions, allowing him to escalate privileges.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-21415", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-39013", "Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-45094", "A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially inject commands into the dhcpd configuration of the affected product. An attacker might leverage this to trigger remote code execution on the affected component.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-43598", "Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT16`.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655"], ["2022", "CVE-2022-27288", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanPPTP. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-1473", "The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-20779", "Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM. For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492"], ["2022", "CVE-2022-24370", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader Foxit reader 11.0.1.0719 macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14819.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-35004", "JPEGDEC commit be4843c was discovered to contain a FPE via TIFFSHORT at /src/jpeg.inl.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-21887", "Win32k Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-37290", "GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive.", "https://github.com/ARPSyndicate/cvemon https://github.com/juhp/rpmostree-update", "No PoCs from references."], ["2022", "CVE-2022-21637", "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-30543", "A leftover debug code vulnerability exists in the console infct functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to execution of privileged operations. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519"], ["2022", "CVE-2022-47022", "An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to cause a denial of service or other unspecified impacts via glibc-cpuset in topology-linux.c.", "https://github.com/fusion-scan/fusion-scan.github.io", "No PoCs from references."], ["2022", "CVE-2022-42844", "The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 and iPadOS 16.2. An app may be able to break out of its sandbox.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20"], ["2022", "CVE-2022-3857", "A flaw was found in libpng 1.6.38. A crafted PNG image can lead to a segmentation fault and denial of service in png_setup_paeth_row() function.", "https://github.com/adegoodyer/kubernetes-admin-toolkit", "https://sourceforge.net/p/libpng/bugs/300/"], ["2022", "CVE-2022-1952", "The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04"], ["2022", "CVE-2022-1651", "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b"], ["2022", "CVE-2022-3754", "Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47"], ["2022", "CVE-2022-24152", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetRouteStatic. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-35226", "SAP Data Services Management allows an attacker to copy the data from a request and echoed into the application's immediate response, it will lead to a Cross-Site Scripting vulnerability. The attacker would have to log in to the management console to perform such as an attack, only few of the pages are vulnerable in the DS management console.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-42747", "CandidATS version 3.0.0 on 'sortBy' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "No PoCs from references."], ["2022", "CVE-2022-21934", "Under certain circumstances an authenticated user could lock other users out of the system or take over their accounts in Metasys ADS/ADX/OAS server 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS server 11 versions prior to 11.0.2.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32994", "Halo CMS v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the component /api/admin/attachments/upload.", "No PoCs found on GitHub currently.", "https://github.com/zongdeiqianxing/cve-reports/issues/1"], ["2022", "CVE-2022-24012", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the fota binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-26117", "An empty password in configuration file vulnerability [CWE-258] in FortiNAC version 8.3.7 and below, 8.5.2 and below, 8.5.4, 8.6.0, 8.6.5 and below, 8.7.6 and below, 8.8.11 and below, 9.1.5 and below, 9.2.3 and below may allow an authenticated attacker to access the MySQL databases via the CLI.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47"], ["2022", "CVE-2022-1711", "Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c32afff5-6ad5-4d4d-beea-f55ab4925797"], ["2022", "CVE-2022-3585", "A vulnerability classified as problematic has been found in SourceCodester Simple Cold Storage Management System 1.0. Affected is an unknown function of the file /csms/?page=contact_us of the component Contact Us. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-211194 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC"], ["2022", "CVE-2022-29369", "Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/467"], ["2022", "CVE-2022-1812", "Integer Overflow or Wraparound in GitHub repository publify/publify prior to 9.2.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3"], ["2022", "CVE-2022-2578", "A vulnerability, which was classified as critical, has been found in SourceCodester Garage Management System 1.0. This issue affects some unknown processing of the file /php_action/createUser.php. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md"], ["2022", "CVE-2022-28005", "An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482.", "No PoCs found on GitHub currently.", "https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88"], ["2022", "CVE-2022-32506", "An issue was discovered on certain Nuki Home Solutions devices. An attacker with physical access to the circuit board could use the SWD debug features to control the execution of code on the processor and debug the firmware, as well as read or alter the content of the internal and external flash memory. This affects Nuki Smart Lock 3.0 before 3.3.5, Nuki Smart Lock 2.0 before 2.12.4, as well as Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/"], ["2022", "CVE-2022-3806", "Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4165", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17 https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0"], ["2022", "CVE-2022-1903", "The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/biulove0x/CVE-2022-1903 https://github.com/cyllective/CVEs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08"], ["2022", "CVE-2022-21666", "Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenGitLab/Bug-Storage", "No PoCs from references."], ["2022", "CVE-2022-30512", "School Dormitory Management System 1.0 is vulnerable to SQL Injection via accounts/payment_history.php:31.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ColordStudio/CVE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigzooooz/CVE-2022-30512 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-47073", "A cross-site scripting (XSS) vulnerability in the Create Ticket page of Small CRM v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Subject parameter.", "No PoCs found on GitHub currently.", "https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df https://packetstormsecurity.com"], ["2022", "CVE-2022-28285", "When generating the assembly code for MLoadTypedArrayElementHole, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.", "https://github.com/googleprojectzero/fuzzilli https://github.com/zhangjiahui-buaa/MasterThesis", "No PoCs from references."], ["2022", "CVE-2022-39260", "Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/maxim12z/ECommerce", "No PoCs from references."], ["2022", "CVE-2022-32786", "An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jhftss/POC", "No PoCs from references."], ["2022", "CVE-2022-32417", "PbootCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the function parserIfLabel at function.php.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42716", "An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r40P0.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html"], ["2022", "CVE-2022-1600", "The YOP Poll WordPress plugin before 6.4.3 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7"], ["2022", "CVE-2022-1591", "The WordPress Ping Optimizer WordPress plugin before 2.35.1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa"], ["2022", "CVE-2022-3705", "A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2023/Jan/19"], ["2022", "CVE-2022-3494", "The Complianz WordPress plugin before 6.3.4, and Complianz Premium WordPress plugin before 6.3.6 allow a translators to inject arbitrary SQL through an unsanitized translation. SQL can be injected through an infected translation file, or by a user with a translator role through translation plugins such as Loco Translate or WPML.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34"], ["2022", "CVE-2022-40753", "IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236688.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-2529", "sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-33938", "A format string injection vulnerability exists in the ghome_process_control_packet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted XCMD can lead to memory corruption, information disclosure and denial of service. An attacker can send a malicious XML payload to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584"], ["2022", "CVE-2022-3946", "The Welcart e-Commerce WordPress plugin before 2.8.4 does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0"], ["2022", "CVE-2022-1843", "The MailPress WordPress plugin through 7.2.1 does not have CSRF checks in various places, which could allow attackers to make a logged in admin change the settings, purge log files and more via CSRF attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1"], ["2022", "CVE-2022-35516", "DedeCMS v5.7.93 - v5.7.96 was discovered to contain a remote code execution vulnerability in login.php.", "No PoCs found on GitHub currently.", "https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md"], ["2022", "CVE-2022-42077", "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md"], ["2022", "CVE-2022-45914", "The ESL (Electronic Shelf Label) protocol, as implemented by (for example) the OV80e934802 RF transceiver on the ETAG-2130-V4.3 20190629 board, does not use authentication, which allows attackers to change label values via 433 MHz RF signals, as demonstrated by disrupting the organization of a hospital storage unit, or changing retail pricing.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html http://seclists.org/fulldisclosure/2022/Dec/6"], ["2022", "CVE-2022-3064", "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29688", "CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/hy.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/27#issue-1209040138"], ["2022", "CVE-2022-45586", "Stack overflow vulnerability in function Dict::find in xpdf/Dict.cc in xpdf 4.04, allows local attackers to cause a denial of service.", "https://github.com/DiliLearngent/BugReport", "https://forum.xpdfreader.com/viewtopic.php?t=42361"], ["2022", "CVE-2022-2099", "The WooCommerce WordPress plugin before 6.6.0 is vulnerable to stored HTML injection due to lack of escaping and sanitizing in the payment gateway titles", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b"], ["2022", "CVE-2022-28675", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16642.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-23002", "When compressing or decompressing a point on the NIST P-256 elliptic curve with an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output will cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities"], ["2022", "CVE-2022-30273", "The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-21296", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28735", "The GRUB2's shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. Allowing such files to be loaded may lead to unverified code and modules to be loaded in GRUB2 breaking the secure boot trust-chain.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/ozun215/shim-review https://github.com/puzzleos/uefi-shim_review https://github.com/rhboot/shim-review https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-32236", "When a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-30333", "RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.", "https://github.com/ARPSyndicate/cvemon https://github.com/J0hnbX/CVE-2022-30333 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/TheL1ghtVn/CVE-2022-30333-PoC https://github.com/WhooAmii/POC_to_review https://github.com/aslitsecurity/Zimbra-CVE-2022-30333 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rbowes-r7/unrar-cve-2022-30333-poc https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/"], ["2022", "CVE-2022-4744", "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html"], ["2022", "CVE-2022-4847", "Incorrectly Specified Destination in a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73"], ["2022", "CVE-2022-3124", "The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. Furthermore, due to the lack of validation in the destination filename, this could allow allow them to change the content of arbitrary files on the web server", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608"], ["2022", "CVE-2022-1021", "Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a8187478-75e1-4d62-b894-651269401ca3"], ["2022", "CVE-2022-47951", "An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40032", "SQL Injection vulnerability in Simple Task Managing System version 1.0 in login.php in 'username' and 'password' parameters, allows attackers to execute arbitrary code and gain sensitive information.", "https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated https://github.com/h4md153v63n/CVEs https://github.com/h4md153v63n/h4md153v63n https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated"], ["2022", "CVE-2022-29548", "A reflected XSS issue exists in the Management Console of several WSO2 products. This affects API Manager 2.2.0, 2.5.0, 2.6.0, 3.0.0, 3.1.0, 3.2.0, and 4.0.0; API Manager Analytics 2.2.0, 2.5.0, and 2.6.0; API Microgateway 2.2.0; Data Analytics Server 3.2.0; Enterprise Integrator 6.2.0, 6.3.0, 6.4.0, 6.5.0, and 6.6.0; IS as Key Manager 5.5.0, 5.6.0, 5.7.0, 5.9.0, and 5.10.0; Identity Server 5.5.0, 5.6.0, 5.7.0, 5.9.0, 5.10.0, and 5.11.0; Identity Server Analytics 5.5.0 and 5.6.0; and WSO2 Micro Integrator 1.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/cxosmo/CVE-2022-29548 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/vishnusomank/GoXploitDB https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html"], ["2022", "CVE-2022-4956", "A vulnerability classified as critical has been found in Caphyon Advanced Installer 19.7. This affects an unknown part of the component WinSxS DLL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 19.7.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-240903.", "No PoCs found on GitHub currently.", "https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/"], ["2022", "CVE-2022-3035", "Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.0.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0bbb1046-ea9e-4cb9-bc91-b294a72d1902"], ["2022", "CVE-2022-40123", "mojoPortal v2.7 was discovered to contain a path traversal vulnerability via the \"f\" parameter at /DesignTools/CssEditor.aspx. This vulnerability allows authenticated attackers to read arbitrary files in the system.", "No PoCs found on GitHub currently.", "https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123"], ["2022", "CVE-2022-26736", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28927", "A remote code execution (RCE) vulnerability in Subconverter v0.7.2 allows attackers to execute arbitrary code via crafted config and url parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/wm-team/WMCTF2022", "https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03"], ["2022", "CVE-2022-45646", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeedUp parameter in the formSetClientState function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md"], ["2022", "CVE-2022-24930", "An Improper access control vulnerability in StRetailModeReceiver in Wear OS 3.0 prior to Firmware update MAR-2022 Release allows untrusted applications to reset default app settings without a proper permission", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-26835", "On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, directory traversal vulnerabilities exist in undisclosed iControl REST endpoints and TMOS Shell (tmsh) commands in F5 BIG-IP Guided Configuration, which may allow an authenticated attacker with at least resource administrator role privileges to read arbitrary files. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4655", "The Welcart e-Commerce WordPress plugin before 2.8.9 does not validate and escapes one of its shortcode attributes, which could allow users with a role as low as a contributor to perform a Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9"], ["2022", "CVE-2022-4484", "The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.44 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea"], ["2022", "CVE-2022-4715", "The Structured Content WordPress plugin before 1.5.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a"], ["2022", "CVE-2022-39410", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-45497", "Tenda W6-S v1.0.0.4(510) was discovered to contain a command injection vulnerability in the tpi_get_ping_output function at /goform/exeCommand.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md"], ["2022", "CVE-2022-2219", "The Unyson WordPress plugin before 2.7.27 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a"], ["2022", "CVE-2022-2188", "Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker.", "No PoCs found on GitHub currently.", "https://kcm.trellix.com/corporate/index?page=content&id=SB10383"], ["2022", "CVE-2022-45706", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the hostname parameter in the formSetNetCheckTools function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SJZx0L0Sj"], ["2022", "CVE-2022-24870", "Combodo iTop is a web based IT Service Management tool. In 3.0.0 beta releases prior to 3.0.0 beta3 a malicious script can be injected in tooltips using iTop customization mechanism. This provides a stored cross site scripting attack vector to authorized users of the system. Users are advised to upgrade. There are no known workarounds for this issue.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21387", "Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Application Framework). Supported versions that are affected are 11.3.0, 11.3.1 and 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Platform. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Commerce Platform accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-24773", "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35796", "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28867", "An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42166", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetSpeedWan.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md"], ["2022", "CVE-2022-45805", "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-29799", "A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the \u201c/etc/networkd-dispatcher\u201d base directory.", "https://github.com/ARPSyndicate/cvemon https://github.com/DDNvR/privelege_escalation https://github.com/backloop-biz/CVE_checks https://github.com/jfrog/nimbuspwn-tools https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io", "No PoCs from references."], ["2022", "CVE-2022-3175", "Missing Custom Error Page in GitHub repository ikus060/rdiffweb prior to 2.4.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159"], ["2022", "CVE-2022-43028", "Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter at /goform/SetSysTimeCfg.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-3.md"], ["2022", "CVE-2022-34549", "Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file.", "No PoCs found on GitHub currently.", "https://github.com/rawchen/sims/issues/6"], ["2022", "CVE-2022-32045", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc parameter in the function FUN_00413be4.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg"], ["2022", "CVE-2022-45524", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the opttype parameter at /goform/IPSECsave.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md"], ["2022", "CVE-2022-21234", "An SQL injection vulnerability exists in the EchoAssets.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443"], ["2022", "CVE-2022-37823", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function formSetVirtualSer.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1"], ["2022", "CVE-2022-33329", "Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573"], ["2022", "CVE-2022-3357", "The Smart Slider 3 WordPress plugin before 3.5.1.11 unserialises the content of an imported file, which could lead to PHP object injection issues when a user import (intentionally or not) a malicious file, and a suitable gadget chain is present on the site.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd"], ["2022", "CVE-2022-1252", "Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents", "No PoCs found on GitHub currently.", "https://0g.vc/posts/insecure-cipher-gnuboard5/ https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb"], ["2022", "CVE-2022-3217", "When logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a login session can obtain the login credentials.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-31"], ["2022", "CVE-2022-1083", "A vulnerability classified as critical has been found in Microfinance Management System. The manipulation of arguments like customer_type_number/account_number/account_status_number/account_type_number with the input ' and (select * from(select(sleep(10)))Avx) and 'abc' = 'abc leads to sql injection in multiple files. It is possible to launch the attack remotely.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.195642"], ["2022", "CVE-2022-20389", "Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257004", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-40090", "An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.", "https://github.com/firmianay/security-issues", "https://gitlab.com/libtiff/libtiff/-/issues/455"], ["2022", "CVE-2022-24780", "Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/Acceis/exploit-CVE-2022-24780 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html https://markus-krell.de/itop-template-injection-inside-customer-portal/"], ["2022", "CVE-2022-32294", "** DISPUTED ** Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the \"zmprove ca\" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced.", "No PoCs found on GitHub currently.", "https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e"], ["2022", "CVE-2022-35866", "This vulnerability allows remote attackers to bypass authentication on affected installations of Vinchin Backup and Recovery 6.5.0.17561. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MySQL server. The server uses a hard-coded password for the administrator user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17139.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html"], ["2022", "CVE-2022-26986", "SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire system.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html"], ["2022", "CVE-2022-21374", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4477", "The Smash Balloon Social Post Feed WordPress plugin before 4.1.6 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41"], ["2022", "CVE-2022-43168", "Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/1"], ["2022", "CVE-2022-24992", "A vulnerability in the component process.php of QR Code Generator v5.2.7 allows attackers to perform directory traversal.", "https://github.com/n0lsecurity/CVE-2022-24992 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-35977", "Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/redis-windows/redis-windows", "No PoCs from references."], ["2022", "CVE-2022-21265", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30111", "Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks.", "No PoCs found on GitHub currently.", "https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html https://www.youtube.com/watch?v=EruaGuE-cWI"], ["2022", "CVE-2022-30280", "/SecurityManagement/html/createuser.jsf in Nokia NetAct 22 allows CSRF. A remote attacker is able to create users with arbitrary privileges, even administrative privileges. The application (even if it implements a CSRF token for the random GET request) does not ever verify a CSRF token. With a little help of social engineering/phishing (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-29978", "There is a floating point exception error in sixel_encoder_do_resize, encoder.c:633 in libsixel img2sixel 1.8.6. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted JPEG file.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://github.com/saitoha/libsixel/issues/166"], ["2022", "CVE-2022-4566", "A vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975.", "https://github.com/ARPSyndicate/cvemon https://github.com/luelueking/luelueking", "https://gitee.com/y_project/RuoYi/issues/I65V2B https://github.com/luelueking/ruoyi-4.7.5-vuln-poc"], ["2022", "CVE-2022-43079", "A cross-site scripting (XSS) vulnerability in /admin/add-fee.php of Train Scheduler App v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter.", "No PoCs found on GitHub currently.", "https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md"], ["2022", "CVE-2022-34689", "Windows CryptoAPI Spoofing Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/kudelskisecurity/northsec_crypto_api_attacks https://github.com/pipiscrew/timeline https://github.com/tanjiti/sec_profile https://github.com/tomerpeled92/CVE", "No PoCs from references."], ["2022", "CVE-2022-3097", "The Plugin LBstopattack WordPress plugin before 1.1.3 does not use nonces when saving its settings, making it possible for attackers to conduct CSRF attacks. This could allow attackers to disable the plugin's protections.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43"], ["2022", "CVE-2022-3306", "Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1192", "The Turn off all comments WordPress plugin through 1.0 does not sanitise and escape the rows parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/Mouhamedtec/CVE-2022-1192 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6"], ["2022", "CVE-2022-1203", "The Content Mask WordPress plugin before 1.8.4.1 does not have authorisation and CSRF checks in various AJAX actions, as well as does not validate the option to be updated to ensure it belongs to the plugin. As a result, any authenticated user, such as subscriber could modify arbitrary blog options", "https://github.com/RandomRobbieBF/CVE-2022-1203 https://github.com/nomi-sec/PoC-in-GitHub", "https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820"], ["2022", "CVE-2022-37771", "IObit Malware Fighter v9.2 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html"], ["2022", "CVE-2022-28985", "A stored cross-site scripting (XSS) vulnerability in the addNewPost component of OrangeHRM v4.10.1 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.", "https://github.com/cooliscool/Advisories", "No PoCs from references."], ["2022", "CVE-2022-39960", "The Netic Group Export add-on before 1.0.3 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e"], ["2022", "CVE-2022-24500", "Windows SMB Remote Code Execution Vulnerability", "https://github.com/0xZipp0/CVE-2022-24500 https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rkxxz/CVE-2022-24500 https://github.com/yusufazizmustofa/CVE-2022-24500", "No PoCs from references."], ["2022", "CVE-2022-39820", "In Network Element Manager in NOKIA NFM-T R19.9, an Unprotected Storage of Credentials vulnerability occurs under /root/RestUploadManager.xml.DRC and /DEPOT/KECustom_199/OTNE_DRC/RestUploadManager.xml. A remote user, authenticated to the operating system, with access privileges to the directory /root or /DEPOT, is able to read cleartext credentials to access the web portal NFM-T and control all the PPS Network elements.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42255", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, information disclosure, or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-24440", "The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.", "https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278"], ["2022", "CVE-2022-3246", "The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.9.10 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscribers", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c"], ["2022", "CVE-2022-1343", "The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL \"ocsp\" application. When verifying an ocsp response with the \"-no_cert_checks\" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-29838", "Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124"], ["2022", "CVE-2022-4426", "The Mautic Integration for WooCommerce WordPress plugin before 1.0.3 does not have proper CSRF check when updating settings, and does not ensure that the options to be updated belong to the plugin, allowing attackers to make a logged in admin change arbitrary blog options via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38"], ["2022", "CVE-2022-35837", "Windows Graphics Component Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-23220", "USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21325", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-39424", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-24844", "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login\uff09 and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425"], ["2022", "CVE-2022-32253", "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). Due to improper input validation, the OpenSSL certificate's password could be printed to a file reachable by an attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-26941", "A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-0328", "The Simple Membership WordPress plugin before 4.0.9 does not have CSRF check when deleting members in bulk, which could allow attackers to make a logged in admin delete them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9"], ["2022", "CVE-2022-4721", "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository ikus060/rdiffweb prior to 2.5.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720"], ["2022", "CVE-2022-3141", "The Translate Multilingual sites WordPress plugin before 2.3.3 is vulnerable to an authenticated SQL injection. By adding a new language (via the settings page) containing specific special characters, the backticks in the SQL query can be surpassed and a time-based blind payload can be injected.", "https://github.com/ARPSyndicate/cvemon https://github.com/ehtec/translatepress-exploit", "http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514 https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3"], ["2022", "CVE-2022-1044", "Sensitive Data Exposure Due To Insecure Storage Of Profile Image in GitHub repository polonel/trudesk prior to v1.2.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ff878be9-563a-4d0e-99c1-fc3c767f6d3e"], ["2022", "CVE-2022-26642", "TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the X_TP_ClonedMACAddress parameter.", "No PoCs found on GitHub currently.", "https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf"], ["2022", "CVE-2022-35433", "ffjpeg commit caade60a69633d74100bd3c2528bddee0b6a1291 was discovered to contain a memory leak via /src/jfif.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-40117", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_customer.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection2.md https://github.com/zakee94/online-banking-system/issues/17"], ["2022", "CVE-2022-47874", "Improper Access Control in /tc/rpc in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to view details of database connections via class 'com.jedox.etl.mngr.Connections' and method 'getGlobalConnection'.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html"], ["2022", "CVE-2022-26702", "A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 8.6, tvOS 15.5, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2023/Mar/21"], ["2022", "CVE-2022-28913", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUploadSetting.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/10"], ["2022", "CVE-2022-42012", "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.", "https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-38599", "Teleport v3.2.2, Teleport v3.5.6-rc6, and Teleport v3.6.3-b2 was discovered to contain an information leak via the /user/get-role-list web interface.", "No PoCs found on GitHub currently.", "https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722"], ["2022", "CVE-2022-4962", "** DISPUTED ** A vulnerability was found in Apollo 2.0.0/2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /users of the component Configuration Center. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-250430 is the identifier assigned to this vulnerability. NOTE: The maintainer explains that user data information like user id, name, and email are not sensitive.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-1104", "The Popup Maker WordPress plugin before 1.16.5 does not sanitise and escape some of its Popup settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52"], ["2022", "CVE-2022-1295", "Prototype Pollution in GitHub repository alvarotrigo/fullpage.js prior to 4.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a"], ["2022", "CVE-2022-46889", "A persistent cross-site scripting (XSS) vulnerability in NexusPHP before 1.7.33 allows remote authenticated attackers to permanently inject arbitrary web script or HTML via the title parameter used in /subtitles.php.", "No PoCs found on GitHub currently.", "https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities"], ["2022", "CVE-2022-48698", "In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: fix memory leak when using debugfs_lookup()When calling debugfs_lookup() the result must have dput() called on it,otherwise the memory will leak over time. Fix this up by properlycalling dput().", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-48509", "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-4661", "The Widgets for WooCommerce Products on Elementor WordPress plugin before 1.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f"], ["2022", "CVE-2022-28581", "It is found that there is a command injection vulnerability in the setWiFiAdvancedCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/9"], ["2022", "CVE-2022-45672", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the formWx3AuthorizeSet function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWx3AuthorizeSet/formWx3AuthorizeSet.md"], ["2022", "CVE-2022-23067", "ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user\u2019s account.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067"], ["2022", "CVE-2022-30187", "Azure Storage Library Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Dikens88/hopp https://github.com/google/security-research https://github.com/shannonmullins/hopp", "No PoCs from references."], ["2022", "CVE-2022-30216", "Windows Server Service Tampering Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/corelight/CVE-2022-30216 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0268", "Cross-site Scripting (XSS) - Stored in Packagist getgrav/grav prior to 1.7.28.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39"], ["2022", "CVE-2022-4770", "Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.0 and 9.3.0.2, including 8.3.x display the full parametrized SQL query in an error message when an invalid character is used within a Pentaho Report (*.prpt).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24815", "JHipster is a development platform to quickly generate, develop, & deploy modern web applications & microservice architectures. SQL Injection vulnerability in entities for applications generated with the option \"reactive with Spring WebFlux\" enabled and an SQL database using r2dbc. Applications created without \"reactive with Spring WebFlux\" and applications with NoSQL databases are not affected. Users who have generated a microservice Gateway using the affected version may be impacted as Gateways are reactive by default. Currently, SQL injection is possible in the findAllBy(Pageable pageable, Criteria criteria) method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria. This issue has been patched in v7.8.1. Users unable to upgrade should be careful when combining criterias and conditions as the root of the issue lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`. `just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL.", "https://github.com/DavideArcolini/VulnerableMockApplication https://github.com/dvdr00t/VulnerableMockApplication", "No PoCs from references."], ["2022", "CVE-2022-23176", "WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access. This vulnerability impacts Fireware OS before 12.7.2_U1, 12.x before 12.1.3_U3, and 12.2.x through 12.5.x before 12.5.7_U3.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-32202", "In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/74"], ["2022", "CVE-2022-0379", "Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/Nithisssh/CVE-2022-0379 https://github.com/nomi-sec/PoC-in-GitHub", "https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6"], ["2022", "CVE-2022-26613", "PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability via the category parameter in categorymenu.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613"], ["2022", "CVE-2022-26582", "PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an attacker to gain root access through command injection in systool client. The attacker must have shell access to the device in order to exploit this vulnerability.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/"], ["2022", "CVE-2022-24716", "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.", "https://github.com/ARPSyndicate/cvemon https://github.com/JacobEbben/CVE-2022-24716 https://github.com/antisecc/CVE-2022-24716 https://github.com/doosec101/CVE-2022-24716 https://github.com/joaoviictorti/CVE-2022-24716 https://github.com/karimhabush/cyberowl https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pumpkinpiteam/CVE-2022-24716", "http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html"], ["2022", "CVE-2022-28802", "Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)", "No PoCs found on GitHub currently.", "https://www.zenity.io/blog/zapescape-vulnerability-disclosure/"], ["2022", "CVE-2022-3110", "An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95"], ["2022", "CVE-2022-38488", "logrocket-oauth2-example through 2020-05-27 allows SQL injection via the /auth/register username parameter.", "https://github.com/Live-Hack-CVE/CVE-2022-38488", "https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example"], ["2022", "CVE-2022-1015", "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", "https://github.com/0range1337/CVE-2022-1015 https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/H4K6/CVE-2023-0179-PoC https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/TurtleARM/CVE-2023-0179-PoC https://github.com/WhooAmii/POC_to_review https://github.com/XiaozaYa/CVE-Recording https://github.com/baehunsang/kernel2 https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/delsploit/CVE-2022-1015 https://github.com/flexiondotorg/CNCF-02 https://github.com/h0pe-ay/Vulnerability-Reproduction https://github.com/hardenedvault/ved https://github.com/hktalent/TOP https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/more-kohii/CVE-2022-1015 https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/now4yreal/linux-kernel-vulnerabilities https://github.com/now4yreal/linux-kernel-vulnerabilities-root-cause-analysis https://github.com/pivik271/CVE-2022-1015 https://github.com/pqlx/CVE-2022-1015 https://github.com/pr0ln/bob_kern_exp1 https://github.com/shuttterman/bob_kern_exp1 https://github.com/ssr-111/linux-kernel-exploitation https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/wlswotmd/CVE-2022-1015 https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/yaobinwen/robin_on_rails https://github.com/youwizard/CVE-POC https://github.com/ysanatomic/CVE-2022-1015 https://github.com/zanezhub/CVE-2022-1015-1016 https://github.com/zecool/cve", "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html http://www.openwall.com/lists/oss-security/2023/01/13/2 http://www.openwall.com/lists/oss-security/2023/02/23/1"], ["2022", "CVE-2022-1384", "Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-1155", "Old sessions are not blocked by the login enable function. in GitHub repository snipe/snipe-it prior to 5.3.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1"], ["2022", "CVE-2022-40146", "Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14.", "https://github.com/cckuailong/CVE-2022-40146_Exploit_Jar https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-35522", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: ppp_username, ppp_passwd, rwan_gateway, rwan_mask and rwan_ip, which leads to command injection in page /wan.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi"], ["2022", "CVE-2022-24656", "HexoEditor 1.1.8 is affected by Cross Site Scripting (XSS). By putting a common XSS payload in a markdown file, if opened with the app, will execute several times.", "No PoCs found on GitHub currently.", "https://github.com/zhuzhuyule/HexoEditor/issues/3"], ["2022", "CVE-2022-23036", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24955", "Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have an Uncontrolled Search Path Element for DLL files.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-26850", "When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global read permissions. NiFi immediately moved the temporary file to the final configuration directory, which significantly limited the window of opportunity for access. NiFi 1.16.0 includes updates to replace the Login Identity Providers configuration without writing a file to the operating system temporary directory.", "https://github.com/karimhabush/cyberowl https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-0239", "corenlp is vulnerable to Improper Restriction of XML External Entity Reference", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/Haxatron", "https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3"], ["2022", "CVE-2022-4630", "Sensitive Cookie Without 'HttpOnly' Flag in GitHub repository lirantal/daloradius prior to master.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/401661ee-40e6-4ee3-a925-3716b96ece5c"], ["2022", "CVE-2022-3272", "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38"], ["2022", "CVE-2022-31309", "A vulnerability in live_check.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.180719 allows attackers to obtain sensitive router information via execution of the exec cmd function.", "No PoCs found on GitHub currently.", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md"], ["2022", "CVE-2022-39814", "In NOKIA 1350 OMS R14.2, an Open Redirect vulnerability occurs is the login page via next HTTP GET parameter.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42261", "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-45893", "Planet eStream before 6.72.10.07 allows a low-privileged user to gain access to administrative and high-privileged user accounts by changing the value of the ON cookie. A brute-force attack can calculate a value that provides permanent access.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-35803", "Windows Common Log File System Driver Elevation of Privilege Vulnerability", "https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-28463", "ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://github.com/ImageMagick/ImageMagick/issues/4988"], ["2022", "CVE-2022-47695", "An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function bfd_mach_o_get_synthetic_symtab in match-o.c.", "https://github.com/ChrisAdkin8/Ubuntu-CVE-Verify", "https://sourceware.org/bugzilla/show_bug.cgi?id=29846"], ["2022", "CVE-2022-30065", "A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.", "https://github.com/ARPSyndicate/cvemon https://github.com/FairwindsOps/bif https://github.com/JtMotoX/docker-trivy https://github.com/KazKobara/dockerfile_fswiki_local https://github.com/a23au/awe-base-images https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-21311", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-36569", "Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the deviceList parameter at /goform/setMacFilterCfg.", "No PoCs found on GitHub currently.", "https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/4/tenda_ac9_setMacFilterCfg.md"], ["2022", "CVE-2022-41008", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no port redirect protocol (tcp|udp|tcp/udp) inport <1-65535> dstaddr A.B.C.D export <1-65535> description WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-4783", "The Youtube Channel Gallery WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252"], ["2022", "CVE-2022-25489", "Atom CMS v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the \"A\" parameter in /widgets/debug.php.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-36429", "A command execution vulnerability exists in the ubus backend communications functionality of Netgear Orbi Satellite RBS750 4.6.8.5. A specially-crafted JSON object can lead to arbitrary command execution. An attacker can send a sequence of malicious packets to trigger this vulnerability.", "https://github.com/Tig3rHu/Awesome_IOT_Vul_lib https://github.com/Tig3rHu/MessageForV https://github.com/karimhabush/cyberowl", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597"], ["2022", "CVE-2022-4552", "The FL3R FeelBox WordPress plugin through 8.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52"], ["2022", "CVE-2022-45541", "EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value \"value\" if the value contains a non-integer char.", "https://github.com/Srpopty/Corax", "https://github.com/weng-xianhu/eyoucms/issues/36"], ["2022", "CVE-2022-21251", "Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: Instance Main). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Installed Base. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-40224", "A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618"], ["2022", "CVE-2022-22038", "Remote Procedure Call Runtime Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1237", "Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40"], ["2022", "CVE-2022-26520", "** DISPUTED ** In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39845", "Improper validation of integrity check vulnerability in Samsung Kies prior to version 2.6.4.22074 allows local attackers to delete arbitrary directory using directory junction.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-3223", "Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.3.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/125791b6-3a68-4235-8866-6bc3a52332ba"], ["2022", "CVE-2022-1326", "The Form - Contact Form WordPress plugin through 1.2.0 does not sanitize and escape Custom text fields, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074"], ["2022", "CVE-2022-46639", "A vulnerability in the descarga_etiqueta.php component of Correos Prestashop 1.7.x allows attackers to execute a directory traversal.", "No PoCs found on GitHub currently.", "https://ia-informatica.com/it/CVE-2022-46639"], ["2022", "CVE-2022-31358", "A reflected cross-site scripting (XSS) vulnerability in Proxmox Virtual Environment prior to v7.2-3 allows remote attackers to execute arbitrary web scripts or HTML via non-existent endpoints under path /api2/html/.", "No PoCs found on GitHub currently.", "https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/"], ["2022", "CVE-2022-4443", "The BruteBank WordPress plugin before 1.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged-in admin change them via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037"], ["2022", "CVE-2022-28432", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=display&value=0&sid=2.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-37957", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21340", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon https://github.com/Alexandre-Bartel/CVE-2022-21340 https://github.com/software-engineering-and-security/AndroidsJCL-SecDev23", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23305", "By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/GavinStevensHoboken/log4j https://github.com/HynekPetrak/log4shell-finder https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/OWASP/www-project-ide-vulscanner https://github.com/RihanaDave/logging-log4j1-main https://github.com/SYRTI/POC_to_review https://github.com/Schnitker/log4j-min https://github.com/WhooAmii/POC_to_review https://github.com/albert-liu435/logging-log4j-1_2_17 https://github.com/alibanhakeia2018/exempleLog4jInjection https://github.com/apache/logging-log4j1 https://github.com/averemee-si/oracdc https://github.com/davejwilson/azure-spark-pools-log4j https://github.com/k0mi-tg/CVE-POC https://github.com/lel99999/dev_MesosRI https://github.com/logpresso/CVE-2021-44228-Scanner https://github.com/ltslog/ltslog https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/thl-cmk/CVE-log4j-check_mk-plugin https://github.com/tkomlodi/CVE-2022-23305_POC https://github.com/trhacknon/CVE-2021-44228-Scanner https://github.com/trhacknon/Pocingit https://github.com/trhacknon/log4shell-finder https://github.com/whitesource/log4j-detect-distribution https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23094", "Libreswan 4.2 through 4.5 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted IKEv1 packet because pluto/ikev1.c wrongly expects that a state object exists. This is fixed in 4.6.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45510", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the mit_ssid_index parameter at /goform/AdvSetWrlsafeset.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/AdvSetWrlsafeset/readme.md"], ["2022", "CVE-2022-28572", "Tenda AX1806 v1.0.0.1 was discovered to contain a command injection vulnerability in `SetIPv6Status` function", "No PoCs found on GitHub currently.", "https://github.com/F0und-icu/TempName/tree/main/TendaAX18"], ["2022", "CVE-2022-21191", "Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function.", "https://github.com/seal-community/patches", "https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973"], ["2022", "CVE-2022-30174", "Microsoft Office Remote Code Execution Vulnerability", "https://github.com/2lambda123/CVE-mitre https://github.com/ARPSyndicate/cvemon https://github.com/nu11secur1ty/CVE-mitre", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30174"], ["2022", "CVE-2022-37817", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the function fromSetIpMacBind.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4"], ["2022", "CVE-2022-36478", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Edit_BasicSSID.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md"], ["2022", "CVE-2022-4503", "Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4cba644c-a2f5-4ed7-af5d-f2cab1895e13"], ["2022", "CVE-2022-4692", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74"], ["2022", "CVE-2022-25598", "Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks, Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3363", "Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e"], ["2022", "CVE-2022-1266", "The Post Grid, Slider & Carousel Ultimate WordPress plugin before 1.5.0 does not sanitise and escape the Header Title, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4"], ["2022", "CVE-2022-35611", "A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html"], ["2022", "CVE-2022-31787", "IdeaTMS 2022 is vulnerable to SQL Injection via the PATH_INFO", "https://github.com/ARPSyndicate/cvemon https://github.com/RNPG/CVEs", "https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84 https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479"], ["2022", "CVE-2022-33682", "TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak credentials, configuration data, message data, and any other data sent by these clients. The vulnerability is for both the pulsar+ssl protocol and HTTPS. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. This issue affects Apache Pulsar Broker, Proxy, and WebSocket Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23999", "PendingIntent hijacking vulnerability in CpaReceiver prior to SMR Feb-2022 Release 1 allows local attackers to access media files without permission in KnoxPrivacyNoticeReceiver via implicit Intent.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-0704", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6"], ["2022", "CVE-2022-39008", "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39399", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-2601", "A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/denis-jdsouza/wazuh-vulnerability-report-maker https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/rhboot/shim-review https://github.com/seal-community/patches https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-2590", "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-33981", "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 https://seclists.org/oss-sec/2022/q2/66"], ["2022", "CVE-2022-25396", "Cosmetics and Beauty Product Online Store v1.0 was discovered to contain a SQL injection vulnerability via the search parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection"], ["2022", "CVE-2022-48065", "GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29925"], ["2022", "CVE-2022-31884", "Marval MSM v14.19.0.12476 has an Improper Access Control vulnerability which allows a low privilege user to delete other users API Keys including high privilege and the Administrator users API Keys.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/unauthorized-delete-add-api-users-api-keys"], ["2022", "CVE-2022-20861", "Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "No PoCs from references."], ["2022", "CVE-2022-27293", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formWlanSetup. This vulnerability allows attackers to cause a Denial of Service (DoS) via the webpage parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-41717", "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "https://github.com/ARPSyndicate/cvemon https://github.com/domdom82/h2conn-exploit https://github.com/henriquebesing/container-security https://github.com/k0mi-tg/CVE-POC https://github.com/kb5fls/container-security https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ruzickap/malware-cryptominer-container https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-43752", "** UNSUPPORTED WHEN ASSIGNED ** Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon.", "https://github.com/0xdea/exploits https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22824", "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-25147", "Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/a23au/awe-base-images https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-48125", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the password parameter in the setting/setOpenVpnCertGenerationCfg function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/13"], ["2022", "CVE-2022-20921", "A vulnerability in the API implementation of Cisco ACI Multi-Site Orchestrator (MSO) could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to improper authorization on specific APIs. An attacker could exploit this vulnerability by sending crafted HTTP requests. A successful exploit could allow an attacker who is authenticated with non-Administrator privileges to elevate to Administrator privileges on an affected device.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs"], ["2022", "CVE-2022-1528", "The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.9 does not escape the current URL before putting it back in a JavaScript context, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f"], ["2022", "CVE-2022-31556", "The rusyasoft/TrainEnergyServer repository through 2017-08-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22727", "A CWE-20: Improper Input Validation vulnerability exists that could allow an unauthenticated attacker to view data, change settings, impact availability of the software, or potentially impact a user\ufffds local machine when the user clicks a specially crafted link. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior)", "https://github.com/Live-Hack-CVE/CVE-2022-22727", "No PoCs from references."], ["2022", "CVE-2022-2953", "LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/414"], ["2022", "CVE-2022-0856", "libcaca is affected by a Divide By Zero issue via img2txt, which allows a remote malicious user to cause a Denial of Service", "No PoCs found on GitHub currently.", "https://github.com/cacalabs/libcaca/issues/65"], ["2022", "CVE-2022-1439", "Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press \"tab\" but there is probably a paylaod that runs without user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0"], ["2022", "CVE-2022-41845", "An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_Array::EnsureCapacity in Core/Ap4Array.h.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/770"], ["2022", "CVE-2022-22636", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44023", "PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response messages for authentication attempts.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-38335", "Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the e-mail template modules.", "No PoCs found on GitHub currently.", "https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting"], ["2022", "CVE-2022-43643", "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825 1.0.9/EE routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Generic plugin for the xupnpd service, which listens on TCP port 4044. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-19460.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22935", "An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.", "No PoCs found on GitHub currently.", "https://github.com/saltstack/salt/releases,"], ["2022", "CVE-2022-36227", "In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"", "No PoCs found on GitHub currently.", "https://github.com/libarchive/libarchive/issues/1754"], ["2022", "CVE-2022-0755", "Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cc767dbc-c676-44c1-a9d1-cd17ae77ee7e"], ["2022", "CVE-2022-2650", "Improper Restriction of Excessive Authentication Attempts in GitHub repository wger-project/wger prior to 2.2.", "https://github.com/HackinKraken/CVE-2022-2650 https://github.com/StevenAmador/CVE-2022-2650 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://huntr.dev/bounties/f0d85efa-4e78-4b1d-848f-edea115af64b"], ["2022", "CVE-2022-2710", "The Scroll To Top WordPress plugin before 1.4.1 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1"], ["2022", "CVE-2022-2481", "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39288", "fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers.", "No PoCs found on GitHub currently.", "https://github.com/fastify/fastify/security/policy"], ["2022", "CVE-2022-43703", "An installer that loads or executes files using an unconstrained search path may be vulnerable to substitute files under control of an attacker being loaded or executed instead of the intended files.", "No PoCs found on GitHub currently.", "https://developer.arm.com/documentation/ka005596/latest"], ["2022", "CVE-2022-48174", "There is a stack overflow vulnerability in ash.c:6030 in busybox before 1.35. In the environment of Internet of Vehicles, this vulnerability can be executed from command to arbitrary code execution.", "https://github.com/nqminds/SBOM-GAP https://github.com/nqminds/sbom-cli https://github.com/tquizzle/clamav-alpine", "No PoCs from references."], ["2022", "CVE-2022-27382", "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26402"], ["2022", "CVE-2022-1579", "The function check_is_login_page() uses headers for the IP check, which can be easily spoofed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668"], ["2022", "CVE-2022-31507", "The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-23888", "YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/yzmcms/yzmcms/issues/60"], ["2022", "CVE-2022-30968", "Jenkins vboxwrapper Plugin 1.3 and earlier does not escape the name and description of VBox node parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.", "https://github.com/jenkinsci-cert/nvd-cwe https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0437", "Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885"], ["2022", "CVE-2022-2532", "The Feed Them Social WordPress plugin before 3.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8"], ["2022", "CVE-2022-25334", "The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) lacks a bounds check on the signature size field in the SK_LOAD module loading routine, present in mask ROM. A module with a sufficiently large signature field causes a stack overflow, affecting secure kernel data pages. This can be leveraged to obtain arbitrary code execution in secure supervisor context by overwriting a SHA256 function pointer in the secure kernel data area when loading a forged, unsigned SK_LOAD module encrypted with the CEK (obtainable through CVE-2022-25332). This constitutes a full break of the TEE security architecture.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-1858", "Out of bounds read in DevTools in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform an out of bounds memory read via specific user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-41424", "Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/768"], ["2022", "CVE-2022-36145", "SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::Reader::getWord().", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/64"], ["2022", "CVE-2022-29323", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the MAC parameter in /goform/editassignment.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/3 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-40748", "IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236586.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-31665", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a remote code execution vulnerability. A malicious actor with administrator and network access can trigger a remote code execution.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-46095", "Sourcecodester Covid-19 Directory on Vaccination System 1.0 was discovered to contain a Cross-Site Scripting (XSS) vulnerability via verification.php because the program does not verify the txtvaccinationID parameter.", "No PoCs found on GitHub currently.", "https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md"], ["2022", "CVE-2022-44201", "D-Link DIR823G 1.02B05 is vulnerable to Commad Injection.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-34100", "A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a low-privileged user can gain a SYSTEM level command prompt by pre-staging a file structure prior to the installation of a trusted service executable and change permissions on that file structure during a repair operation.", "No PoCs found on GitHub currently.", "https://www.crestron.com/Security/Security_Advisories"], ["2022", "CVE-2022-48216", "Uniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds.", "No PoCs found on GitHub currently.", "https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae"], ["2022", "CVE-2022-30698", "NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the \"ghost domain names\" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2472", "Improper Initialization vulnerability in the local server component of EZVIZ CS-C6N-A0-1C2WFR allows a local attacker to read the contents of the memory space containing the encrypted admin password. This issue affects: EZVIZ CS-C6N-A0-1C2WFR versions prior to 5.3.0 build 220428.", "No PoCs found on GitHub currently.", "https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams"], ["2022", "CVE-2022-48307", "It was discovered that the Magritte-ftp was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of a successful man in the middle attack on magritte-ftp, an attacker would be able to read and modify network traffic such as authentication tokens or raw data entering a Palantir Foundry stack.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md"], ["2022", "CVE-2022-25365", "Docker Desktop before 4.5.1 on Windows allows attackers to move arbitrary files. NOTE: this issue exists because of an incomplete fix for CVE-2022-23774.", "https://github.com/followboy1999/CVE-2022-25365 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-22997", "Addressed a remote code execution vulnerability by resolving a command injection vulnerability and closing an AWS S3 bucket that potentially allowed an attacker to execute unsigned code on My Cloud Home devices.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107"], ["2022", "CVE-2022-41475", "RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add an administrator account.", "No PoCs found on GitHub currently.", "https://github.com/ralap-z/rpcms/issues/2"], ["2022", "CVE-2022-1809", "Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17"], ["2022", "CVE-2022-27260", "An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.", "No PoCs found on GitHub currently.", "http://buttercms.com"], ["2022", "CVE-2022-31877", "An issue in the component MSI.TerminalServer.exe of MSI Center v1.0.41.0 allows attackers to escalate privileges via a crafted TCP packet.", "No PoCs found on GitHub currently.", "https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/"], ["2022", "CVE-2022-36285", "Authenticated Arbitrary File Upload vulnerability in dmitrylitvinov Uploading SVG, WEBP and ICO files plugin <= 1.0.1 at WordPress.", "https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-36114", "Cargo is a package manager for the rust programming language. It was discovered that Cargo did not limit the amount of data extracted from compressed archives. An attacker could upload to an alternate registry a specially crafted package that extracts way more data than its size (also known as a \"zip bomb\"), exhausting the disk space on the machine using Cargo to download the package. Note that by design Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerabilities in this advisory allow performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros. The vulnerability is present in all versions of Cargo. Rust 1.64, to be released on September 22nd, will include a fix for it. Since the vulnerability is just a more limited way to accomplish what a malicious build scripts or procedural macros can do, we decided not to publish Rust point releases backporting the security fix. Patch files are available for Rust 1.63.0 are available in the wg-security-response repository for people building their own toolchain. We recommend users of alternate registries to excercise care in which package they download, by only including trusted dependencies in their projects. Please note that even with these vulnerabilities fixed, by design Cargo allows arbitrary code execution at build time thanks to build scripts and procedural macros: a malicious dependency will be able to cause damage regardless of these vulnerabilities. crates.io implemented server-side checks to reject these kinds of packages years ago, and there are no packages on crates.io exploiting these vulnerabilities. crates.io users still need to excercise care in choosing their dependencies though, as the same concerns about build scripts and procedural macros apply here.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30789", "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22.", "No PoCs found on GitHub currently.", "https://github.com/tuxera/ntfs-3g/releases"], ["2022", "CVE-2022-2563", "The Tutor LMS WordPress plugin before 2.0.10 does not escape some course parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f"], ["2022", "CVE-2022-24009", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the confsrv binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-20791", "A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the API to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd"], ["2022", "CVE-2022-44081", "Lodepng v20220717 was discovered to contain a segmentation fault via the function pngdetail.", "No PoCs found on GitHub currently.", "https://github.com/lvandeve/lodepng/issues/177"], ["2022", "CVE-2022-38006", "Windows Graphics Component Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-24149", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetWirelessRepeat. This vulnerability allows attackers to cause a Denial of Service (DoS) via the wpapsk_crypto parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-0526", "Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d8f5ce74-2a00-4813-b220-70af771b0edd"], ["2022", "CVE-2022-2423", "The DW Promobar WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2"], ["2022", "CVE-2022-25225", "Network Olympus version 1.8.0 allows an authenticated admin user to inject SQL queries in '/api/eventinstance' via the 'sqlparameter' JSON parameter. It is also possible to achieve remote code execution in the default installation (PostgreSQL) by exploiting this issue.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/spinetta/"], ["2022", "CVE-2022-4228", "A vulnerability classified as problematic has been found in SourceCodester Book Store Management System 1.0. This affects an unknown part of the file /bsms_ci/index.php/user/edit_user/. The manipulation of the argument password leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214587.", "No PoCs found on GitHub currently.", "https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash https://vuldb.com/?id.214587"], ["2022", "CVE-2022-0621", "The dTabs WordPress plugin through 1.4 does not sanitize and escape the tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98"], ["2022", "CVE-2022-2724", "A vulnerability was found in SourceCodester Employee Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /process/aprocess.php. The manipulation of the argument mailuid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205837 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/"], ["2022", "CVE-2022-31533", "The decentraminds/umbral repository through 2020-01-15 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22742", "When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20707", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC", "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-22593", "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Security Update 2022-001 Catalina, macOS Monterey 12.2, macOS Big Sur 11.6.3. A malicious application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22602", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43974", "MatrixSSL 4.0.4 through 4.5.1 has an integer overflow in matrixSslDecodeTls13. A remote attacker might be able to send a crafted TLS Message to cause a buffer overflow and achieve remote code execution. This is fixed in 4.6.0.", "No PoCs found on GitHub currently.", "https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842"], ["2022", "CVE-2022-44017", "An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-3699", "A privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version\u00a01.3.1.2 and\u00a0Lenovo Diagnostics prior to version 4.45 that could allow a local user to execute code with elevated privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/Marc-andreLabonte/AnalyseDynamiqueModulesKernel https://github.com/alfarom256/CVE-2022-3699 https://github.com/estimated1337/lenovo_exec https://github.com/gmh5225/awesome-game-security https://github.com/hfiref0x/KDU https://github.com/hktalent/bug-bounty https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanaroam/kaditaroam https://github.com/nomi-sec/PoC-in-GitHub https://github.com/passion1337/byovd-exploit https://github.com/sl4v3k/KDU https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-38090", "Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4368", "The WP CSV WordPress plugin through 1.8.0.0 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, and doe snot have CSRF checks in place as well, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7"], ["2022", "CVE-2022-25062", "TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/exploitwritter/CVE-2022-25062 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-22901", "There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at parser_parse_function_arguments in /js/js-parser.c of JerryScript commit a6ab5e9.", "No PoCs found on GitHub currently.", "https://github.com/jerryscript-project/jerryscript/issues/4916"], ["2022", "CVE-2022-36182", "Hashicorp Boundary v0.8.0 is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site.", "https://github.com/ARPSyndicate/cvemon", "https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html"], ["2022", "CVE-2022-0670", "A flaw was found in Openstack manilla owning a Ceph File system \"share\", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the \"volumes\" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28199", "NVIDIA\u2019s distribution of the Data Plane Development Kit (MLNX_DPDK) contains a vulnerability in the network stack, where error recovery is not handled properly, which can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8"], ["2022", "CVE-2022-2775", "The Fast Flow WordPress plugin before 1.2.13 does not sanitise and escape some of its Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d"], ["2022", "CVE-2022-42898", "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/a23au/awe-base-images https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-43766", "Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. Users should upgrade to 0.13.3 which addresses this issue or use a later version of Java to avoid it.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-4279", "A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214776.", "No PoCs found on GitHub currently.", "https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss https://vuldb.com/?id.214776"], ["2022", "CVE-2022-48111", "A cross-site scripting (XSS) vulnerability in the check_login function of SIPE s.r.l WI400 between version 8 and 11 included allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the f parameter.", "No PoCs found on GitHub currently.", "https://devisions.github.io/blog/cve-2022-48111 https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/"], ["2022", "CVE-2022-36093", "XWiki Platform Web Templates are templates for XWiki Platform, a generic wiki platform. By passing a template of the distribution wizard to the xpart template, user accounts can be created even when user registration is disabled. This also circumvents any email verification. Before versions 14.2 and 13.10.4, this can also be exploited on a private wiki, thus potentially giving the attacker access to the wiki. Depending on the configured default rights of users, this could also give attackers write access to an otherwise read-only public wiki. Users can also be created when an external authentication system like LDAP is configured, but authentication fails unless the authentication system supports a bypass/local accounts are enabled in addition to the external authentication system. This issue has been patched in XWiki 13.10.5 and 14.3RC1. As a workaround, one may replace `xpart.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-20616", "Jenkins Credentials Binding Plugin 1.27 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it's a zip file.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-31562", "The waveyan/internshipsystem repository through 2018-05-22 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-38181", "The Arm Mali GPU kernel driver allows unprivileged users to access freed memory because GPU memory operations are mishandled. This affects Bifrost r0p0 through r38p1, and r39p0; Valhall r19p0 through r38p1, and r39p0; and Midgard r4p0 through r32p0.", "https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation https://github.com/NetKingJ/awesome-android-security https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Pro-me3us/CVE_2022_38181_Gazelle https://github.com/Pro-me3us/CVE_2022_38181_Raven https://github.com/nomi-sec/PoC-in-GitHub https://github.com/xairy/linux-kernel-exploitation", "http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/"], ["2022", "CVE-2022-3419", "The Automatic User Roles Switcher WordPress plugin before 1.1.2 does not have authorisation and proper CSRF checks, allowing any authenticated users like subscriber to add any role to themselves, such as administrator", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b"], ["2022", "CVE-2022-2876", "A vulnerability, which was classified as critical, was found in SourceCodester Student Management System. Affected is an unknown function of the file index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-206634 is the identifier assigned to this vulnerability.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32948", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/0x36/weightBufs https://github.com/ARPSyndicate/cvemon https://github.com/DRACULA-HACK/test https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-0833", "The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the \"refresh-backup\" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d"], ["2022", "CVE-2022-22950", "n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.", "https://github.com/0velychk0/my_bashrc https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/NorthShad0w/FINAL https://github.com/OpenNMS/opennms-spring-patched https://github.com/Secxt/FINAL https://github.com/Tim1995/FINAL https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell https://github.com/muneebaashiq/MBProjects https://github.com/opennms-forge/opennms-spring-patched https://github.com/scordero1234/java_sec_demo-main https://github.com/sr-monika/sprint-rest https://github.com/thomasvincent/Spring4Shell-resources https://github.com/thomasvincent/spring-shell-resources https://github.com/thomasvincent/springshell https://github.com/yycunhua/4ra1n https://github.com/zisigui123123s/FINAL", "No PoCs from references."], ["2022", "CVE-2022-20855", "A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.", "https://github.com/ARPSyndicate/cvemon https://github.com/SirCryptic/PoC", "No PoCs from references."], ["2022", "CVE-2022-41723", "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "https://github.com/defgsus/good-github https://github.com/knabben/dos-poc https://github.com/kyverno/policy-reporter-plugins", "No PoCs from references."], ["2022", "CVE-2022-0730", "Under certain ldap conditions, Cacti authentication can be bypassed with certain credential types.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2635", "The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b"], ["2022", "CVE-2022-2885", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/edeed309-be07-4373-b15e-2d1eb415eb89"], ["2022", "CVE-2022-31591", "SAP BusinessObjects BW Publisher Service - versions 420, 430, uses a search path that contains an unquoted element. A local attacker can gain elevated privileges by inserting an executable file in the path of the affected service", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-38172", "ServiceNow through San Diego Patch 3 allows XSS via the name field during creation of a new dashboard for the Performance Analytics dashboard.", "https://github.com/kosmosec/CVE-numbers", "No PoCs from references."], ["2022", "CVE-2022-25180", "Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline.", "https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-3878", "A vulnerability classified as critical has been found in Maxon ERP. This affects an unknown part of the file /index.php/purchase_order/browse_data. The manipulation of the argument tb_search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213039.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.213039"], ["2022", "CVE-2022-43404", "A sandbox bypass vulnerability involving crafted constructor bodies and calls to sandbox-generated synthetic constructors in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21618", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21589", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.39 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0512", "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.", "https://github.com/seal-community/patches", "https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b"], ["2022", "CVE-2022-45299", "An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/offalltn/CVE-2022-45299 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/offalltn/CVE-2022-45299"], ["2022", "CVE-2022-2417", "Insufficient validation in GitLab CE/EE affecting all versions from 12.10 prior to 15.0.5, 15.1 prior to 15.1.4, and 15.2 prior to 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a victim pinned to a specific Git commit of the project.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/361179"], ["2022", "CVE-2022-0452", "Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2557", "The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e"], ["2022", "CVE-2022-48333", "Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_verify_keys prefix_len+feature_name_len integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/"], ["2022", "CVE-2022-41441", "Multiple cross-site scripting (XSS) vulnerabilities in ReQlogic v11.3 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the POBatch and WaitDuration parameters.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/"], ["2022", "CVE-2022-27254", "The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal for each door-open request, which allows for a replay attack, a related issue to CVE-2019-20626.", "https://github.com/ARPSyndicate/cvemon https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766 https://github.com/AUTOCRYPT-RED/CVE-2022-38766 https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/CyberSecurityUP/awesome-flipperzero2 https://github.com/GhostTroops/TOP https://github.com/JERRY123S/all-poc https://github.com/Lonebear69/https-github.com-UberGuidoZ-FlipperZeroHondaFirmware https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SuryaN03/DOS-REMOTE-POC https://github.com/WhooAmii/POC_to_review https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/drerx/FlipperZeroHondaFirmware https://github.com/harrygallagher4/awesome-stars https://github.com/hktalent/TOP https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nonamecoder/CVE-2022-27254 https://github.com/nonamecoder/FlipperZeroHondaFirmware https://github.com/pipiscrew/timeline https://github.com/soosmile/POC https://github.com/tanjiti/sec_profile https://github.com/trhacknon/Pocingit https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/nonamecoder/CVE-2022-27254 https://news.ycombinator.com/item?id=30804702 https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/ https://www.theregister.com/2022/03/25/honda_civic_hack/"], ["2022", "CVE-2022-36120", "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the getChartData administrative function. Using a low/no privilege Blue Prism user account, the attacker can alter the server's settings by abusing the getChartData method, allowing the Blue Prism server to execute any MSSQL stored procedure by name.", "No PoCs found on GitHub currently.", "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise"], ["2022", "CVE-2022-20434", "There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242244028", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22531", "The F0743 Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, 105, 106, does not check uploaded or downloaded files. This allows an attacker with basic user rights to run arbitrary script code, resulting in sensitive information being disclosed or modified.", "No PoCs found on GitHub currently.", "https://launchpad.support.sap.com/#/notes/3112928"], ["2022", "CVE-2022-26138", "The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.", "https://github.com/0day404/vulnerability-poc https://github.com/1mxml/CVE-2022-26138 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/KayCHENvip/vulnerability-poc https://github.com/Loginsoft-LLC/Linux-Exploit-Detection https://github.com/Loginsoft-Research/Linux-Exploit-Detection https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/Vulnmachines/Confluence-Question-CVE-2022-26138- https://github.com/WhooAmii/POC_to_review https://github.com/alcaparra/CVE-2022-26138 https://github.com/d4n-sec/d4n-sec.github.io https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/shavchen/CVE-2022-26138 https://github.com/tr3ss/gofetch https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/z92g/CVE-2022-26138 https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-31651", "In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.", "https://github.com/ARPSyndicate/cvemon", "https://sourceforge.net/p/sox/bugs/360/"], ["2022", "CVE-2022-38123", "Improper Input Validation of plugin files in Administrator Interface of Secomea GateManager allows a server administrator to inject code into the GateManager interface. This issue affects: Secomea GateManager versions prior to 10.0.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-44235", "Beijing Zed-3 Technologies Co.,Ltd VoIP simpliclty ASG 8.5.0.17807 (20181130-16:12) is vulnerable to Cross Site Scripting (XSS).", "No PoCs found on GitHub currently.", "https://github.com/liong007/Zed-3/issues/1"], ["2022", "CVE-2022-21649", "Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"<\" or \">\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenGitLab/Bug-Storage", "https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/"], ["2022", "CVE-2022-0543", "It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.", "https://github.com/0day404/vulnerability-poc https://github.com/0x7eTeam/CVE-2022-0543 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ArrestX/--POC https://github.com/HACK-THE-WORLD/DailyMorningReading https://github.com/JacobEbben/CVE-2022-0543 https://github.com/KayCHENvip/vulnerability-poc https://github.com/Loginsoft-LLC/Linux-Exploit-Detection https://github.com/Loginsoft-Research/Linux-Exploit-Detection https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Newbee740/REDIS-CVE-2022-0543 https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/SiennaSkies/redisHack https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Vulhub-Reproduce https://github.com/WhooAmii/POC_to_review https://github.com/Yang8miao/prov_navigator https://github.com/ZWDeJun/ZWDeJun https://github.com/aodsec/CVE-2022-0543 https://github.com/bakery312/Vulhub-Reproduce https://github.com/bfengj/CTF https://github.com/bigblackhat/oFx https://github.com/d-rn/vulBox https://github.com/d4n-sec/d4n-sec.github.io https://github.com/dai5z/LBAS https://github.com/gwyomarch/Shared-HTB-Writeup-FR https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/petitfleur/prov_navigator https://github.com/provnavigator/prov_navigator https://github.com/soosmile/POC https://github.com/superlink996/chunqiuyunjingbachang https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/yuyan-sec/RedisEXP https://github.com/z92g/CVE-2022-0543 https://github.com/zecool/cve https://github.com/zyylhn/redis_rce https://github.com/zyylhn/zscan", "http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce"], ["2022", "CVE-2022-3829", "The Font Awesome 4 Menus WordPress plugin through 4.7.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/"], ["2022", "CVE-2022-33917", "An issue was discovered in the Arm Mali GPU Kernel Driver (Valhall r29p0 through r38p0). A non-privileged user can make improper GPU processing operations to gain access to already freed memory.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html"], ["2022", "CVE-2022-43684", "ServiceNow has released patches and an upgrade that address an Access Control List (ACL) bypass issue in ServiceNow Core functionality.Additional DetailsThis issue is present in the following supported ServiceNow releases: * Quebec prior to Patch 10 Hot Fix 8b * Rome prior to Patch 10 Hot Fix 1 * San Diego prior to Patch 7 * Tokyo prior to Tokyo Patch 1; and * Utah prior to Utah General Availability If this ACL bypass issue were to be successfully exploited, it potentially could allow an authenticated user to obtain sensitive information from tables missing authorization controls.", "https://github.com/lolminerxmrig/CVE-2022-43684 https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html"], ["2022", "CVE-2022-27205", "A missing permission check in Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-36171", "MapGIS IGServer 10.5.6.11 is vulnerable to Arbitrary file deletion.", "No PoCs found on GitHub currently.", "https://github.com/prismbreak/vulnerabilities/issues/2"], ["2022", "CVE-2022-21498", "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0403", "The Library File Manager WordPress plugin before 5.2.3 is using an outdated version of the elFinder library, which is know to be affected by security issues (CVE-2021-32682), and does not have any authorisation as well as CSRF checks in its connector AJAX action, allowing any authenticated users, such as subscriber to call it. Furthermore, as the options passed to the elFinder library does not restrict any file type, users with a role as low as subscriber can Create/Upload/Delete Arbitrary files and folders.", "https://github.com/ARPSyndicate/cvemon https://github.com/iBLISSLabs/Exploit-WordPress-Library-File-Manager-Plugin-Version-5.2.2", "https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e"], ["2022", "CVE-2022-45019", "SLiMS 9 Bulian v9.5.0 was discovered to contain a SQL injection vulnerability via the keywords parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "No PoCs from references."], ["2022", "CVE-2022-35089", "SWFTools commit 772e55a2 was discovered to contain a heap-buffer-overflow via getTransparentColor at /home/bupt/Desktop/swftools/src/gif2swf.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md"], ["2022", "CVE-2022-0891", "A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact", "No PoCs found on GitHub currently.", "https://gitlab.com/libtiff/libtiff/-/issues/380 https://gitlab.com/libtiff/libtiff/-/issues/382"], ["2022", "CVE-2022-26169", "Air Cargo Management System v1.0 was discovered to contain a SQL injection vulnerability via the ref_code parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System"], ["2022", "CVE-2022-31711", "VMware vRealize Log Insight contains an Information Disclosure Vulnerability. A malicious actor can remotely collect sensitive session and application information without authentication.", "https://github.com/getdrive/PoC https://github.com/horizon3ai/CVE-2023-34051 https://github.com/horizon3ai/vRealizeLogInsightRCE", "http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html"], ["2022", "CVE-2022-0413", "Use After Free in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38"], ["2022", "CVE-2022-0782", "The Donations WordPress plugin through 1.8 does not sanitise and escape the nd_donations_id parameter before using it in a SQL statement via the nd_donations_single_cause_form_validate_fields_php_function AJAX action (available to unauthenticated users), leading to an unauthenticated SQL Injection", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5"], ["2022", "CVE-2022-21488", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-27215", "A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-36161", "Orange Station 1.0 was discovered to contain a SQL injection vulnerability via the username parameter.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0"], ["2022", "CVE-2022-25310", "A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/fribidi/fribidi/issues/183"], ["2022", "CVE-2022-25081", "TOTOLink T10 V5.9c.5061_B20200511 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T10/README.md"], ["2022", "CVE-2022-44365", "Tenda i21 V1.0.0.14(4656) has a stack overflow vulnerability via /goform/setSysPwd.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md"], ["2022", "CVE-2022-43997", "Incorrect access control in Aternity agent in Riverbed Aternity before 12.1.4.27 allows for local privilege escalation. There is an insufficiently protected handle to the A180AG.exe SYSTEM process with PROCESS_ALL_ACCESS rights.", "No PoCs found on GitHub currently.", "https://winternl.com/cve-2022-43997/"], ["2022", "CVE-2022-0881", "Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2628431e-6a98-4063-a0e3-a8b1d9ebaa9c"], ["2022", "CVE-2022-35099", "SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md"], ["2022", "CVE-2022-29247", "Electron is a framework for writing cross-platform desktop applications using JavaScript (JS), HTML, and CSS. A vulnerability in versions prior to 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`. The `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access. Rather, it depends on the existing sandbox setting. If an application is sandboxed, then `nodeIntegrationInSubFrames` just gives access to the sandboxed renderer APIs, which include `ipcRenderer`. If the application then additionally exposes IPC messages without IPC `senderFrame` validation that perform privileged actions or return confidential data this access to `ipcRenderer` can in turn compromise your application / user even with the sandbox enabled. Electron versions 18.0.0-beta.6, 17.2.0, 16.2.6, and 15.5.5 contain a fix for this issue. As a workaround, ensure that all IPC message handlers appropriately validate `senderFrame`.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/a1ise/CVE-2022-29247 https://github.com/doyensec/awesome-electronjs-hacking https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41540", "The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.", "https://github.com/ARPSyndicate/cvemon https://github.com/efchatz/easy-exploits https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption"], ["2022", "CVE-2022-3839", "The Analytics for WP WordPress plugin through 1.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90"], ["2022", "CVE-2022-34035", "HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.", "No PoCs found on GitHub currently.", "https://github.com/michaelrsweet/htmldoc/issues/426"], ["2022", "CVE-2022-48323", "Sunlogin Sunflower Simplified (aka Sunflower Simple and Personal) 1.0.1.43315 is vulnerable to a path traversal issue. A remote and unauthenticated attacker can execute arbitrary programs on the victim host by sending a crafted HTTP request, as demonstrated by /check?cmd=ping../ followed by the pathname of the powershell.exe program.", "No PoCs found on GitHub currently.", "https://asec.ahnlab.com/en/47088/"], ["2022", "CVE-2022-2547", "A crafted HTTP packet without a content-type header can create a denial-of-service condition in Softing Secure Integration Server V1.22.", "https://github.com/ARPSyndicate/cvemon https://github.com/rdomanski/Exploits_and_Advisories", "No PoCs from references."], ["2022", "CVE-2022-0442", "The UsersWP WordPress plugin before 1.2.3.1 is missing access controls when updating a user avatar, and does not make sure file names for user avatars are unique, allowing a logged in user to overwrite another users avatar.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692"], ["2022", "CVE-2022-22521", "In Miele Benchmark Programming Tool with versions Prior to 1.2.71, executable files manipulated by attackers are unknowingly executed with users privileges. An attacker with low privileges may trick a user with administrative privileges to execute these binaries as admin.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html http://seclists.org/fulldisclosure/2022/Apr/42"], ["2022", "CVE-2022-33655", "Azure Site Recovery Elevation of Privilege Vulnerability", "https://github.com/tnishiox/kernelcare-playground", "No PoCs from references."], ["2022", "CVE-2022-38022", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-38162", "Reflected cross-site scripting (XSS) vulnerabilities in WithSecure through 2022-08-10) exists within the F-Secure Policy Manager due to an unvalidated parameter in the endpoint, which allows remote attackers to provide a malicious input.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29187", "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.", "https://github.com/9069332997/session-1-full-stack https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-31581", "The scorelab/OpenMF repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726 https://github.com/scorelab/OpenMF/issues/262"], ["2022", "CVE-2022-31610", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26068", "This affects the package pistacheio/pistache before 0.0.3.20220425. It is possible to traverse directories to fetch arbitrary files from the server.", "https://github.com/ARPSyndicate/cvemon https://github.com/Kirill89/Kirill89", "https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332"], ["2022", "CVE-2022-0990", "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/31649903-c19c-4dae-aee0-a04b095855c5"], ["2022", "CVE-2022-2895", "Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. These controls may allow two stack-based buffer overflow instances while processing a specific project file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2407", "The WP phpMyAdmin WordPress plugin before 5.2.0.4 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca"], ["2022", "CVE-2022-2796", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/69d56ec3-8370-44cf-9732-4065e3076097"], ["2022", "CVE-2022-0502", "Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-0693", "The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643"], ["2022", "CVE-2022-21599", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21608", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-27304", "Student Grading System v1.0 was discovered to contain a SQL injection vulnerability via the user parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System"], ["2022", "CVE-2022-27095", "BattlEye v0.9 contains an unquoted service path which allows attackers to escalate privileges to the system level.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50815"], ["2022", "CVE-2022-34175", "Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-3549", "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /csms/admin/?page=user/manage_user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-211049 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE"], ["2022", "CVE-2022-29034", "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). An error message pop up window in the web interface of the affected application does not prevent injection of JavaScript code. This could allow attackers to perform reflected cross-site scripting (XSS) attacks.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2022/Jun/35"], ["2022", "CVE-2022-2926", "The Download Manager WordPress plugin before 3.2.55 does not validate one of its settings, which could allow high privilege users such as admin to list and read arbitrary files and folders outside of the blog directory", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785"], ["2022", "CVE-2022-2625", "A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0720", "The Amelia WordPress plugin before 1.0.47 does not have proper authorisation when managing appointments, allowing any customer to update other's booking, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf"], ["2022", "CVE-2022-27126", "zbzcms v1.0 was discovered to contain a SQL injection vulnerability via the art parameter at /include/make.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-25023", "Audio File commit 004065d was discovered to contain a heap-buffer overflow in the function fouBytesToInt():AudioFile.h.", "No PoCs found on GitHub currently.", "https://github.com/adamstark/AudioFile/issues/58"], ["2022", "CVE-2022-43636", "This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link TL-WR940N 6_211111 3.20.1(US) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of sufficient randomness in the sequnce numbers used for session managment. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-18334.", "https://github.com/IamAlch3mist/Awesome-Embedded-Systems-Vulnerability-Research", "No PoCs from references."], ["2022", "CVE-2022-4329", "The Product list Widget for Woocommerce WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against both unauthenticated and authenticated users (such as high privilege one like admin).", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a"], ["2022", "CVE-2022-43776", "The url parameter of the /api/geojson endpoint in Metabase versions <44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-34"], ["2022", "CVE-2022-2765", "A vulnerability was found in SourceCodester Company Website CMS 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/settings. The manipulation leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206161 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md"], ["2022", "CVE-2022-28189", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a NULL pointer dereference may lead to a system crash.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-0660", "Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291"], ["2022", "CVE-2022-0963", "Unrestricted XML Files Leads to Stored XSS in GitHub repository microweber/microweber prior to 1.2.12.", "https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c"], ["2022", "CVE-2022-3798", "A vulnerability classified as critical has been found in IBAX go-ibax. Affected is an unknown function of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212634 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/IBAX-io/go-ibax/issues/2060"], ["2022", "CVE-2022-29174", "countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user interface and in 21.11.4 for servers using the old user interface.", "https://github.com/HakuPiku/CVEs", "No PoCs from references."], ["2022", "CVE-2022-31572", "The ceee-vip/cockybook repository through 2015-04-16 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-2977", "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f"], ["2022", "CVE-2022-38080", "Reflected cross-site scripting vulnerability in Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows a remote authenticated attacker to inject an arbitrary script.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-38311", "Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the time parameter at /goform/PowerSaveSet.", "No PoCs found on GitHub currently.", "https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5"], ["2022", "CVE-2022-3689", "The HTML Forms WordPress plugin before 1.3.25 does not properly properly escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c"], ["2022", "CVE-2022-44007", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to an unsafe implementation of session tracking, it is possible for an attacker to trick users into opening an authenticated user session for a session identifier known to the attacker, aka Session Fixation.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-3518", "A vulnerability classified as problematic has been found in SourceCodester Sanitization Management System 1.0. Affected is an unknown function of the component User Creation Handler. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-211014 is the identifier assigned to this vulnerability.", "https://github.com/k0mi-tg/CVE-POC https://github.com/lohith19/CVE-2022-3518 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/lohith19/CVE-2022-3518/blob/main/POC"], ["2022", "CVE-2022-22583", "A permissions issue was addressed with improved validation. This issue is fixed in Security Update 2022-001 Catalina, macOS Monterey 12.2, macOS Big Sur 11.6.3. An application may be able to access restricted files.", "https://github.com/ARPSyndicate/cvemon https://github.com/jhftss/POC", "No PoCs from references."], ["2022", "CVE-2022-41861", "A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46293", "Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Final Point and Derivatives section", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666"], ["2022", "CVE-2022-41762", "An issue was discovered in NOKIA NFM-T R19.9. Multiple Reflected XSS vulnerabilities exist in the Network Element Manager via any parameter to log.pl, the bench or pid parameter to top.pl, or the id parameter to easy1350.pl.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-36203", "Doctor's Appointment System 1.0 is vulnerable to Cross Site Scripting (XSS) via the admin panel. In addition, it leads to takeover the administrator account by stealing the cookie via XSS.", "https://github.com/ARPSyndicate/cvemon https://github.com/aznull/CVEs", "http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-27177", "A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2", "https://github.com/Ericsson/secure_coding_one_stop_shop_for_python", "No PoCs from references."], ["2022", "CVE-2022-25072", "TP-Link Archer A54 Archer A54(US)_V1_210111 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/Archer%20A54"], ["2022", "CVE-2022-4378", "A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories", "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html https://seclists.org/oss-sec/2022/q4/178"], ["2022", "CVE-2022-42999", "D-Link DIR-816 A2 1.10 B05 was discovered to contain multiple command injection vulnerabilities via the admuser and admpass parameters at /goform/setSysAdm.", "https://github.com/ARPSyndicate/cvemon https://github.com/hunzi0/Vullnfo", "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-2674", "A vulnerability was found in SourceCodester Best Fee Management System. It has been rated as critical. Affected by this issue is the function login of the file admin_class.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-205658 is the identifier assigned to this vulnerability.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0771", "The SiteSuperCharger WordPress plugin before 5.2.0 does not validate, sanitise and escape various user inputs before using them in SQL statements via AJAX actions (available to both unauthenticated and authenticated users), leading to Unauthenticated SQL Injections", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75"], ["2022", "CVE-2022-2734", "Improper Restriction of Rendered UI Layers or Frames in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d8e4c70c-788b-47e9-8141-a08db751d4e6"], ["2022", "CVE-2022-0631", "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40"], ["2022", "CVE-2022-41622", "In all versions, BIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.", "https://github.com/ARPSyndicate/cvemon https://github.com/f0cus77/awesome-iot-security-resource https://github.com/f1tao/awesome-iot-security-resource https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rbowes-r7/refreshing-soap-exploit https://github.com/whoforget/CVE-POC https://github.com/xu-xiang/awesome-security-vul-llm https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-20954", "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-36343", "Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in ideasToCode Enable SVG, WebP & ICO Upload plugin <= 1.0.1 at WordPress.", "https://github.com/ARPSyndicate/cvemon https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-25132", "A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-22851", "A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Sant268/CVE-2022-22851 https://github.com/WhooAmii/POC_to_review https://github.com/binganao/vulns-2022 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-48150", "Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sahilop123/-CVE-2022-48150", "https://github.com/sahilop123/-CVE-2022-48150"], ["2022", "CVE-2022-31523", "The PaddlePaddle/Anakin repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-24159", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetPPTPServer. This vulnerability allows attackers to cause a Denial of Service (DoS) via the startIp and endIp parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-27330", "A cross-site scripting (XSS) vulnerability in /public/admin/index.php?add_product of E-Commerce Website v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Title text field.", "https://github.com/ARPSyndicate/cvemon https://github.com/CP04042K/CVE", "https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC"], ["2022", "CVE-2022-25235", "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.", "https://github.com/ARGOeu-Metrics/secmon-probes https://github.com/ARGOeu/secmon-probes https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-25235 https://github.com/WhooAmii/POC_to_review https://github.com/fokypoky/places-list https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rootameen/vulpine https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-48257", "In Eternal Terminal 6.2.1, etserver and etclient have predictable logfile names in /tmp.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-47029", "An issue was found in Action Launcher v50.5 allows an attacker to escalate privilege via modification of the intent string to function update.", "No PoCs found on GitHub currently.", "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md"], ["2022", "CVE-2022-0536", "Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior to 1.14.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi https://github.com/zvigrinberg/exhort-service-readiness-experiment", "No PoCs from references."], ["2022", "CVE-2022-0476", "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/wtdcode/wtdcode", "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d"], ["2022", "CVE-2022-47169", "Cross-Site Request Forgery (CSRF) vulnerability in StaxWP Visibility Logic for Elementor plugin <=\u00a02.3.4 versions.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-27270", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component ipsec_secrets. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-1819", "A vulnerability, which was classified as problematic, was found in Student Information System 1.0. Affected is admin/?page=students of the Student Roll module. The manipulation with the input leads to authenticated cross site scripting. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Student%20Information%20System/SIS_Stored_Cross_Site_Scripting(XSS).md"], ["2022", "CVE-2022-25375", "An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/szymonh/rndis-co https://github.com/szymonh/szymonh https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10"], ["2022", "CVE-2022-34001", "Unit4 ERP through 7.9 allows XXE via ExecuteServerProcessAsynchronously.", "No PoCs found on GitHub currently.", "https://prisminfosec.com/cve-2022-34001/"], ["2022", "CVE-2022-24019", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the netctrl binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-38296", "Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CuppaCMS/CuppaCMS/issues/33"], ["2022", "CVE-2022-31675", "VMware vRealize Operations contains an authentication bypass vulnerability. An unauthenticated malicious actor with network access may be able to create a user with administrative privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/sourceincite/DashOverride https://github.com/trhacknon/DashOverride", "No PoCs from references."], ["2022", "CVE-2022-24108", "The Skyoftech So Listing Tabs module 2.2.0 for OpenCart allows a remote attacker to inject a serialized PHP object via the setting parameter, potentially resulting in the ability to write to files on the server, cause DoS, and achieve remote code execution because of deserialization of untrusted data.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html"], ["2022", "CVE-2022-2462", "The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrTuxracer/advisories https://github.com/soxoj/information-disclosure-writeups-and-pocs", "https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt"], ["2022", "CVE-2022-30688", "needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.", "No PoCs found on GitHub currently.", "https://github.com/liske/needrestart/releases/tag/v3.6"], ["2022", "CVE-2022-30519", "XSS in signing form in Reprise Software RLM License Administration v14.2BL4 allows remote attacker to inject arbitrary code via password field.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519"], ["2022", "CVE-2022-1908", "Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a7436e88-0488-4bd4-816f-2e2c803e93e8"], ["2022", "CVE-2022-48197", "** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting (XSS) exists in Sandbox examples in the YUI2 repository. The download distributions, TreeView component and the YUI Javascript library overall are not affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ryan412/CVE-2022-48197 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html"], ["2022", "CVE-2022-33873", "An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Console login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to execute arbitrary command in the underlying shell.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31836", "The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.", "https://github.com/ARPSyndicate/cvemon https://github.com/runner361/CVE-List", "No PoCs from references."], ["2022", "CVE-2022-36155", "tifig v0.2.2 was discovered to contain a resource allocation issue via operator new(unsigned long) at asan_new_delete.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-1848", "Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8dfe0877-e44b-4a1a-8eee-5c03c93ae90a"], ["2022", "CVE-2022-25324", "All versions of package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8, when verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581"], ["2022", "CVE-2022-2522", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/"], ["2022", "CVE-2022-0427", "Missing sanitization of HTML attributes in Jupyter notebooks in all versions of GitLab CE/EE since version 14.5 allows an attacker to perform arbitrary HTTP POST requests on a user's behalf leading to potential account takeover", "https://github.com/ARPSyndicate/cvemon", "https://gitlab.com/gitlab-org/gitlab/-/issues/347284"], ["2022", "CVE-2022-22544", "Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29333", "A vulnerability in CyberLink Power Director v14 allows attackers to escalate privileges via a crafted .exe file.", "https://github.com/ARPSyndicate/cvemon https://github.com/CyberSecurityUP/My-CVEs", "https://www.youtube.com/watch?v=r75k-ae3_ng https://youtu.be/B46wtd-ZNog"], ["2022", "CVE-2022-38047", "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20441", "In navigateUpTo of Task.java, there is a possible way to launch an unexported intent handler due to a logic error in the code. This could lead to local escalation of privilege if the targeted app has an intent trampoline, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-238605611", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20441 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-27003", "Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6rd function via the relay6rd parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md"], ["2022", "CVE-2022-25297", "This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/Poc-Git https://github.com/CVEDB/cve https://github.com/Kirill89/Kirill89 https://github.com/SkyBelll/CVE-PoC https://github.com/jaeminLeee/cve https://github.com/trickest/cve https://github.com/w3security/PoCVE", "https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243"], ["2022", "CVE-2022-25106", "D-Link DIR-859 v1.05 was discovered to contain a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.", "No PoCs found on GitHub currently.", "https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-48164", "An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN533A8 M33A8.V5030.190716 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.", "No PoCs found on GitHub currently.", "https://docs.google.com/document/d/1JgqpBYRxyU0WKDSqkvi4Yo0723k7mrIUeuH9i1eEs8U/edit?usp=sharing https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md"], ["2022", "CVE-2022-43713", "Interactive Forms (IAF) in GX Software XperienCentral versions 10.33.1 until 10.35.0 was vulnerable to invalid data input because form validation could be bypassed.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-39109", "In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2491", "A vulnerability has been found in SourceCodester Library Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file lab.php. The manipulation of the argument Section with the input 1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71716b7171,0x546e4444736b7743575a666d4873746a6450616261527a67627944426946507245664143694c6a4c,0x7162706b71),NULL,NULL,NULL,NULL# leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md https://vuldb.com/?id.204574"], ["2022", "CVE-2022-0594", "The Professional Social Sharing Buttons, Icons & Related Posts WordPress plugin before 9.7.6 does not have proper authorisation check in one of the AJAX action, available to unauthenticated (in v < 9.7.5) and author+ (in v9.7.5) users, allowing them to call it and retrieve various information such as the list of active plugins, various version like PHP, cURL, WP etc.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1"], ["2022", "CVE-2022-0605", "Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/oz9un/Exploitable_KB_Finder", "No PoCs from references."], ["2022", "CVE-2022-0906", "Unrestricted file upload leads to stored XSS in GitHub repository microweber/microweber prior to 1.1.12.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8"], ["2022", "CVE-2022-31517", "The HolgerGraef/MSM repository through 2021-04-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46076", "D-Link DIR-869 DIR869Ax_FW102B15 is vulnerable to Authentication Bypass via phpcgi.", "No PoCs found on GitHub currently.", "https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-1569", "The Drag & Drop Builder, Human Face Detector, Pre-built Templates, Spam Protection, User Email Notifications & more! WordPress plugin before 1.4.9.4 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc"], ["2022", "CVE-2022-41915", "Netty project is an event-driven asynchronous network application framework. Starting in version 4.1.83.Final and prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.", "https://github.com/ARPSyndicate/cvemon https://github.com/aws/aws-msk-iam-auth https://github.com/sr-monika/sprint-rest", "No PoCs from references."], ["2022", "CVE-2022-38325", "Tenda AC15 WiFi Router V15.03.05.19_multi and AC18 WiFi Router V15.03.05.19_multi were discovered to contain a buffer overflow via the filePath parameter at /goform/expandDlnaFile.", "https://github.com/1160300418/Vuls", "https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md"], ["2022", "CVE-2022-22626", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1429", "SQL injection in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. This vulnerability is capable of steal the data", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e"], ["2022", "CVE-2022-0846", "The SpeakOut! Email Petitions WordPress plugin before 2.14.15.1 does not sanitise and escape the id parameter before using it in a SQL statement via the dk_speakout_sendmail AJAX action, leading to an SQL Injection exploitable by unauthenticated users", "https://github.com/ARPSyndicate/cvemon https://github.com/DharmaDoll/Search-Poc-from-CVE https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4"], ["2022", "CVE-2022-2943", "The WordPress Infinite Scroll \u2013 Ajax Load More plugin for Wordpress is vulnerable to arbitrary file reading in versions up to, and including, 5.5.3 due to insufficient file path validation on the alm_repeaters_export() function. This makes it possible for authenticated attackers, with administrative privileges, to download arbitrary files hosted on the server that may contain sensitive content, such as the wp-config.php file.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9"], ["2022", "CVE-2022-0745", "The Like Button Rating WordPress plugin before 2.6.45 allows any logged-in user, such as subscriber, to send arbitrary e-mails to any recipient, with any subject and body", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a"], ["2022", "CVE-2022-25046", "A path traversal vulnerability in loader.php of CWP v0.9.8.1122 allows attackers to execute arbitrary code via a crafted POST request.", "No PoCs found on GitHub currently.", "https://github.com/Immersive-Labs-Sec/CentOS-WebPanel"], ["2022", "CVE-2022-0654", "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/vonwig/atomist-advisories", "https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc"], ["2022", "CVE-2022-22834", "An issue was discovered in OverIT Geocall before 8.0. An authenticated user who has the Test Trasformazione XSL functionality enabled can exploit a XSLT Injection vulnerability. Attackers could exploit this issue to achieve remote code execution.", "No PoCs found on GitHub currently.", "https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/"], ["2022", "CVE-2022-38234", "XPDF commit ffaf11c was discovered to contain a segmentation violation via Lexer::getObj(Object*) at /xpdf/Lexer.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-22737", "Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.mozilla.org/show_bug.cgi?id=1745874"], ["2022", "CVE-2022-31546", "The nlpweb/glance repository through 2014-06-27 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1538", "Theme Demo Import WordPress plugin before 1.1.1 does not validate the imported file, allowing high-privilege users such as admin to upload arbitrary files (such as PHP) even when FILE_MODS and FILE_EDIT are disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/"], ["2022", "CVE-2022-0957", "Stored XSS via File Upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21"], ["2022", "CVE-2022-30929", "Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.", "https://github.com/ARPSyndicate/cvemon https://github.com/AgainstTheLight/CVE-2022-30929 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanaao/CVE-2022-30929 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/AgainstTheLight/CVE-2022-30929"], ["2022", "CVE-2022-2852", "Use after free in FedCM in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html"], ["2022", "CVE-2022-0817", "The BadgeOS WordPress plugin through 3.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e"], ["2022", "CVE-2022-2912", "The Craw Data WordPress plugin through 1.0.0 does not implement nonce checks, which could allow attackers to make a logged in admin change the url value performing unwanted crawls on third-party sites (SSRF).", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c"], ["2022", "CVE-2022-38374", "A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4 allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews.", "https://github.com/ARPSyndicate/cvemon https://github.com/M4fiaB0y/CVE-2022-38374 https://github.com/azhurtanov/CVE-2022-38374 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-29391", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_004200c8.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig"], ["2022", "CVE-2022-22677", "A logic issue in the handling of concurrent media was addressed with improved state handling. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. Video self-preview in a webRTC call may be interrupted if the user answers a phone call.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41496", "iCMS v7.0.16 was discovered to contain a Server-Side Request Forgery (SSRF) via the url parameter at admincp.php.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md"], ["2022", "CVE-2022-36266", "In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a stored XSS vulnerability. As the binary file /home/www/cgi-bin/login.cgi does not check if the user is authenticated, a malicious actor can craft a specific request on the login.cgi endpoint that contains a base32 encoded XSS payload that will be accepted and stored. A successful attack will results in the injection of malicious scripts into the user settings page.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html"], ["2022", "CVE-2022-25017", "Hitron CHITA 7.2.2.0.3b6-CD devices contain a command injection vulnerability via the Device/DDNS ddnsUsername field.", "No PoCs found on GitHub currently.", "https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef"], ["2022", "CVE-2022-43593", "A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652"], ["2022", "CVE-2022-43602", "Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656"], ["2022", "CVE-2022-2580", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249"], ["2022", "CVE-2022-0714", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3"], ["2022", "CVE-2022-4682", "The Lightbox Gallery WordPress plugin before 0.9.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72"], ["2022", "CVE-2022-36468", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md"], ["2022", "CVE-2022-21210", "An SQL injection vulnerability exists in the AssetActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444"], ["2022", "CVE-2022-37807", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function formSetClientState.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10"], ["2022", "CVE-2022-30164", "Kerberos AppContainer Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167716/Windows-Kerberos-KerbRetrieveEncodedTicketMessage-AppContainer-Privilege-Escalation.html"], ["2022", "CVE-2022-23084", "The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption.On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-23315", "MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-32061", "An arbitrary file upload vulnerability in the Select User function under the People Menu component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/GrimTheRipper", "https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab"], ["2022", "CVE-2022-24575", "GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2058 https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/"], ["2022", "CVE-2022-35601", "A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter searchTxt.", "No PoCs found on GitHub currently.", "https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-35590", "A cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the \"end_date\" Parameter", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4-other-forkcms/"], ["2022", "CVE-2022-39915", "Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent.", "https://github.com/Live-Hack-CVE/CVE-2022-39915", "No PoCs from references."], ["2022", "CVE-2022-37704", "Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure.", "https://github.com/MaherAzzouzi/CVE-2022-37704 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/MaherAzzouzi/CVE-2022-37704"], ["2022", "CVE-2022-31199", "Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-31208", "An issue was discovered in Infiray IRAY-A8Z3 1.0.957. The webserver contains an endpoint that can execute arbitrary commands by manipulating the cmd_string URL parameter.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/"], ["2022", "CVE-2022-1276", "Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25"], ["2022", "CVE-2022-3373", "Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1336", "The Carousel CK WordPress plugin through 1.1.0 does not sanitize and escape Slide's descriptions, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6"], ["2022", "CVE-2022-3233", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3"], ["2022", "CVE-2022-35741", "Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the vulnerability. When the SAML 2.0 plugin is enabled in affected versions of Apache CloudStack could potentially allow the exploitation of XXE vulnerabilities. The SAML 2.0 messages constructed during the authentication flow in Apache CloudStack are XML-based and the XML data is parsed by various standard libraries that are now understood to be vulnerable to XXE injection attacks such as arbitrary file reading, possible denial of service, server-side request forgery (SSRF) on the CloudStack management server.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/xuetusummer/Penetration_Testing_POC", "No PoCs from references."], ["2022", "CVE-2022-30024", "A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.", "https://github.com/ARPSyndicate/cvemon https://github.com/IamAlch3mist/Awesome-Embedded-Systems-Vulnerability-Research https://github.com/pipiscrew/timeline", "No PoCs from references."], ["2022", "CVE-2022-21350", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).", "https://github.com/ARPSyndicate/cvemon https://github.com/hktalent/CVE-2022-21350 https://github.com/langu-xyz/JavaVulnMap https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pen4uin/awesome-vulnerability-research https://github.com/pen4uin/vulnerability-research https://github.com/pen4uin/vulnerability-research-list https://github.com/thiscodecc/thiscodecc", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28422", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=edit.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-45440", "A vulnerability exists in the FTP server of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0, which processes symbolic links on external storage media. A local authenticated attacker with administrator privileges could abuse this vulnerability to access the root file system by creating a symbolic link on external storage media, such as a USB flash drive, and then logging into the FTP server on a vulnerable device.", "https://github.com/karimhabush/cyberowl https://github.com/psie/zyxel", "No PoCs from references."], ["2022", "CVE-2022-25759", "The package convert-svg-core before 0.6.2 are vulnerable to Remote Code Injection via sending an SVG file containing the payload.", "No PoCs found on GitHub currently.", "https://github.com/neocotic/convert-svg/issues/81 https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633"], ["2022", "CVE-2022-4453", "The 3D FlipBook WordPress plugin through 1.13.2 does not validate or escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks against high privilege users like administrators.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171"], ["2022", "CVE-2022-41049", "Windows Mark of the Web Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Nathan01110011/CVE-2022-41049-POC https://github.com/NathanOrr101/CVE-2022-41049-POC https://github.com/NathanScottGithub/CVE-2022-41049-POC https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nmantani/archiver-MOTW-support-comparison https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-21241", "Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anquanscan/sec-tools https://github.com/binganao/vulns-2022 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/satoki/csv-plus_vulnerability https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28533", "Sourcecodester Medical Hub Directory Site 1.0 is vulnerable to SQL Injection via /mhds/clinic/view_details.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166539"], ["2022", "CVE-2022-32030", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function formSetQosBand.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetQosBand"], ["2022", "CVE-2022-35953", "BookWyrm is a social network for tracking your reading, talking about books, writing reviews, and discovering what to read next. Some links in BookWyrm may be vulnerable to tabnabbing, a form of phishing that gives attackers an opportunity to redirect a user to a malicious site. The issue was patched in version 0.4.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/67ca22bd-19c6-466b-955a-b1ee2da0c575/"], ["2022", "CVE-2022-25648", "The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-RUBY-GIT-2421270"], ["2022", "CVE-2022-4542", "The Compact WP Audio Player WordPress plugin before 1.9.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242"], ["2022", "CVE-2022-41158", "Remote code execution vulnerability can be achieved by using cookie values as paths to a file by this builder program. A remote attacker could exploit the vulnerability to execute or inject malicious code.", "https://github.com/kaist-hacking/awesome-korean-products-hacking", "No PoCs from references."], ["2022", "CVE-2022-31259", "The route lookup process in beego before 1.12.9 and 2.x before 2.0.3 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).", "https://github.com/ARPSyndicate/cvemon https://github.com/runner361/CVE-List", "No PoCs from references."], ["2022", "CVE-2022-1227", "A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.", "https://github.com/ARPSyndicate/cvemon https://github.com/iridium-soda/CVE-2022-1227_Exploit https://github.com/iridium-soda/container-escape-exploits https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-42331", "x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39944", "In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.2.0 will be affected, We recommend users to update to 1.3.0.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-24464", ".NET and Visual Studio Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42271", "NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can cause a buffer overflow and cause a denial of service or gain code execution", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-39804", "Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Part (.sldprt, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-47986", "IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/LubyRuffy/gofofa https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/dhina016/CVE-2022-47986 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mauricelambert/CVE-2022-47986 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ohnonoyesyes/CVE-2022-47986 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html"], ["2022", "CVE-2022-4793", "The Blog Designer WordPress plugin before 2.4.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948"], ["2022", "CVE-2022-41018", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no vpn basic protocol (l2tp|pptp) name WORD server WORD username WORD passsword WORD firmwall (on|off) defroute (on|off) localip A.B.C.D' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-36579", "Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://github.com/wellcms/wellcms/issues/11"], ["2022", "CVE-2022-30075", "In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/GhostTroops/TOP https://github.com/H4lo/awesome-IoT-security-article https://github.com/JERRY123S/all-poc https://github.com/M4fiaB0y/CVE-2022-30075 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SAJIDAMINE/CVE-2022-30075 https://github.com/SYRTI/POC_to_review https://github.com/Tig3rHu/Awesome_IOT_Vul_lib https://github.com/Tig3rHu/MessageForV https://github.com/WhooAmii/POC_to_review https://github.com/aaronsvk/CVE-2022-30075 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/gscamelo/TP-Link-Archer-AX10-V1 https://github.com/hktalent/TOP https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/CVE-2022-30075 https://github.com/trhacknon/Pocingit https://github.com/usdogu/awesome-stars https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html https://github.com/aaronsvk https://github.com/aaronsvk/CVE-2022-30075 https://www.exploit-db.com/exploits/50962"], ["2022", "CVE-2022-21301", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47514", "An XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, as demonstrated by a pingback.aspx POST request.", "https://github.com/ARPSyndicate/cvemon https://github.com/jumpycastle/xmlrpc.net-poc", "https://github.com/jumpycastle/xmlrpc.net-poc"], ["2022", "CVE-2022-45411", "Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on fetch() and XMLHttpRequest; however some webservers have implemented non-standard headers such as X-Http-Method-Override that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1790311"], ["2022", "CVE-2022-32170", "The \u201cBytebase\u201d application does not restrict low privilege user to access admin \u201cprojects\u201c for which an unauthorized user can view the \u201cprojects\u201c created by \u201cAdmin\u201d and the affected endpoint is \u201c/api/project?user=${userId}\u201d.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32170"], ["2022", "CVE-2022-42053", "Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a command injection vulnerability via the PortMappingServer parameter in the setPortMapping function.", "No PoCs found on GitHub currently.", "https://boschko.ca/tenda_ac1200_router/"], ["2022", "CVE-2022-24646", "Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263"], ["2022", "CVE-2022-26743", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.4. An attacker that has already achieved code execution in macOS Recovery may be able to escalate to kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-40156", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-3040", "Use after free in Layout in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0229", "The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351"], ["2022", "CVE-2022-21123", "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/codexlynx/hardware-attacks-state-of-the-art", "No PoCs from references."], ["2022", "CVE-2022-30317", "Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-32212", "A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28480", "ALLMediaServer 1.6 is vulnerable to Buffer Overflow via MediaServer.exe.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html"], ["2022", "CVE-2022-28711", "A memory corruption vulnerability exists in the cgi.c unescape functionality of ArduPilot APWeb master branch 50b6b7ac - master branch 46177cb9. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512"], ["2022", "CVE-2022-4760", "The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d"], ["2022", "CVE-2022-1394", "The Photo Gallery by 10Web WordPress plugin before 1.6.4 does not properly validate and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3"], ["2022", "CVE-2022-1005", "The WP Statistics WordPress plugin before 13.2.2 does not sanitise the REQUEST_URI parameter before outputting it back in the rendered page, leading to Cross-Site Scripting (XSS) in web browsers which do not encode characters", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9"], ["2022", "CVE-2022-4863", "Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/42751929-e511-49a9-888d-d5b610da2a45"], ["2022", "CVE-2022-42282", "NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can access arbitrary files, which may lead to information disclosure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-24497", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/corelight/CVE-2022-24497 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-24706", "In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.", "https://github.com/0day404/vulnerability-poc https://github.com/20142995/pocsuite3 https://github.com/ARPSyndicate/cvemon https://github.com/ArrestX/--POC https://github.com/KayCHENvip/vulnerability-poc https://github.com/Li468446/Apache_poc https://github.com/Loginsoft-LLC/Linux-Exploit-Detection https://github.com/Loginsoft-Research/Linux-Exploit-Detection https://github.com/Miraitowa70/POC-Notes https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/PyterSmithDarkGhost/COUCHDBEXPLOITCVE2022-24706 https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Vulhub-Reproduce https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-24706 https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post- https://github.com/bakery312/Vulhub-Reproduce https://github.com/d4n-sec/d4n-sec.github.io https://github.com/hktalent/bug-bounty https://github.com/huimzjty/vulwiki https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/luck-ying/Library-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit https://github.com/superzerosec/CVE-2022-24706 https://github.com/t0m4too/t0m4to https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xanszZZ/pocsuite3-poc https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd"], ["2022", "CVE-2022-26592", "Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.", "No PoCs found on GitHub currently.", "https://github.com/sass/libsass/issues/3174"], ["2022", "CVE-2022-40016", "Use After Free (UAF) vulnerability in ireader media-server before commit 3e0f63f1d3553f75c7d4eb32fa7c7a1976a9ff84 in librtmp, allows attackers to cause a denial of service.", "No PoCs found on GitHub currently.", "https://github.com/ireader/media-server/issues/235"], ["2022", "CVE-2022-1285", "Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves", "https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d"], ["2022", "CVE-2022-3380", "The Customizer Export/Import WordPress plugin before 0.9.5 unserializes the content of an imported file, which could lead to PHP object injection issues when an admin imports (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746"], ["2022", "CVE-2022-24586", "A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE", "No PoCs from references."], ["2022", "CVE-2022-26712", "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to modify protected parts of the file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/jhftss/POC", "No PoCs from references."], ["2022", "CVE-2022-40107", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formexeCommand function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-47767", "A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects all Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included).", "No PoCs found on GitHub currently.", "https://www.swascan.com/security-advisory-solar-log/"], ["2022", "CVE-2022-0278", "Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030"], ["2022", "CVE-2022-30206", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ascotbe/Kernelhub https://github.com/MagicPwnrin/CVE-2022-30206 https://github.com/Malwareman007/CVE-2022-30206 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Pwnrin/CVE-2022-30206 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-32092", "D-Link DIR-645 v1.03 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter at __ajax_explorer.sgi.", "https://github.com/ARPSyndicate/cvemon https://github.com/fxc233/iot-vul https://github.com/laziness0/iot-vul", "https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-23077", "In habitica versions v4.119.0 through v4.232.2 are vulnerable to DOM XSS via the login page.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23077"], ["2022", "CVE-2022-4671", "The PixCodes WordPress plugin before 2.3.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88"], ["2022", "CVE-2022-48519", "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-26951", "Archer 6.x through 6.10 (6.10.0.0) contains a reflected XSS vulnerability. A remote SAML-unauthenticated malicious Archer user could potentially exploit this vulnerability by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and gets executed by the web browser in the context of the vulnerable web application.", "No PoCs found on GitHub currently.", "https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497"], ["2022", "CVE-2022-32243", "When a user opens manipulated Scalable Vector Graphics (.svg, svg.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-24757", "The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26652", "NATS nats-server before 2.7.4 allows Directory Traversal (with write access) via an element in a ZIP archive for JetStream streams. nats-streaming-server before 0.24.3 is also affected.", "https://github.com/ARPSyndicate/cvemon https://github.com/actions-marketplace-validations/jfrog_frogbot https://github.com/deeptisjfrog/myfrogbot https://github.com/jfrog/frogbot https://github.com/samrjfrog/jfrogbot", "No PoCs from references."], ["2022", "CVE-2022-47924", "An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions < 0.1.0 wich can result in arbitrary code execution and DoS once the users triggers the validation.", "No PoCs found on GitHub currently.", "https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json"], ["2022", "CVE-2022-1054", "The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d"], ["2022", "CVE-2022-3151", "The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744"], ["2022", "CVE-2022-4832", "The Store Locator WordPress plugin before 1.4.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c"], ["2022", "CVE-2022-38758", "Cross-site Scripting (XSS) vulnerability in NetIQ iManager prior to version 3.2.6 allows attacker to execute malicious scripts on the user's browser. This issue affects: Micro Focus NetIQ iManager NetIQ iManager versions prior to 3.2.6 on ALL.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-1353", "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3256", "Use After Free in GitHub repository vim/vim prior to 9.0.0530.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3"], ["2022", "CVE-2022-24450", "NATS nats-server before 2.7.2 has Incorrect Access Control. Any authenticated user can obtain the privileges of the System account by misusing the \"dynamically provisioned sandbox accounts\" feature.", "https://github.com/ARPSyndicate/cvemon https://github.com/actions-marketplace-validations/jfrog_frogbot https://github.com/deeptisjfrog/myfrogbot https://github.com/jfrog/frogbot https://github.com/samrjfrog/jfrogbot", "No PoCs from references."], ["2022", "CVE-2022-42245", "Dreamer CMS 4.0.01 is vulnerable to SQL Injection.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html"], ["2022", "CVE-2022-21335", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-34448", "PowerPath Management Appliance with versions 3.3 & 3.2*, 3.1 & 3.0* contains a Cross-site Request Forgery vulnerability. An unauthenticated non-privileged user could potentially exploit the issue and perform any privileged state-changing actions.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/000205404"], ["2022", "CVE-2022-29828", "Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project file or execute programs illegally.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf"], ["2022", "CVE-2022-4576", "The Easy Bootstrap Shortcode WordPress plugin through 4.5.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0"], ["2022", "CVE-2022-29968", "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/jprx/CVE-2022-29968 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27779", "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.", "https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-21275", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28507", "Dragon Path Technologies Bharti Airtel Routers Hardware BDT-121 version 1.0 is vulnerable to Cross Site Scripting (XSS) via Dragon path router admin page.", "No PoCs found on GitHub currently.", "https://youtu.be/Ra7tWMs5dkk"], ["2022", "CVE-2022-32395", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/crimes/manage_crime.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md"], ["2022", "CVE-2022-24681", "Zoho ManageEngine ADSelfService Plus before 6121 allows XSS via the welcome name attribute to the Reset Password, Unlock Account, or User Must Change Password screen.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/k0pak4/k0pak4", "https://raxis.com/blog/cve-2022-24681"], ["2022", "CVE-2022-42094", "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/CVE-2022-42094 https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1"], ["2022", "CVE-2022-1213", "SSRF filter bypass port 80, 433 in GitHub repository livehelperchat/livehelperchat prior to 3.67v. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191", "https://github.com/ARPSyndicate/cvemon https://github.com/nhienit2010/Vulnerability", "https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1"], ["2022", "CVE-2022-1182", "The Visual Slide Box Builder WordPress plugin through 3.2.9 does not sanitise and escape various parameters before using them in SQL statements via some of its AJAX actions available to any authenticated users (such as subscriber), leading to SQL Injections", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177"], ["2022", "CVE-2022-3316", "Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass security feature via a crafted HTML page. (Chromium security severity: Low)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24401", "Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-28884", "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-26504", "Improper authentication in Veeam Backup & Replication 9.5U3, 9.5U4,10.x and 11.x component used for Microsoft System Center Virtual Machine Manager (SCVMM) allows attackers execute arbitrary code via Veeam.Backup.PSManager.exe", "https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/musil/100DaysOfHomeLab2022", "No PoCs from references."], ["2022", "CVE-2022-20008", "In mmc_blk_read_single of block.c, there is a possible way to read kernel heap memory due to uninitialized data. This could lead to local information disclosure if reading from an SD card that triggers errors, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216481035References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1093", "The WP Meta SEO WordPress plugin before 4.4.7 does not sanitise or escape the breadcrumb separator before outputting it to the page, allowing a high privilege user such as an administrator to inject arbitrary javascript into the page even when unfiltered html is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553"], ["2022", "CVE-2022-3207", "The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa"], ["2022", "CVE-2022-4467", "The Search & Filter WordPress plugin before 1.2.16 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45"], ["2022", "CVE-2022-27668", "Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated attacker to execute SAProuter administration commands in SAP NetWeaver and ABAP Platform - versions KERNEL 7.49, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, KRNL64NUC 7.49, KRNL64UC 7.49, SAP_ROUTER 7.53, 7.22, from a remote client, for example stopping the SAProuter, that could highly impact systems availability.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html http://seclists.org/fulldisclosure/2022/Sep/17 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-21364", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Weblogic). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26996", "Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-28416", "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_phase.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-28787", "Improper buffer size check logic in wmfextractor library prior to SMR May-2022 Release 1 allows out of bounds read leading to possible temporary denial of service. The patch adds buffer size check logic.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-35876", "Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` and `key` configuration parameters, as used within the `testWifiAP` XCMD handler", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581"], ["2022", "CVE-2022-32115", "An issue in the isSVG() function of Known v1.2.2+2020061101 allows attackers to execute arbitrary code via a crafted SVG file.", "No PoCs found on GitHub currently.", "https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/"], ["2022", "CVE-2022-24893", "ESP-IDF is the official development framework for Espressif SoCs. In Espressif\u2019s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-30150", "Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html"], ["2022", "CVE-2022-23321", "A persistent cross-site scripting (XSS) vulnerability exists on two input fields within the administrative panel when editing users in the XMPie UStore application on version 12.3.7244.0.", "No PoCs found on GitHub currently.", "https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/"], ["2022", "CVE-2022-32055", "Inout Homestay v2.2 was discovered to contain a SQL injection vulnerability via the guests parameter at /index.php?page=search/rentals.", "No PoCs found on GitHub currently.", "https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md"], ["2022", "CVE-2022-35936", "Ethermint is an Ethereum library. In Ethermint running versions before `v0.17.2`, the contract `selfdestruct` invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in the `DeleteAccount`function, all contracts that used the identical bytecode (i.e shared the same `CodeHash`) will also stop working once one contract invokes `selfdestruct`, even though the other contracts did not invoke the `selfdestruct` OPCODE. This vulnerability has been patched in Ethermint version v0.18.0. The patch has state machine-breaking changes for applications using Ethermint, so a coordinated upgrade procedure is required. A workaround is available. If a contract is subject to DoS due to this issue, the user can redeploy the same contract, i.e. with identical bytecode, so that the original contract's code is recovered. The new contract deployment restores the `bytecode hash -> bytecode` entry in the internal state.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29939", "In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameters debug and InsId in interface\\billing\\sl_eob_process.php leads to multiple cross-site scripting (XSS) vulnerabilities.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth_r"], ["2022", "CVE-2022-26444", "In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420075; Issue ID: GN20220420075.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-26965", "In Pluck 4.7.16, an admin user can use the theme upload functionality at /admin.php?action=themeinstall to perform remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/SkDevilS/Pluck-Exploitation-by-skdevils https://github.com/nomi-sec/PoC-in-GitHub https://github.com/shikari00007/Pluck-CMS-Pluck-4.7.16-Theme-Upload-Remote-Code-Execution-Authenticated--POC https://github.com/superlink996/chunqiuyunjingbachang", "https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html https://youtu.be/sN6J_X4mEbY"], ["2022", "CVE-2022-21397", "Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23103", "A stack-based buffer overflow vulnerability exists in the confsrv confctl_set_app_language functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462"], ["2022", "CVE-2022-24860", "Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Use of Hard-coded Cryptographic Key vulnerability. An attacker can use hard coding to generate login credentials of any user and log in to the service background located at different IP addresses.", "No PoCs found on GitHub currently.", "https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png"], ["2022", "CVE-2022-32277", "** DISPUTED ** Squiz Matrix CMS 6.20 is vulnerable to an Insecure Direct Object Reference caused by failure to correctly validate authorization when submitting a request to change a user's contact details. NOTE: this is disputed by both the vendor and the original discoverer because it is a site-specific finding, not a finding about the Squiz Matrix CMS product.", "No PoCs found on GitHub currently.", "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/squiz-matrix-cms-authenticated-privilege-escalation-through-idor/"], ["2022", "CVE-2022-35885", "Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `wpapsk_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585"], ["2022", "CVE-2022-45716", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formIPMacBindDel function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/rywHivCBo"], ["2022", "CVE-2022-2198", "The WPQA Builder WordPress plugin before 5.7 which is a companion plugin to the Hilmer and Discy , does not check authorization before displaying private messages, allowing any logged in user to read other users private message using the message id, which can easily be brute forced.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd"], ["2022", "CVE-2022-28774", "Under certain conditions, the SAP Host Agent logfile shows information which would otherwise be restricted.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-39400", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-34878", "SQL Injection vulnerability in User Stats interface (/vicidial/user_stats.php) of VICIdial via the file_download parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4806", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be"], ["2022", "CVE-2022-3165", "An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29418", "Authenticated (admin user role) Persistent Cross-Site Scripting (XSS) in Mark Daniels Night Mode plugin <= 1.0.0 on WordPress via vulnerable parameters: &ntmode_page_setting[enable-me], &ntmode_page_setting[bg-color], &ntmode_page_setting[txt-color], &ntmode_page_setting[anc_color].", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42176", "In PCTechSoft PCSecure V5.0.8.xw, use of Hard-coded Credentials in configuration files leads to admin panel access.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soy-oreocato/CVE-2022-42176 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/soy-oreocato/CVE-2022-42176 https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00"], ["2022", "CVE-2022-40073", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5"], ["2022", "CVE-2022-35557", "A stack overflow vulnerability exists in /goform/wifiSSIDget in Tenda W6 V1.0.0.9(4122) version, which can be exploited by attackers to cause a denial of service (DoS) via the index parameter.", "https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-37452", "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.", "https://github.com/ARPSyndicate/cvemon https://github.com/MalwareHunters/vultriever https://github.com/firatesatoglu/shodanSearch", "No PoCs from references."], ["2022", "CVE-2022-26726", "This issue was addressed with improved checks. This issue is fixed in Security Update 2022-004 Catalina, watchOS 8.6, macOS Monterey 12.4, macOS Big Sur 11.6.6. An app may be able to capture a user's screen.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-26726 https://github.com/acheong08/CVE-2022-26726-POC https://github.com/acheong08/CVE-2022-26726-POC2 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-40133", "A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "No PoCs found on GitHub currently.", "https://bugzilla.openanolis.cn/show_bug.cgi?id=2075"], ["2022", "CVE-2022-3025", "The Bitcoin / Altcoin Faucet WordPress plugin through 1.6.0 does not have any CSRF check when saving its settings, allowing attacker to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a"], ["2022", "CVE-2022-4946", "The Frontend Post WordPress Plugin WordPress plugin through 2.8.4 does not validate an attribute of one of its shortcode, which could allow users with a role as low as contributor to add a malicious shortcode to a page/post, which will redirect users to an arbitrary domain.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0"], ["2022", "CVE-2022-29558", "Realtek rtl819x-SDK before v3.6.1 allows command injection over the web interface.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4645", "LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/277"], ["2022", "CVE-2022-23043", "Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.", "https://github.com/superlink996/chunqiuyunjingbachang", "https://fluidattacks.com/advisories/simone/"], ["2022", "CVE-2022-45656", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the time parameter in the fromSetSysTime function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md"], ["2022", "CVE-2022-4754", "The Easy Social Box / Page Plugin WordPress plugin through 4.1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db"], ["2022", "CVE-2022-26934", "Windows Graphics Component Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-2258", "In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items", "https://github.com/karimhabush/cyberowl https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-42127", "The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17607"], ["2022", "CVE-2022-40022", "Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html https://www.securifera.com/advisories/CVE-2022-40022/"], ["2022", "CVE-2022-47941", "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.", "https://github.com/helgerod/ksmb-check", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2"], ["2022", "CVE-2022-1031", "Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457"], ["2022", "CVE-2022-3134", "Use After Free in GitHub repository vim/vim prior to 9.0.0389.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc"], ["2022", "CVE-2022-4857", "A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp"], ["2022", "CVE-2022-1171", "The Vertical scroll recent post WordPress plugin before 14.0 does not sanitise and escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f"], ["2022", "CVE-2022-27889", "The Multipass service was found to have code paths that could be abused to cause a denial of service for authentication or authorization operations. A malicious attacker could perform an application-level denial of service attack, potentially causing authentication and/or authorization operations to fail for the duration of the attack. This could lead to performance degradation or login failures for customer Palantir Foundry environments. This vulnerability is resolved in Multipass 3.647.0. This issue affects: Palantir Foundry Multipass versions prior to 3.647.0.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md"], ["2022", "CVE-2022-3074", "The Slider Hero WordPress plugin before 8.4.4 does not escape the slider Name, which could allow high-privileged users to perform Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3"], ["2022", "CVE-2022-39983", "File upload vulnerability in Instantdeveloper RD3 22.0.8500, allows attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://www.swascan.com/it/vulnerability-report-instant-developer/"], ["2022", "CVE-2022-28966", "Wasm3 0.5.0 has a heap-based buffer overflow in NewCodePage in m3_code.c (called indirectly from Compile_BranchTable in m3_compile.c).", "No PoCs found on GitHub currently.", "https://github.com/wasm3/wasm3/issues/320"], ["2022", "CVE-2022-42067", "Online Birth Certificate Management System version 1.0 suffers from an Insecure Direct Object Reference (IDOR) vulnerability", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html"], ["2022", "CVE-2022-35506", "TripleCross v0.1.0 was discovered to contain a stack overflow which occurs because there is no limit to the length of program parameters.", "https://github.com/firmianay/security-issues", "https://github.com/h3xduck/TripleCross/issues/40"], ["2022", "CVE-2022-26777", "Zoho ManageEngine Remote Access Plus before 10.1.2137.15 allows guest users to view license details.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0pak4/k0pak4", "https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777"], ["2022", "CVE-2022-21286", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-24971", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15812.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-28665", "A memory corruption vulnerability exists in the httpd unescape functionality of FreshTomato 2022.1. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.The `freshtomato-arm` has a vulnerable URL-decoding feature that can lead to memory corruption.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509"], ["2022", "CVE-2022-2089", "The Bold Page Builder WordPress plugin before 4.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8"], ["2022", "CVE-2022-2318", "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6"], ["2022", "CVE-2022-4614", "Cross-site Scripting (XSS) - Stored in GitHub repository alagrede/znote-app prior to 1.7.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5"], ["2022", "CVE-2022-3114", "An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037"], ["2022", "CVE-2022-1380", "Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12"], ["2022", "CVE-2022-1011", "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", "https://github.com/ARPSyndicate/cvemon https://github.com/PazDak/feathers-macos-detections https://github.com/nomi-sec/PoC-in-GitHub https://github.com/xkaneiki/CVE-2022-1011", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-24483", "Windows Kernel Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/waleedassar/CVE-2022-24483 https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28494", "TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is discovered to contain a command injection vulnerability in the setUpgradeFW function via the filename parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "No PoCs found on GitHub currently.", "https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md"], ["2022", "CVE-2022-2278", "The Featured Image from URL (FIFU) WordPress plugin before 4.0.1 does not validate, sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf"], ["2022", "CVE-2022-32206", "curl < 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.", "https://github.com/ARPSyndicate/cvemon https://github.com/holmes-py/reports-summary", "http://seclists.org/fulldisclosure/2022/Oct/41"], ["2022", "CVE-2022-47662", "GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2359"], ["2022", "CVE-2022-4774", "The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e"], ["2022", "CVE-2022-24951", "A race condition exists in Eternal Terminal prior to version 6.2.0 which allows a local attacker to hijack Eternal Terminal's IPC socket, enabling access to Eternal Terminal clients which attempt to connect in the future.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q"], ["2022", "CVE-2022-26854", "Dell PowerScale OneFS, versions 8.2.x-9.2.x, contain risky cryptographic algorithms. A remote unprivileged malicious attacker could potentially exploit this vulnerability, leading to full system access", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities"], ["2022", "CVE-2022-30243", "Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.", "No PoCs found on GitHub currently.", "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security"], ["2022", "CVE-2022-26757", "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dylbin/flow_divert https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html"], ["2022", "CVE-2022-37423", "Neo4j APOC (Awesome Procedures on Cypher) before 4.3.0.7 and 4.x before 4.4.0.8 allows Directory Traversal to sibling directories via apoc.log.stream.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35526", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi"], ["2022", "CVE-2022-45924", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint itemtemplate.createtemplate2 allows a low-privilege user to delete arbitrary files on the server's local filesystem.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html http://seclists.org/fulldisclosure/2023/Jan/14 https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/"], ["2022", "CVE-2022-47930", "An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b"], ["2022", "CVE-2022-42156", "D-Link COVR 1200,1203 v1.08 was discovered to contain a command injection vulnerability via the tomography_ping_number parameter at function SetNetworkTomographySettings.", "No PoCs found on GitHub currently.", "https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-3145", "An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.", "https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-4826", "The Simple Tooltips WordPress plugin before 2.1.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0"], ["2022", "CVE-2022-1040", "An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older.", "https://github.com/APTIRAN/CVE-2022-1040 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Awrrays/FrameVul https://github.com/Cyb3rEnthusiast/CVE-2022-1040 https://github.com/H4lo/awesome-IoT-security-article https://github.com/Keith-amateur/cve-2022-1040 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/Seatwe/CVE-2022-1040-rce https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-1040 https://github.com/cve-hunter/CVE-2022-1040-RCE https://github.com/cve-hunter/CVE-2022-1040-sophos-rce https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/jackson5sec/CVE-2022-1040 https://github.com/jam620/Sophos-Vulnerability https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/killvxk/CVE-2022-1040 https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/michealadams30/CVE-2022-1040 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xMr110/CVE-2022-1040 https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html https://www.exploit-db.com/exploits/51006"], ["2022", "CVE-2022-39420", "Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Data, Functional Security). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-32257", "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to unauthorized access to resources and potentially lead to code execution.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-23123", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15830.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-30352", "phpABook 0.9i is vulnerable to SQL Injection due to insufficient sanitization of user-supplied data in the \"auth_user\" parameter in index.php script.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50071"], ["2022", "CVE-2022-26945", "go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless redirect, and configuration bypass via abuse of custom HTTP response header processing. Fixed in 1.6.1 and 2.1.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/dellalibera/dellalibera https://github.com/sascha-andres/terraform-provider-dgraph", "No PoCs from references."], ["2022", "CVE-2022-47633", "An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.", "https://github.com/ARPSyndicate/cvemon https://github.com/slashben/beat-ac-cosign-verifier", "No PoCs from references."], ["2022", "CVE-2022-2369", "The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d"], ["2022", "CVE-2022-28614", "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/Totes5706/TotesHTB https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/kasem545/vulnsearch", "No PoCs from references."], ["2022", "CVE-2022-23063", "In Shopizer versions 2.3.0 to 3.0.1 are vulnerable to Insufficient Session Expiration. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23063"], ["2022", "CVE-2022-24900", "Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the \"malicious\" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/onlaj/Piano-LED-Visualizer/issues/350 https://github.com/onlaj/Piano-LED-Visualizer/pull/351 https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4"], ["2022", "CVE-2022-32317", "** DISPUTED ** The MPlayer Project v1.5 was discovered to contain a heap use-after-free resulting in a double free in the preinit function at libvo/vo_v4l2.c. This vulnerability can lead to a Denial of Service (DoS) via a crafted file. The device=strdup statement is not executed on every call. Note: This has been disputed by third parties as invalid and not reproduceable.", "No PoCs found on GitHub currently.", "https://bugs.gentoo.org/show_bug.cgi?id=858107 https://github.com/b17fr13nds/MPlayer_cve_poc"], ["2022", "CVE-2022-32086", "MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26412"], ["2022", "CVE-2022-21166", "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/codexlynx/hardware-attacks-state-of-the-art", "No PoCs from references."], ["2022", "CVE-2022-4665", "Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f"], ["2022", "CVE-2022-3394", "The WP All Export Pro WordPress plugin before 1.7.9 does not limit some functionality during exports only to users with the Administrator role, allowing any logged in user which has been given privileges to perform exports to execute arbitrary code on the site. By default only administrators can run exports, but the privilege can be delegated to lower privileged users.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c"], ["2022", "CVE-2022-3005", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217"], ["2022", "CVE-2022-34918", "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "https://github.com/0xStrygwyr/OSCP-Guide https://github.com/0xZipp0/OSCP https://github.com/0xsyr0/OSCP https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/IdanBanani/ELF-Injection-Shellcode-Bridgehead https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/Ly0nt4r/OSCP https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Sechack06/CVE-2022-34918 https://github.com/SirElmard/ethical_hacking https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/WhooAmii/POC_to_review https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/dkb4rb/KernelExploiting https://github.com/e-hakson/OSCP https://github.com/eljosep/OSCP-Guide https://github.com/felixfu59/kernel-hack https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/kgwanjala/oscp-cheatsheet https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/klemakle/audit-pentest-BOX https://github.com/knd06/linux-kernel-exploitation https://github.com/lanleft/CVE2023-1829 https://github.com/linulinu/CVE-2022-34918 https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/merlinepedra/CVE-2022-34918-LPE-PoC https://github.com/merlinepedra25/CVE-2022-34918-LPE-PoC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nitishbadole/oscp-note-3 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/oscpname/OSCP_cheat https://github.com/purplewall1206/ERA-eBPF-assisted-Randomize-Allocator https://github.com/randorisec/CVE-2022-34918-LPE-PoC https://github.com/revanmalang/OSCP https://github.com/ssr-111/linux-kernel-exploitation https://github.com/taielab/awesome-hacking-lists https://github.com/tr3ss/gofetch https://github.com/trhacknon/CVE-2022-34918-LPE-PoC https://github.com/trhacknon/Pocingit https://github.com/txuswashere/OSCP https://github.com/veritas501/CVE-2022-34918 https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/xhref/OSCP https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html http://www.openwall.com/lists/oss-security/2022/07/05/1 https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u https://www.openwall.com/lists/oss-security/2022/07/02/3 https://www.randorisec.fr/crack-linux-firewall/"], ["2022", "CVE-2022-1291", "XSS vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. Transmitting cookies to third-party servers. Sending data from secure sessions to third-party servers", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5"], ["2022", "CVE-2022-47870", "A Cross Site Scripting (XSS) vulnerability in the web SQL monitor login page in Redgate SQL Monitor 12.1.31.893 allows remote attackers to inject arbitrary web Script or HTML via the returnUrl parameter.", "https://github.com/GoodGalaxyGeeks/common-vulnerabilities-and-exposures", "https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html"], ["2022", "CVE-2022-40282", "The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html http://seclists.org/fulldisclosure/2022/Nov/19"], ["2022", "CVE-2022-40113", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection3.md https://github.com/zakee94/online-banking-system/issues/18"], ["2022", "CVE-2022-26497", "BigBlueButton Greenlight 2.11.1 allows XSS. A threat actor could have a username containing a JavaScript payload. The payload gets executed in the browser of the victim in the \"Share room access\" dialog if the victim has shared access to the particular room with the attacker previously.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html"], ["2022", "CVE-2022-26706", "An access issue was addressed with additional sandbox restrictions on third-party applications. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A sandboxed process may be able to circumvent sandbox restrictions.", "https://github.com/0x3c3e/pocs https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/Pentest-Tips https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io", "No PoCs from references."], ["2022", "CVE-2022-28917", "Tenda AX12 v22.03.01.21_cn was discovered to contain a stack overflow via the lanIp parameter in /goform/AdvSetLanIp.", "No PoCs found on GitHub currently.", "https://github.com/NSSCYCTFER/SRC-CVE"], ["2022", "CVE-2022-28436", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Hide&userid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-21344", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4447", "The Fontsy WordPress plugin through 1.8.6 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad"], ["2022", "CVE-2022-1322", "The Coming Soon - Under Construction WordPress plugin through 1.1.9 does not sanitize and escape some of its settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c"], ["2022", "CVE-2022-20028", "In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198663; Issue ID: ALPS06198663.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-27499", "Premature release of resource during expected lifetime in the Intel(R) SGX SDK software may allow a privileged user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/StanPlatinum/snapshot-attack-demo https://github.com/StanPlatinum/snapshot-demo https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-43018", "OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the email parameter in the Check Email function.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_checkEmail.md"], ["2022", "CVE-2022-4696", "There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current->nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4507", "The Real Cookie Banner WordPress plugin before 3.4.10 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6"], ["2022", "CVE-2022-43389", "A buffer overflow vulnerability in the library of the web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23090", "The aio_aqueue function, used by the lio_listio system call, fails to release a reference to a credential in an error case.An attacker may cause the reference count to overflow, leading to a use after free (UAF).", "https://github.com/RoundofThree/poc https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-45685", "A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.", "No PoCs found on GitHub currently.", "https://github.com/jettison-json/jettison/issues/54"], ["2022", "CVE-2022-45514", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/webExcptypemanFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/webExcptypemanFilter/readme.md"], ["2022", "CVE-2022-37813", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromSetSysTime.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16"], ["2022", "CVE-2022-21195", "All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643"], ["2022", "CVE-2022-27588", "We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.6 build 20220401 and later", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4787", "Themify Shortcodes WordPress plugin before 2.0.8 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5"], ["2022", "CVE-2022-43109", "D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-34468", "An iframe that was not permitted to run scripts could do so if the user clicked on a javascript: link. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1768537"], ["2022", "CVE-2022-23181", "The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/Live-Hack-CVE/CVE-2022-23181 https://github.com/pen4uin/awesome-vulnerability-research https://github.com/pen4uin/vulnerability-research https://github.com/pen4uin/vulnerability-research-list https://github.com/sr-monika/sprint-rest", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21315", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37601", "Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils via the name variable in parseQuery.js. This affects all versions prior to 1.4.1 and 2.0.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/grafana/plugin-validator https://github.com/seal-community/patches https://github.com/softrams/npm-epss-audit", "https://github.com/webpack/loader-utils/issues/212 https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884 https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826"], ["2022", "CVE-2022-42265", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-45897", "On Xerox WorkCentre 3550 25.003.03.000 devices, an authenticated attacker can view the SMB server settings and can obtain the stored cleartext credentials associated with those settings.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39810", "An issue was discovered in WSO2 Enterprise Integrator 6.4.0. A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console under /carbon/ndatasource/validateconnection/ajaxprocessor.jsp via the driver parameter. Session hijacking or similar attacks would not be possible.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-3336", "The Event Monster WordPress plugin before 1.2.0 does not have CSRF check when deleting visitors, which could allow attackers to make logged in admin delete arbitrary visitors via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d"], ["2022", "CVE-2022-1233", "URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c"], ["2022", "CVE-2022-40220", "An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612"], ["2022", "CVE-2022-39950", "An improper neutralization of input during web page generation vulnerability [CWE-79] exists in FortiManager and FortiAnalyzer 6.0.0 all versions, 6.2.0 all versions, 6.4.0 through 6.4.8, and 7.0.0 through 7.0.4. Report templates may allow a low privilege level attacker to perform an XSS attack via posting a crafted CKeditor \"protected\" comment as described in CVE-2020-9281.", "https://github.com/Live-Hack-CVE/CVE-2022-39950", "No PoCs from references."], ["2022", "CVE-2022-32024", "Car Rental Management System v1.0 is vulnerable to SQL Injection via car-rental-management-system/booking.php?car_id=.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-23350", "BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350"], ["2022", "CVE-2022-37842", "In TOTOLINK A860R V4.1.2cu.5182_B20201027, the parameters in infostat.cgi are not filtered, causing a buffer overflow vulnerability.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md"], ["2022", "CVE-2022-21255", "Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: UI Servlet). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Configurator accessible data as well as unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-29948", "Due to an insecure design, the Lepin EP-KP001 flash drive through KP001_V19 is vulnerable to an authentication bypass attack that enables an attacker to gain access to the stored encrypted data. Normally, the encrypted disk partition with this data is unlocked by entering the correct passcode (6 to 14 digits) via the keypad and pressing the Unlock button. This authentication is performed by an unknown microcontroller. By replacing this microcontroller on a target device with one from an attacker-controlled Lepin EP-KP001 whose passcode is known, it is possible to successfully unlock the target device and read the stored data in cleartext.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html http://seclists.org/fulldisclosure/2022/Jun/27 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt"], ["2022", "CVE-2022-34528", "D-Link DSL-3782 v1.03 and below was discovered to contain a stack overflow via the function getAttrValue.", "https://github.com/1160300418/Vuls https://github.com/ARPSyndicate/cvemon", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-4651", "The Justified Gallery WordPress plugin before 1.7.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6"], ["2022", "CVE-2022-24934", "wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.", "https://github.com/ARPSyndicate/cvemon https://github.com/ASkyeye/WPS-CVE-2022-24934 https://github.com/MagicPiperSec/WPS-CVE-2022-24934 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanaao/CVE-2022-24934 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/shakeman8/CVE-2022-24934 https://github.com/soosmile/POC https://github.com/tib36/PhishingBook https://github.com/trhacknon/Pocingit https://github.com/webraybtl/CVE-2022-24934 https://github.com/webraybtl/CVE-2022-25943 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-23057", "In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23057"], ["2022", "CVE-2022-30226", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0258", "pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802"], ["2022", "CVE-2022-40127", "A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0.", "https://github.com/0x783kb/Security-operation-book https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/FrameVul https://github.com/Mr-xn/CVE-2022-40127 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io https://github.com/jakabakos/CVE-2022-40127 https://github.com/jakabakos/CVE-2022-40127-Airflow-RCE https://github.com/jakabakos/CVE-2023-22884-Airflow-SQLi https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-24637", "Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with 'https://github.com/0xM4hm0ud/CVE-2022-24637 https://github.com/0xRyuk/CVE-2022-24637 https://github.com/ARPSyndicate/cvemon https://github.com/JacobEbben/CVE-2022-24637 https://github.com/Lay0us1/CVE-2022-24637 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Pflegusch/CVE-2022-24637 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/c0derpwner/HTB-pwned https://github.com/garySec/CVE-2022-24637 https://github.com/hupe1980/CVE-2022-24637 https://github.com/icebreack/CVE-2022-24637 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html"], ["2022", "CVE-2022-28923", "Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-1134", "Type confusion in V8 in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html"], ["2022", "CVE-2022-4812", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c"], ["2022", "CVE-2022-3171", "A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.", "https://github.com/ARPSyndicate/cvemon https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-38778", "A flaw (CVE-2022-38900) was discovered in one of Kibana\u2019s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.", "No PoCs found on GitHub currently.", "https://www.elastic.co/community/security"], ["2022", "CVE-2022-1074", "A vulnerability has been found in TEM FLEX-1085 1.6.0 and classified as problematic. Using the input HTML Injection in the WiFi settings of the dashboard leads to html injection.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.194845"], ["2022", "CVE-2022-40067", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: formSetVirtualSer.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9"], ["2022", "CVE-2022-26672", "ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28863", "An issue was discovered in Nokia NetAct 22. A remote user, authenticated to the website, can visit the Site Configuration Tool section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-23117", "Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-21383", "Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Log). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Enterprise Session Border Controller. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0318", "Heap-based Buffer Overflow in vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08"], ["2022", "CVE-2022-4711", "The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_save_mega_menu_settings' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to enable and modify Mega Menu settings for any menu item.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4480", "The Click to Chat WordPress plugin before 3.18.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124"], ["2022", "CVE-2022-28671", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16639.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-45613", "Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the publisher parameter.", "No PoCs found on GitHub currently.", "https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e"], ["2022", "CVE-2022-21292", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/thiscodecc/thiscodecc", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0198", "corenlp is vulnerable to Improper Restriction of XML External Entity Reference", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/Haxatron", "https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763"], ["2022", "CVE-2022-0209", "The Mitsol Social Post Feed WordPress plugin before 1.11 does not escape some of its settings before outputting them back in attributes, which could allow high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe"], ["2022", "CVE-2022-4600", "A vulnerability was found in Shoplazza LifeStyle 1.1. It has been classified as problematic. This affects an unknown part of the file /admin/api/theme-edit/ of the component Product Carousel Handler. The manipulation of the argument Heading/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216195.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Dec/11"], ["2022", "CVE-2022-38669", "In soundrecorder service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-3060", "Improper control of a resource identifier in Error Tracking in GitLab CE/EE affecting all versions from 12.7 allows an authenticated attacker to generate content which could cause a victim to make unintended arbitrary requests", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/365427"], ["2022", "CVE-2022-1165", "The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710"], ["2022", "CVE-2022-40176", "A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). There exists an Improper Neutralization of Special Elements used in an OS Command with root privileges during a restore operation due to the missing validation of the names of files included in the input package. By restoring a specifically crafted package, a remote low-privileged attacker can execute arbitrary system commands with root privileges on the device, leading to a full compromise.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26763", "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious application may be able to execute arbitrary code with system privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zhuowei/PCICrash", "No PoCs from references."], ["2022", "CVE-2022-28972", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the timeZone parameter in the function form_fast_setting_wifi_set. This vulnerability allows attackers to cause a Denial of Service (DoS).", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln https://github.com/ostrichxyz7/rex", "https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md"], ["2022", "CVE-2022-45910", "Improper neutralization of special elements used in an LDAP query ('LDAP Injection') vulnerability in ActiveDirectory and Sharepoint ActiveDirectory authority connectors of Apache ManifoldCF allows an attacker to manipulate the LDAP search queries (DoS, additional queries, filter manipulation) during user lookup, if the username or the domain string are passed to the UserACLs servlet without validation. This issue affects Apache ManifoldCF version 2.23 and prior versions.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-3120", "A vulnerability classified as critical was found in SourceCodester Clinics Patient Management System. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument user_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-207847.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md https://vuldb.com/?id.207847"], ["2022", "CVE-2022-4843", "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f"], ["2022", "CVE-2022-28731", "A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-0349", "The NotificationX WordPress plugin before 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/edoardottt/nuclei-cve-gpt", "https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a"], ["2022", "CVE-2022-47656", "GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2353"], ["2022", "CVE-2022-37775", "Genesys PureConnect Interaction Web Tools Chat Service (up to at least 26- September- 2019) allows XSS within the Printable Chat History via the participant -> name JSON POST parameter.", "No PoCs found on GitHub currently.", "http://genesys.com http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html"], ["2022", "CVE-2022-42080", "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md"], ["2022", "CVE-2022-3302", "The Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.185.1 does not validate ids before using them in a SQL statement, which could lead to SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b"], ["2022", "CVE-2022-3093", "This vulnerability allows physical attackers to execute arbitrary code on affected Tesla vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ice_updater update mechanism. The issue results from the lack of proper validation of user-supplied firmware. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17463.", "https://github.com/1-tong/vehicle_cves https://github.com/Vu1nT0tal/Vehicle-Security https://github.com/VulnTotal-Team/Vehicle-Security https://github.com/VulnTotal-Team/vehicle_cves", "No PoCs from references."], ["2022", "CVE-2022-46489", "GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the gf_isom_box_parse_ex function at box_funcs.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/HotSpurzzZ/testcases", "https://github.com/gpac/gpac/issues/2328"], ["2022", "CVE-2022-1207", "Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb"], ["2022", "CVE-2022-1196", "After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1750679"], ["2022", "CVE-2022-46718", "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, macOS Monterey 12.6.2. An app may be able to read sensitive location information", "https://github.com/biscuitehh/cve-2022-46718-leaky-location https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-31279", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "https://github.com/ARPSyndicate/cvemon https://github.com/Radon6/2022HW https://github.com/xunyang1/2022HW", "No PoCs from references."], ["2022", "CVE-2022-36788", "A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593"], ["2022", "CVE-2022-41178", "Due to lack of proper memory management, when a victim opens manipulated Iges Part and Assembly (.igs, .iges, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4562", "The Meks Flexible Shortcodes WordPress plugin before 1.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063"], ["2022", "CVE-2022-28682", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16778.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-30284", "** DISPUTED ** In the python-libnmap package through 0.7.2 for Python, remote command execution can occur (if used in a client application that does not validate arguments). NOTE: the vendor believes it would be unrealistic for an application to call NmapProcess with arguments taken from input data that arrived over an untrusted network, and thus the CVSS score corresponds to an unrealistic use case. None of the NmapProcess documentation implies that this is an expected use case.", "No PoCs found on GitHub currently.", "https://www.swascan.com/security-advisory-libnmap-2/"], ["2022", "CVE-2022-30115", "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.", "https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-21261", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-21321", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30055", "Prime95 30.7 build 9 suffers from a Buffer Overflow vulnerability that could lead to Remote Code Execution.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html"], ["2022", "CVE-2022-41038", "Microsoft SharePoint Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3242", "Code Injection in GitHub repository microweber/microweber prior to 1.3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3e6b218a-a5a6-40d9-9f7e-5ab0c6214faf"], ["2022", "CVE-2022-1347", "Stored XSS in the \"Username\" & \"Email\" input fields leads to account takeover of Admin & Co-admin users in GitHub repository causefx/organizr prior to 2.1.1810. Account takeover and privilege escalation", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6059501f-05d2-4e76-ae03-5eb64835e6bf"], ["2022", "CVE-2022-39824", "Server-side JavaScript injection in Appsmith through 1.7.14 allows remote attackers to execute arbitrary JavaScript code from the server via the currentItem property of the list widget, e.g., to perform DoS attacks or achieve an information leak.", "No PoCs found on GitHub currently.", "https://github.com/FCncdn/Appsmith-Js-Injection-POC"], ["2022", "CVE-2022-1256", "A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links.", "No PoCs found on GitHub currently.", "https://kc.mcafee.com/corporate/index?page=content&id=SB10382"], ["2022", "CVE-2022-35621", "Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash code fa2084d5abca91a62ed1d2f1cad3ec318e6a9a2d7f1510a00d898737b05f48ae allows remote attackers to execute fraudulent NFT transfers.", "https://github.com/ARPSyndicate/cvemon https://github.com/MacherCS/CVE_Evoh_Contract https://github.com/karimhabush/cyberowl", "https://github.com/MacherCS/CVE_Evoh_Contract"], ["2022", "CVE-2022-32041", "Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formGetPassengerAnalyseData.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData"], ["2022", "CVE-2022-28542", "Improper sanitization of incoming intent in Galaxy Store prior to version 4.5.40.5 allows local attackers to access privileged content providers as Galaxy Store permission.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-45520", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/qossetting.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/qossetting/readme.md"], ["2022", "CVE-2022-30144", "Windows Bluetooth Service Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Layakk/WKI", "No PoCs from references."], ["2022", "CVE-2022-36508", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetAPInfoById.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15"], ["2022", "CVE-2022-4473", "The Widget Shortcode WordPress plugin through 0.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3"], ["2022", "CVE-2022-25779", "Logging of Excessive Data vulnerability in audit log of Secomea GateManager allows logged in user to write text entries in audit log. This issue affects: Secomea GateManager versions prior to 9.7.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-45460", "Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow an unauthenticated and remote user to exploit a stack-based buffer overflow and crash the web server, resulting in a system reboot. An unauthenticated and remote attacker can execute arbitrary code by sending a crafted HTTP request that triggers the overflow condition via a long URI passed to a sprintf call. NOTE: this is different than CVE-2018-10088, but this may overlap CVE-2017-16725.", "No PoCs found on GitHub currently.", "https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py"], ["2022", "CVE-2022-26982", "** DISPUTED ** SimpleMachinesForum 2.1.1 and earlier allows remote authenticated administrators to execute arbitrary code by inserting a vulnerable php code because the themes can be modified by an administrator. NOTE: the vendor's position is that administrators are intended to have the ability to modify themes, and can thus choose any PHP code that they wish to have executed on the server.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html"], ["2022", "CVE-2022-21370", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37967", "Windows Kerberos Elevation of Privilege Vulnerability", "https://github.com/GhostPack/Rubeus https://github.com/KFriitz/MyRuby https://github.com/OsandaMalith/Rubeus https://github.com/Pascal-0x90/Rubeus https://github.com/RkDx/MyRuby https://github.com/Strokekilla/Rubeus https://github.com/qobil7681/Password-cracker https://github.com/syedrizvinet/lib-repos-Rubeus https://github.com/ycdxsb/WindowsPrivilegeEscalation", "No PoCs from references."], ["2022", "CVE-2022-30004", "Sourcecodester Online Market Place Site v1.0 suffers from an unauthenticated blind SQL Injection Vulnerability allowing remote attackers to dump the SQL database via time-based SQL injection..", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html"], ["2022", "CVE-2022-26510", "A firmware update vulnerability exists in the iburn firmware checks functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted HTTP request can lead to firmware update. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495"], ["2022", "CVE-2022-40305", "A Server-Side Request Forgery issue in Canto Cumulus through 11.1.3 allows attackers to enumerate the internal network, overload network resources, and possibly have unspecified other impact via the server parameter to the /cwc/login login form.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt"], ["2022", "CVE-2022-22288", "Improper authorization vulnerability in Galaxy Store prior to 4.5.36.5 allows remote app installation of the allowlist.", "https://github.com/ARPSyndicate/cvemon https://github.com/FSecureLABS/boops-boops-android-agent https://github.com/WithSecureLabs/boops-boops-android-agent", "No PoCs from references."], ["2022", "CVE-2022-3213", "A heap buffer overflow issue was found in ImageMagick. When an application processes a malformed TIFF file, it could lead to undefined behavior or a crash causing a denial of service.", "No PoCs found on GitHub currently.", "https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2 https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750"], ["2022", "CVE-2022-1316", "Incorrect Permission Assignment for Critical Resource in GitHub repository zerotier/zerotierone prior to 1.8.8. Local Privilege Escalation", "https://github.com/ARPSyndicate/cvemon https://github.com/ycdxsb/ycdxsb", "https://huntr.dev/bounties/e7835226-1b20-4546-b256-3f625badb022"], ["2022", "CVE-2022-1087", "A vulnerability, which was classified as problematic, has been found in htmly 5.3 whis affects the component Edit Profile Module. The manipulation of the field Title with script tags leads to persistent cross site scripting. The attack may be initiated remotely and requires an authentication. A simple POC has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/liaojia-99/project/blob/main/htmly/1.md https://vuldb.com/?id.195203"], ["2022", "CVE-2022-2872", "Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56"], ["2022", "CVE-2022-30909", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the CMD parameter at /goform/aspForm.", "https://github.com/ARPSyndicate/cvemon https://github.com/ilovekeer/IOT_Vul https://github.com/zhefox/IOT_Vul", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/3"], ["2022", "CVE-2022-1689", "The Note Press WordPress plugin through 0.1.10 does not sanitise and escape the Update parameter before using it in a SQL statement when updating a note via the admin dashboard, leading to an SQL injection", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/note-press_0-1-10_2 https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28"], ["2022", "CVE-2022-31566", "The DSAB-local/DSAB repository through 2019-02-18 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20612", "A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-22717", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ahmetfurkans/CVE-2022-22718 https://github.com/clearbluejar/cve-markdown-charts https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-29160", "Nextcloud Android is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.0, sensitive tokens, images, and user related details exist after deletion of a user account. This could result in misuse of the former account holder's information. Nextcloud Android version 3.19.0 contains a patch for this issue. There are no known workarounds available.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22814", "The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.", "https://github.com/ARPSyndicate/cvemon https://github.com/DShankle/CVE-2022-22814_PoC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36306", "An authenticated attacker can enumerate and download sensitive files, including the eNodeB's web management UI's TLS private key, the web server binary, and the web server configuration file. These vulnerabilities were found in AirVelocity 1500 running software version 9.3.0.01249, were still present in 15.18.00.2511, and may affect other AirVelocity and AirSpeed models.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9"], ["2022", "CVE-2022-41667", "A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).", "No PoCs found on GitHub currently.", "https://www.se.com/ww/en/download/document/SEVD-2022-284-01/"], ["2022", "CVE-2022-40999", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'gre index <1-8> tunnel A.B.C.D source (A.B.C.D|null) dest A.B.C.D keepalive (on|off) interval (<0-255>|null) retry (<0-255>|null) description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-0674", "The Kunze Law WordPress plugin before 2.1 does not escape its 'E-Mail Error \"From\" Address' settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b"], ["2022", "CVE-2022-2631", "Improper Access Control in GitHub repository tooljet/tooljet prior to v1.19.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/86881f9e-ca48-49b5-9782-3c406316930c"], ["2022", "CVE-2022-22954", "VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.", "https://github.com/0day404/vulnerability-poc https://github.com/0x783kb/Security-operation-book https://github.com/0xPugal/One-Liners https://github.com/0xPugazh/One-Liners https://github.com/0xlittleboy/One-Liner-Scripts https://github.com/0xlittleboy/One-Liners https://github.com/1SeaMy/CVE-2022-22954 https://github.com/20142995/Goby https://github.com/20142995/sectool https://github.com/3SsFuck/CVE-2021-31805-POC https://github.com/3SsFuck/CVE-2022-22954-POC https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ArrestX/--POC https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Chocapikk/CVE-2022-22954 https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC https://github.com/GhostTroops/TOP https://github.com/HACK-THE-WORLD/DailyMorningReading https://github.com/HimmelAward/Goby_POC https://github.com/JERRY123S/all-poc https://github.com/Jhonsonwannaa/CVE-2022-22954 https://github.com/Jun-5heng/CVE-2022-22954 https://github.com/KayCHENvip/vulnerability-poc https://github.com/MLX15/CVE-2022-22954 https://github.com/MSeymenD/CVE-2022-22954-Testi https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/Schira4396/VcenterKiller https://github.com/StarCrossPortal/scalpel https://github.com/Threekiii/Awesome-POC https://github.com/Vulnmachines/VMWare_CVE-2022-22954 https://github.com/W01fh4cker/Serein https://github.com/W01fh4cker/VcenterKit https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/amit-pathak009/CVE-2022-22954 https://github.com/amit-pathak009/CVE-2022-22954-PoC https://github.com/aniqfakhrul/CVE-2022-22954 https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/arzuozkan/CVE-2022-22954 https://github.com/astraztech/vmware4shell https://github.com/avboy1337/CVE-2022-22954-VMware-RCE https://github.com/axingde/CVE-2022-22954-POC https://github.com/b4dboy17/CVE-2022-22954 https://github.com/badboy-sft/CVE-2022-22954 https://github.com/bb33bb/CVE-2022-22954-VMware-RCE https://github.com/bewhale/CVE-2022-22954 https://github.com/bhavesh-pardhi/One-Liner https://github.com/bigblackhat/oFx https://github.com/binganao/vulns-2022 https://github.com/chaosec2021/CVE-2022-22954-VMware-RCE https://github.com/chaosec2021/EXP-POC https://github.com/chaosec2021/fscan-POC https://github.com/cisagov/Malcolm https://github.com/corelight/cve-2022-22954 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/czz1233/fscan https://github.com/d4n-sec/d4n-sec.github.io https://github.com/djytmdj/Tool_Summary https://github.com/emilyastranova/VMware-CVE-2022-22954-Command-Injector https://github.com/fatguru/dorks https://github.com/fleabane1/CVE-2021-31805-POC https://github.com/goldenscale/GS_GithubMirror https://github.com/hktalent/Scan4all_Pro https://github.com/hktalent/TOP https://github.com/jax7sec/CVE-2022-22954 https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/lions2012/Penetration_Testing_POC https://github.com/litt1eb0yy/One-Liner-Scripts https://github.com/lolminerxmrig/CVE-2022-22954_ https://github.com/lucksec/VMware-CVE-2022-22954 https://github.com/mamba-2021/EXP-POC https://github.com/mamba-2021/fscan-POC https://github.com/manas3c/CVE-POC https://github.com/mhurts/CVE-2022-22954-POC https://github.com/mumu2020629/-CVE-2022-22954-scanner https://github.com/nguyenv1nK/CVE-2022-22954 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/orwagodfather/CVE-2022-22954 https://github.com/rat857/AtomsPanic https://github.com/secfb/CVE-2022-22954 https://github.com/shengshengli/fscan-POC https://github.com/sherlocksecurity/VMware-CVE-2022-22954 https://github.com/taielab/awesome-hacking-lists https://github.com/tanjiti/sec_profile https://github.com/trhacknon/CVE-2022-22954 https://github.com/trhacknon/CVE-2022-22954-PoC https://github.com/trhacknon/One-Liners https://github.com/trhacknon/Pocingit https://github.com/tunelko/CVE-2022-22954-PoC https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector https://github.com/weeka10/-hktalent-TOP https://github.com/west-wind/Threat-Hunting-With-Splunk https://github.com/whoforget/CVE-POC https://github.com/xinyisleep/pocscan https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youcans896768/APIV_Tool https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html"], ["2022", "CVE-2022-20851", "A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI API. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. To exploit this vulnerability, an attacker must have valid Administrator privileges on the affected device.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1458", "Stored XSS Leads To Session Hijacking in GitHub repository openemr/openemr prior to 6.1.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/78674078-0796-4102-a81e-f699cd6981b0"], ["2022", "CVE-2022-22657", "A memory initialization issue was addressed with improved memory handling. This issue is fixed in Logic Pro 10.7.3, GarageBand 10.4.6, macOS Monterey 12.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/brandonprry/apple_midi https://github.com/koronkowy/koronkowy", "No PoCs from references."], ["2022", "CVE-2022-2932", "Cross-site Scripting (XSS) - Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2-other-bustle/mobiledoc-kit"], ["2022", "CVE-2022-0837", "The Amelia WordPress plugin before 1.0.48 does not have proper authorisation when handling Amelia SMS service, allowing any customer to send paid test SMS notification as well as retrieve sensitive information about the admin, such as the email, account balance and payment history. A malicious actor can abuse this vulnerability to drain out the account balance by keep sending SMS notification.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a"], ["2022", "CVE-2022-1549", "The WP Athletics WordPress plugin through 1.1.7 does not sanitize parameters before storing them in the database, nor does it escape the values when outputting them back in the admin dashboard, leading to a Stored Cross-Site Scripting vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f"], ["2022", "CVE-2022-31537", "The jmcginty15/Solar-system-simulator repository through 2021-07-26 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-2823", "The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.27.9 does not sanitise and escape some of its Gallery Image parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef"], ["2022", "CVE-2022-30958", "A cross-site request forgery (CSRF) vulnerability in Jenkins SSH Plugin 2.6.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.", "https://github.com/EMLamban/jenkins", "No PoCs from references."], ["2022", "CVE-2022-0926", "File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17"], ["2022", "CVE-2022-0625", "The Admin Menu Editor WordPress plugin through 1.0.4 does not sanitize and escape a parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a"], ["2022", "CVE-2022-22845", "QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/OmriBaso/CVE-2022-22845-Exploit https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36186", "A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2223"], ["2022", "CVE-2022-0765", "The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587"], ["2022", "CVE-2022-0866", "This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org.jboss.as.ejb3.security.RunAsPrincipalInterceptor to keep track of the current identity prior to switching to a new identity created using the RunAs principal. The exploit consist that the EJBComponent#incomingRunAsIdentity field is currently just a SecurityIdentity. This means in a concurrent environment, where multiple users are repeatedly invoking an EJB that is configured with a RunAs principal, it's possible for the wrong the caller principal to be returned from EJBComponent#getCallerPrincipal. Similarly, it's also possible for EJBComponent#isCallerInRole to return the wrong value. Both of these methods rely on incomingRunAsIdentity. Affects all versions of JBoss EAP from 7.1.0 and all versions of WildFly 11+ when Elytron is enabled.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1798", "A path traversal vulnerability in KubeVirt versions up to 0.56 (and 0.55.1) on all platforms allows a user able to configure the kubevirt to read arbitrary files on the host filesystem which are publicly readable or which are readable for UID 107 or GID 107. /proc/self/<> is not accessible.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1409", "The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.8 does not properly validate images, allowing high privilege users such as administrators to upload PHP files disguised as images and containing malicious PHP code", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe"], ["2022", "CVE-2022-20703", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-20492", "In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242704043", "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20492 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-22606", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22597", "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted file may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38305", "AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the component /admin/profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "No PoCs found on GitHub currently.", "https://github.com/MegaTKC/AeroCMS/issues/3"], ["2022", "CVE-2022-44013", "An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can make various API calls without authentication because the password in a Credential Object is not checked.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-43970", "A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.", "No PoCs found on GitHub currently.", "https://youtu.be/73-1lhvJPNg https://youtu.be/RfWVYCUBNZ0 https://youtu.be/TeWAmZaKQ_w"], ["2022", "CVE-2022-1928", "Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2"], ["2022", "CVE-2022-36035", "Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0547", "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2990", "An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", "No PoCs found on GitHub currently.", "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"], ["2022", "CVE-2022-0895", "Static Code Injection in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d"], ["2022", "CVE-2022-0407", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c"], ["2022", "CVE-2022-23608", "PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html"], ["2022", "CVE-2022-25304", "All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.", "https://github.com/claroty/opcua-exploit-framework", "https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731 https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730"], ["2022", "CVE-2022-25095", "Home Owners Collection Management System v1.0 allows unauthenticated attackers to compromise user accounts via a crafted POST request.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50730"], ["2022", "CVE-2022-43680", "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nivaskumark/external_expat_AOSP10_r33_CVE-2022-43680 https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680 https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/a23au/awe-base-images https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/fokypoky/places-list https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/maxim12z/ECommerce https://github.com/nidhi7598/expat_2.1.0_CVE-2022-43680 https://github.com/nidhi7598/external_expat_AOSP10_r33_CVE-2022-43680 https://github.com/nidhihcl/external_expat_2.1.0_CVE-2022-43680 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/stkcat/awe-base-images https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1868", "Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-27201", "Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-0516", "A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55"], ["2022", "CVE-2022-0687", "The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom \"Amelia Manager\" role.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c"], ["2022", "CVE-2022-2413", "The Slide Anything WordPress plugin before 2.3.47 does not properly sanitize or escape the slide title before outputting it in the admin pages, allowing a logged in user with roles as low as Author to inject a javascript payload into the slide title even when the unfiltered_html capability is disabled.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/"], ["2022", "CVE-2022-1979", "A vulnerability was found in SourceCodester Product Show Room Site 1.0. It has been declared as problematic. This vulnerability affects p=contact. The manipulation of the Message textbox with the input leads to cross site scripting. The attack can be initiated remotely but requires authentication. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Message'%20Stored%20Cross-Site%20Scripting(XSS).md https://vuldb.com/?id.200950"], ["2022", "CVE-2022-41505", "An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate attackers to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value.", "https://github.com/ARPSyndicate/cvemon https://github.com/hemant70072/Access-control-issue-in-TP-Link-Tapo-C200-V1.", "No PoCs from references."], ["2022", "CVE-2022-31595", "SAP Financial Consolidation - version 1010,\ufffddoes not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29202", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-29193", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-38176", "An issue was discovered in YSoft SAFEQ 6 before 6.0.72. Incorrect privileges were configured as part of the installer package for the Client V3 services, allowing for local user privilege escalation by overwriting the executable file via an alternative data stream. NOTE: this is not the same as CVE-2021-31859.", "No PoCs found on GitHub currently.", "https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation"], ["2022", "CVE-2022-2881", "The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-37308", "OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages.", "https://github.com/ARPSyndicate/cvemon", "https://seclists.org/fulldisclosure/2022/Nov/18"], ["2022", "CVE-2022-37099", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateSnat.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14"], ["2022", "CVE-2022-20430", "There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221233", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-44320", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceFP function in expression.c when called from ExpressionParseFunctionCall.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-22535", "SAP ERP HCM Portugal - versions 600, 604, 608, does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-33942", "Protection mechanism failure in the Intel(R) DCM software before version 5.0 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrTuxracer/advisories https://github.com/fardeen-ahmed/Bug-bounty-Writeups", "No PoCs from references."], ["2022", "CVE-2022-34021", "Multiple Cross Site Scripting (XSS) vulnerabilities in ResIOT IOT Platform + LoRaWAN Network Server through 4.1.1000114 via the form fields.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34021.html"], ["2022", "CVE-2022-48337", "GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the \"etags -u *\" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41445", "A cross-site scripting (XSS) vulnerability in Record Management System using CodeIgniter 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Subject page.", "https://github.com/RashidKhanPathan/CVE-2022-41445 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/RashidKhanPathan/CVE-2022-41445 https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor"], ["2022", "CVE-2022-1839", "A vulnerability classified as critical was found in Home Clean Services Management System 1.0. This vulnerability affects the file login.php. The manipulation of the argument email with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(2)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. The attack can be initiated remotely but it requires authentication. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_login_email_SQL_injection.md https://vuldb.com/?id.200584"], ["2022", "CVE-2022-31847", "A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md"], ["2022", "CVE-2022-30428", "In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading.", "No PoCs found on GitHub currently.", "https://github.com/gphper/ginadmin/issues/9"], ["2022", "CVE-2022-0456", "Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0751", "Inaccurate display of Snippet files containing special characters in all versions of GitLab CE/EE allows an attacker to create Snippets with misleading content which could trick unsuspecting users into executing arbitrary commands", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/349382"], ["2022", "CVE-2022-28329", "A vulnerability has been identified in SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0). Affected devices do not properly handle malformed TCP packets received over the RemoteCapture feature. This could allow an attacker to lead to a denial of service condition which only affects the port used by the RemoteCapture feature.", "No PoCs found on GitHub currently.", "https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf"], ["2022", "CVE-2022-2654", "The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993"], ["2022", "CVE-2022-4358", "The WP RSS By Publishers WordPress plugin through 0.1 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d"], ["2022", "CVE-2022-36223", "In Emby Server 4.6.7.0, the playlist name field is vulnerable to XSS stored where it is possible to steal the administrator access token and flip or steal the media server administrator account.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f"], ["2022", "CVE-2022-41841", "An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/779"], ["2022", "CVE-2022-22632", "A logic issue was addressed with improved state management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, watchOS 8.5, macOS Monterey 12.3. A malicious application may be able to elevate privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3538", "The Webmaster Tools Verification WordPress plugin through 1.2 does not have authorisation and CSRF checks when disabling plugins, allowing unauthenticated users to disable arbitrary plugins", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036"], ["2022", "CVE-2022-32929", "A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 15.7 and iPadOS 15.7, iOS 16.1 and iPadOS 16. An app may be able to access iOS backups.", "https://github.com/ARPSyndicate/cvemon https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-2817", "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f"], ["2022", "CVE-2022-21989", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0912", "Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.11.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54"], ["2022", "CVE-2022-46062", "Gym Management System v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md"], ["2022", "CVE-2022-41901", "TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-31503", "The orchest/orchest repository before 2022.05.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-31692", "Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and include dispatcher types. The application uses the AuthorizationFilter either manually or via the authorizeHttpRequests() method. The application configures the FilterChainProxy to apply to forward and/or include requests (e.g. spring.security.filter.dispatcher-types = request, error, async, forward, include). The application may forward or include the request to a higher privilege-secured endpoint.The application configures Spring Security to apply to every dispatcher type via authorizeHttpRequests().shouldFilterAllDispatcherTypes(true)", "https://github.com/ARPSyndicate/cvemon https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/SpindleSec/cve-2022-31692 https://github.com/Whoopsunix/PPPVULNS https://github.com/aneasystone/github-trending https://github.com/ax1sX/SpringSecurity https://github.com/hotblac/cve-2022-31692 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/neutrinoxtronic/ArchitectureWeekly https://github.com/nomi-sec/PoC-in-GitHub https://github.com/oskardudycz/ArchitectureWeekly https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-44167", "Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer.", "No PoCs found on GitHub currently.", "https://drive.google.com/file/d/1Jq8Tm_2FDS4WDD_afdhg1LnA3VcvZdjS/view?usp=sharing"], ["2022", "CVE-2022-4218", "The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the list_quizzes() function. This makes it possible for unauthenticated attackers to delete quizzes and copy quizzes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e"], ["2022", "CVE-2022-36363", "A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not properly validate an offset value which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of the content of the memory.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-27386", "MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.", "https://github.com/ARPSyndicate/cvemon", "https://jira.mariadb.org/browse/MDEV-26406"], ["2022", "CVE-2022-0580", "Incorrect Authorization in Packagist librenms/librenms prior to 22.2.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/faisalfs10x/CVE-IDs", "https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3"], ["2022", "CVE-2022-0611", "Missing Authorization in Packagist snipe/snipe-it prior to 5.3.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b"], ["2022", "CVE-2022-4309", "The Subscribe2 WordPress plugin before 10.38 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete arbitrary users by knowing their email via a CSRF attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051"], ["2022", "CVE-2022-22960", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. A malicious actor with local access can escalate privileges to 'root'.", "https://github.com/ARPSyndicate/cvemon https://github.com/Chocapikk/CVE-2022-22954 https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/secfb/CVE-2022-22954 https://github.com/sourceincite/hekate", "http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html"], ["2022", "CVE-2022-25003", "Hospital Patient Record Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/doctors/view_doctor.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003"], ["2022", "CVE-2022-20865", "A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0700", "The Simple Tracking WordPress plugin before 1.7 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7"], ["2022", "CVE-2022-2594", "The Advanced Custom Fields WordPress plugin before 5.12.3, Advanced Custom Fields Pro WordPress plugin before 5.12.3 allows unauthenticated users to upload files allowed in a default WP configuration (so PHP is not possible) if there is a frontend form available. This vulnerability was introduced in the 5.0 rewrite and did not exist prior to that release.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2"], ["2022", "CVE-2022-28378", "Craft CMS before 3.7.29 allows XSS.", "https://github.com/noobpk/noobpk", "No PoCs from references."], ["2022", "CVE-2022-2906", "An attacker can leverage this flaw to gradually erode available memory to the point where named crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32978", "There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/75"], ["2022", "CVE-2022-31783", "Liblouis 3.21.0 has an out-of-bounds write in compileRule in compileTranslationTable.c, as demonstrated by lou_trace.", "No PoCs found on GitHub currently.", "https://github.com/liblouis/liblouis/issues/1214"], ["2022", "CVE-2022-22663", "This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in iOS 15.4 and iPadOS 15.4, Security Update 2022-004 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.6. A malicious application may bypass Gatekeeper checks.", "https://github.com/0x3c3e/pocs https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3569", "Due to an issue with incorrect sudo permissions, Zimbra Collaboration Suite (ZCS) suffers from a local privilege escalation issue in versions 9.0.0 and prior, where the 'zimbra' user can effectively coerce postfix into running arbitrary commands as 'root'.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html"], ["2022", "CVE-2022-29014", "A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files.", "https://github.com/ARPSyndicate/kenzer-templates", "https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html https://www.exploit-db.com/exploits/50864"], ["2022", "CVE-2022-41950", "super-xray is the GUI alternative for vulnerability scanning tool xray. In 0.2-beta, a privilege escalation vulnerability was discovered. This caused inaccurate default xray permissions. Note: this vulnerability only affects Linux and Mac OS systems. Users should upgrade to super-xray 0.3-beta.", "No PoCs found on GitHub currently.", "https://github.com/4ra1n/super-xray/releases/tag/0.3-beta"], ["2022", "CVE-2022-31552", "The project-anuvaad/anuvaad-corpus repository through 2020-11-23 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-44136", "Zenario CMS 9.3.57186 is vulnerable to Remote Code Excution (RCE).", "https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-29154", "An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).", "https://github.com/ARPSyndicate/cvemon https://github.com/EgeBalci/CVE-2022-29154 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/advxrsary/vuln-scanner https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2846", "The Calendar Event Multi View WordPress plugin before 1.4.07 does not have any authorisation and CSRF checks in place when creating an event, and is also lacking sanitisation as well as escaping in some of the event fields. This could allow unauthenticated attackers to create arbitrary events and put Cross-Site Scripting payloads in it.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c"], ["2022", "CVE-2022-0943", "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1"], ["2022", "CVE-2022-0640", "The Pricing Table Builder WordPress plugin before 1.1.5 does not sanitize and escape the postid parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9"], ["2022", "CVE-2022-2745", "A vulnerability, which was classified as critical, was found in SourceCodester Gym Management System. This affects an unknown part of the file /admin/add_trainers.php of the component Add New Trainer. The manipulation of the argument trainer_name leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-206013 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206013"], ["2022", "CVE-2022-48121", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the rsabits parameter in the setting/delStaticDhcpRules function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/16"], ["2022", "CVE-2022-27046", "libsixel 1.8.6 suffers from a Heap Use After Free vulnerability in in libsixel/src/dither.c:388.", "https://github.com/ARPSyndicate/cvemon https://github.com/a4865g/Cheng-fuzz", "https://github.com/saitoha/libsixel/issues/157"], ["2022", "CVE-2022-20795", "A vulnerability in the implementation of the Datagram TLS (DTLS) protocol in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause high CPU utilization, resulting in a denial of service (DoS) condition. This vulnerability is due to suboptimal processing that occurs when establishing a DTLS tunnel as part of an AnyConnect SSL VPN connection. An attacker could exploit this vulnerability by sending a steady stream of crafted DTLS traffic to an affected device. A successful exploit could allow the attacker to exhaust resources on the affected VPN headend device. This could cause existing DTLS tunnels to stop passing traffic and prevent new DTLS tunnels from establishing, resulting in a DoS condition. Note: When the attack traffic stops, the device recovers gracefully.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV"], ["2022", "CVE-2022-38393", "A denial of service vulnerability exists in the cfg_server cm_processConnDiagPktList opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592"], ["2022", "CVE-2022-44314", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrncpy function in cstdlib/string.c when called from ExpressionParseFunctionCall.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-33675", "Azure Site Recovery Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/Pentest-Tips", "No PoCs from references."], ["2022", "CVE-2022-26108", "When a user opens a manipulated Picture Exchange (.pcx, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-21768", "In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784351; Issue ID: ALPS06784351.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-0462", "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2567", "The Form Builder CP WordPress plugin before 1.2.32 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon https://github.com/Th3l0newolf/WordPress-Plugin-Form-Builder-CP-_CVE", "https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54"], ["2022", "CVE-2022-22993", "A limited SSRF vulnerability was discovered on Western Digital My Cloud devices that could allow an attacker to impersonate a server and reach any page on the server by bypassing access controls. The vulnerability was addressed by creating a whitelist for valid parameters.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-48303", "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dalifo/wik-dvs-tp02 https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/mauraneh/WIK-DPS-TP02 https://github.com/seal-community/patches", "https://savannah.gnu.org/bugs/?62387"], ["2022", "CVE-2022-3908", "The Helloprint WordPress plugin before 1.4.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505"], ["2022", "CVE-2022-41471", "74cmsSE v3.12.0 allows authenticated attackers with low-level privileges to arbitrarily change the rights and credentials of the Super Administrator account.", "https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "No PoCs from references."], ["2022", "CVE-2022-36110", "Netmaker makes networks with WireGuard. Prior to version 0.15.1, Improper Authorization functions lead to non-privileged users running privileged API calls. If someone adds users to the Netmaker platform who do not have admin privileges, they can use their auth tokens to run admin-level functions via the API. This problem has been patched in v0.15.1.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31873", "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an XSS vulnerability via the prefix parameter in /admin/general.cgi.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md"], ["2022", "CVE-2022-25221", "Money Transfer Management System Version 1.0 allows an attacker to inject JavaScript code in the URL and then trick a user into visit the link in order to execute JavaScript code.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/charles/"], ["2022", "CVE-2022-3848", "The WP User Merger WordPress plugin before 1.5.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/ https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610"], ["2022", "CVE-2022-21628", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0522", "Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2d45e589-d614-4875-bba1-be0f729e7ca9"], ["2022", "CVE-2022-31630", "In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-26159", "The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion//en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.", "https://github.com/20142995/Goby https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/p0dalirius/CVE-2022-26159-Ametys-Autocompletion-XML https://github.com/p0dalirius/p0dalirius https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://podalirius.net/en/cves/2022-26159/"], ["2022", "CVE-2022-38053", "Microsoft SharePoint Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/ohnonoyesyes/CVE-2023-21742", "No PoCs from references."], ["2022", "CVE-2022-29327", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the urladd parameter in /goform/websURLFilterAddDel.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/9 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-25330", "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-05"], ["2022", "CVE-2022-36141", "SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::MethodBody::write(SWF::Writer*, SWF::Context*).", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/58"], ["2022", "CVE-2022-2536", "The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient validation of settings on the 'tp_translation' AJAX action which makes it possible for unauthenticated attackers to bypass any restrictions and influence the data shown on the site. Please note this is a separate issue from CVE-2022-2461. Notes from the researcher: When installed Transposh comes with a set of pre-configured options, one of these is the \"Who can translate\" setting under the \"Settings\" tab. However, this option is largely ignored, if Transposh has enabled its \"autotranslate\" feature (it's enabled by default) and the HTTP POST parameter \"sr0\" is larger than 0. This is caused by a faulty validation in \"wp/transposh_db.php.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go https://github.com/MrTuxracer/advisories", "https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-2536.txt https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt https://www.exploitalert.com/view-details.html?id=38949 https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536"], ["2022", "CVE-2022-32548", "An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.", "https://github.com/AKQuraish/Autonomous https://github.com/ARPSyndicate/cvemon https://github.com/Inplex-sys/CVE-2022-23093 https://github.com/MosaedH/CVE-2022-32548-RCE-POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/gl3s7/CVE-2022-32548-PoC https://github.com/kor34N/CVE-2022-32548-mass https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/uicres/draytek-RCE https://github.com/uisvit/CVE-2022-32548-MASS-RCE https://github.com/uisvit/CVE-2022-32548-RCE-MASS https://github.com/zecool/cve", "https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers"], ["2022", "CVE-2022-2476", "A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING", "No PoCs found on GitHub currently.", "https://github.com/dbry/WavPack/issues/121"], ["2022", "CVE-2022-45169", "An issue was discovered in LIVEBOX Collaboration vDesk through v031. A URL Redirection to an Untrusted Site (Open Redirect) can occur under the /api/v1/notification/createnotification endpoint, allowing an authenticated user to send an arbitrary push notification to any other user of the system. This push notification can include an (invisible) clickable link.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-27375", "Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via the function sub_422168 at /goform/WifiExtraSet.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AX12/AX12-2.md"], ["2022", "CVE-2022-31661", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two privilege escalation vulnerabilities. A malicious actor with local access can escalate privileges to 'root'.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-46091", "Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter.", "https://github.com/ASR511-OO7/CVE-2022-46091", "No PoCs from references."], ["2022", "CVE-2022-46300", "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35268", "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_sdk_file/` API.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575"], ["2022", "CVE-2022-27365", "Cscms Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the component dance_Dance.php_del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/12#issue-1170440183"], ["2022", "CVE-2022-41570", "An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Unauthenticated SQL injection can occur.", "https://github.com/ARPSyndicate/cvemon https://github.com/Orange-Cyberdefense/CVE-repository", "No PoCs from references."], ["2022", "CVE-2022-3809", "A vulnerability was found in Axiomatic Bento4 and classified as problematic. Affected by this issue is the function ParseCommandLine of the file Mp4Tag/Mp4Tag.cpp of the component mp4tag. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212666 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip https://github.com/axiomatic-systems/Bento4/issues/779"], ["2022", "CVE-2022-22892", "There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c in Jerryscripts 3.0.0.", "No PoCs found on GitHub currently.", "https://github.com/jerryscript-project/jerryscript/issues/4872"], ["2022", "CVE-2022-25260", "JetBrains Hub before 2021.1.14276 was vulnerable to blind Server-Side Request Forgery (SSRF).", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/yuriisanin/CVE-2022-25260 https://github.com/yuriisanin/whoami https://github.com/yuriisanin/yuriisanin https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-45179", "An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials).", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-2466", "It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/yuxblank/CVE-2022-2466---Request-Context-not-terminated-with-GraphQL https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0563", "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dalifo/wik-dvs-tp02 https://github.com/GrigGM/05-virt-04-docker-hw https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/Thaeimos/aws-eks-image https://github.com/amartingarcia/kubernetes-cks-training https://github.com/cdupuis/image-api https://github.com/denoslab/ensf400-lab10-ssc https://github.com/fokypoky/places-list https://github.com/mauraneh/WIK-DPS-TP02 https://github.com/toyhoshi/helm", "No PoCs from references."], ["2022", "CVE-2022-21669", "PuddingBot is a group management bot. In version 0.0.6-b933652 and prior, the bot token is publicly exposed in main.py, making it accessible to malicious actors. The bot token has been revoked and new version is already running on the server. As of time of publication, the maintainers are planning to update code to reflect this change at a later date.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-26009", "A stack-based buffer overflow vulnerability exists in the confsrv ucloud_set_node_location functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483"], ["2022", "CVE-2022-42719", "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "https://github.com/0xArchy/CR005_AntiFirewalls https://github.com/ARPSyndicate/cvemon https://github.com/archyxsec/CR005_AntiFirewalls https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html http://www.openwall.com/lists/oss-security/2022/10/13/5"], ["2022", "CVE-2022-35278", "In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue.", "https://github.com/ARPSyndicate/cvemon https://github.com/mosaic-hgw/WildFly https://github.com/srchen1987/springcloud-distributed-transaction", "No PoCs from references."], ["2022", "CVE-2022-44215", "There is an open redirect vulnerability in Titan FTP server 19.0 and below. Users are redirected to any target URL.", "https://github.com/JBalanza/CVE-2022-44215 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/JBalanza/CVE-2022-44215"], ["2022", "CVE-2022-22540", "SAP NetWeaver AS ABAP (Workplace Server) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 787, allows an attacker to execute crafted database queries, that could expose the backend database. Successful attacks could result in disclosure of a table of contents from the system, but no risk of modification possible.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29337", "C-DATA FD702XW-X-R430 v2.1.13_X001 was discovered to contain a command injection vulnerability via the va_cmd parameter in formlanipv6. This vulnerability allows attackers to execute arbitrary commands via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/exploitwritter/CVE-2022-29337 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-44355", "SolarView Compact 7.0 is vulnerable to Cross-site Scripting (XSS) via /network_test.php.", "No PoCs found on GitHub currently.", "https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md"], ["2022", "CVE-2022-26149", "MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html"], ["2022", "CVE-2022-2526", "A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories", "No PoCs from references."], ["2022", "CVE-2022-0423", "The 3D FlipBook WordPress plugin before 1.12.1 does not have authorisation and CSRF checks when updating its settings, and does not have any sanitisation/escaping, allowing any authenticated users, such as subscriber to put Cross-Site Scripting payloads in all pages with a 3d flipbook.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952"], ["2022", "CVE-2022-36151", "tifig v0.2.2 was discovered to contain a segmentation violation via getType() at /common/bbox.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-27225", "Gradle Enterprise before 2021.4.3 relies on cleartext data transmission in some situations. It uses Keycloak for identity management services. During the sign-in process, Keycloak sets browser cookies that effectively provide remember-me functionality. For backwards compatibility with older Safari versions, Keycloak sets a duplicate of the cookie without the Secure attribute, which allows the cookie to be sent when accessing the location that cookie is set for via HTTP. This creates the potential for an attacker (with the ability to impersonate the Gradle Enterprise host) to capture the login session of a user by having them click an http:// link to the server, despite the real server requiring HTTPS.", "https://github.com/ARPSyndicate/cvemon https://github.com/PowerCommands/SecTools https://github.com/meddlin/epss-browser", "No PoCs from references."], ["2022", "CVE-2022-41430", "Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBit function in mp4mux.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/773"], ["2022", "CVE-2022-3949", "A vulnerability, which was classified as problematic, has been found in Sourcecodester Simple Cashiering System. This issue affects some unknown processing of the component User Account Handler. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-213455.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/maikroservice/CVE-2022-3949 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-32449", "TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.", "No PoCs found on GitHub currently.", "https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md"], ["2022", "CVE-2022-0532", "An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of \"safe\" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21638", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-3858", "The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec"], ["2022", "CVE-2022-48253", "nhttpd in Nostromo before 2.1 is vulnerable to a path traversal that may allow an attacker to execute arbitrary commands on the remote server. The vulnerability occurs when the homedirs option is used.", "No PoCs found on GitHub currently.", "https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html"], ["2022", "CVE-2022-25231", "The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8\u2019s memory limit.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724"], ["2022", "CVE-2022-44244", "An authentication bypass in Lin-CMS v0.2.1 allows attackers to escalate privileges to Super Administrator.", "https://github.com/ARPSyndicate/cvemon https://github.com/cai-niao98/lin-cms", "No PoCs from references."], ["2022", "CVE-2022-29226", "Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/ssst0n3/docker_archive", "https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh"], ["2022", "CVE-2022-38152", "An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.", "https://github.com/ARPSyndicate/cvemon https://github.com/trailofbits/publications", "http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/"], ["2022", "CVE-2022-46341", "A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31620", "In libjpeg before 1.64, BitStream::Get in bitstream.hpp has an assertion failure that may cause denial of service. This is related to out-of-bounds array access during arithmetically coded lossless scan or arithmetically coded sequential scan.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/70"], ["2022", "CVE-2022-42748", "CandidATS version 3.0.0 on 'sortDirection' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/Marcuccio/kevin", "No PoCs from references."], ["2022", "CVE-2022-20785", "On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-27274", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_12028. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-3918", "A program using FoundationNetworking in swift-corelibs-foundation is potentially vulnerable to CRLF ( ) injection in URLRequest headers. In this vulnerability, a client can insert one or several CRLF sequences into a URLRequest header value. When that request is sent via URLSession to an HTTP server, the server may interpret the content after the CRLF as extra headers, or even a second request. For example, consider a URLRequest to http://example.com/ with the GET method. Suppose we set the URLRequest header \"Foo\" to the value \"Bar Extra-Header: Added GET /other HTTP/1.1\". When this request is sent, it will appear to the server as two requests: GET / HTTP/1.1 Foo: Bar Extra-Header: Added GET /other HTTP/1.1 In this manner, the client is able to inject extra headers and craft an entirely new request to a separate path, despite only making one API call in URLSession. If a developer has total control over the request and its headers, this vulnerability may not pose a threat. However, this vulnerability escalates if un-sanitized user input is placed in header values. If so, a malicious user could inject new headers or requests to an intermediary or backend server. Developers should be especially careful to sanitize user input in this case, or upgrade their version of swift-corelibs-foundation to include the patch below.", "https://github.com/dellalibera/dellalibera", "No PoCs from references."], ["2022", "CVE-2022-34005", "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. There is Remote Code Execution due to a hardcoded password for the sa account on the Microsoft SQL Express 2019 instance installed by default during TitanFTP NextGen installation, aka NX-I674 (sub-issue 1). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.", "No PoCs found on GitHub currently.", "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf"], ["2022", "CVE-2022-25371", "Apache OFBiz uses the Birt project plugin (https://eclipse.github.io/birt-website/) to create data visualizations and reports. By leveraging a bug in Birt (https://bugs.eclipse.org/bugs/show_bug.cgi?id=538142) it is possible to perform a remote code execution (RCE) attack in Apache OFBiz, release 18.12.05 and earlier.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32509", "An issue was discovered on certain Nuki Home Solutions devices. Lack of certificate validation on HTTP communications allows attackers to intercept and tamper data. This affects Nuki Smart Lock 3.0 before 3.3.5, Nuki Bridge v1 before 1.22.0 and Nuki Bridge v2 before 2.13.2.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/"], ["2022", "CVE-2022-2577", "A vulnerability classified as critical was found in SourceCodester Garage Management System 1.0. This vulnerability affects unknown code of the file /edituser.php. The manipulation of the argument id with the input -2'%20UNION%20select%2011,user(),333,444--+ leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(SQLI).md https://vuldb.com/?id.205300"], ["2022", "CVE-2022-0472", "Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713"], ["2022", "CVE-2022-0953", "The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.20.96 does not sanitise and escape the QUERY_STRING before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting in browsers which do not encode characters", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a"], ["2022", "CVE-2022-2856", "Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-38230", "XPDF commit ffaf11c was discovered to contain a floating point exception (FPE) via DCTStream::decodeImage() at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-3439", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7"], ["2022", "CVE-2022-22733", "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache ShardingSphere ElasticJob-UI allows an attacker who has guest account to do privilege escalation. This issue affects Apache ShardingSphere ElasticJob-UI Apache ShardingSphere ElasticJob-UI 3.x version 3.0.0 and prior versions.", "https://github.com/Zeyad-Azima/CVE-2022-22733 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-31542", "The mandoku/mdweb repository through 2015-05-07 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41940", "Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the engine.io package, including those who uses depending packages like socket.io. There is no known workaround except upgrading to a safe version. There are patches for this issue released in versions 3.6.1 and 6.2.1.", "https://github.com/HotDB-Community/HotDB-Engine", "No PoCs from references."], ["2022", "CVE-2022-25153", "The ITarian Endpoint Manage Communication Client, prior to version 6.43.41148.21120, is compiled using insecure OpenSSL settings. Due to this setting, a malicious actor with low privileges access to a system can escalate his privileges to SYSTEM abusing an insecure openssl.conf lookup.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-28368", "Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).", "https://github.com/ARPSyndicate/cvemon https://github.com/Henryisnotavailable/Dompdf-Exploit-RCE https://github.com/That-Guy-Steve/CVE-2022-28368-handler https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rvizx/CVE-2022-28368 https://github.com/whoforget/CVE-POC https://github.com/x00tex/hackTheBox https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html"], ["2022", "CVE-2022-0710", "The Header Footer Code Manager plugin <= 1.1.16 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0481", "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027"], ["2022", "CVE-2022-41703", "A vulnerability in the SQL Alchemy connector of Apache Superset allows an authenticated user with read access to a specific database to add subqueries to the WHERE and HAVING fields referencing tables on the same database that the user should not have access to, despite the user having the feature flag \"ALLOW_ADHOC_SUBQUERY\" disabled (default value). This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27287", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanPPPoE. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-31890", "SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/reewardius/CVE-2022-31890", "https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/"], ["2022", "CVE-2022-36262", "An issue was discovered in taocms 3.0.2. in the website settings that allows arbitrary php code to be injected by modifying config.php.", "No PoCs found on GitHub currently.", "https://github.com/taogogo/taocms/issues/34 https://github.com/taogogo/taocms/issues/34?by=xboy(topsec)"], ["2022", "CVE-2022-25013", "Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the \"key\" and \"fm\" parameters in the component login.php.", "https://github.com/cooliscool/Advisories", "https://github.com/gamonoid/icehrm/issues/284"], ["2022", "CVE-2022-22970", "In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/NicheToolkit/rest-toolkit https://github.com/SYRTI/POC_to_review https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/WhooAmii/POC_to_review https://github.com/dapdelivery/spring-petclinic-template-with-CVE-2022-22970 https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/muneebaashiq/MBProjects https://github.com/nomi-sec/PoC-in-GitHub https://github.com/seal-community/patches https://github.com/sr-monika/sprint-rest https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-4088", "A vulnerability was found in rickxy Stock Management System and classified as critical. Affected by this issue is some unknown functionality of the file /pages/processlogin.php. The manipulation of the argument user/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214322 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/rickxy/Stock-Management-System/issues/2"], ["2022", "CVE-2022-43606", "A use-of-uninitialized-pointer vulnerability exists in the Forward Open connection_management_entry functionality of EIP Stack Group OpENer development commit 58ee13c. A specially-crafted EtherNet/IP request can lead to use of a null pointer, causing the server to crash. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663"], ["2022", "CVE-2022-43597", "Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655"], ["2022", "CVE-2022-29004", "Diary Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name parameter in search-result.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-29004 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-29395", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the apcliKey parameter in the function FUN_0041bac4.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig"], ["2022", "CVE-2022-3579", "A vulnerability classified as critical was found in SourceCodester Cashier Queuing System 1.0. This vulnerability affects unknown code of the file /queuing/login.php of the component Login Page. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-211186 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC https://vuldb.com/?id.211186"], ["2022", "CVE-2022-22673", "This issue was addressed with improved checks. This issue is fixed in iOS 15.5 and iPadOS 15.5. Processing a large input may lead to a denial of service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20776", "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31793", "do_request in request.c in muhttpd before 1.1.7 allows remote attackers to read arbitrary files by constructing a URL with a single character before a desired path on the filesystem. This occurs because the code skips over the first character when serving files. Arris NVG443, NVG599, NVG589, and NVG510 devices and Arris-derived BGW210 and BGW320 devices are affected.", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/badboycxcc/script https://github.com/d-rn/vulBox https://github.com/d4n-sec/d4n-sec.github.io https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xpgdgit/CVE-2022-31793 https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/ https://derekabdine.com/blog/2022-arris-advisory"], ["2022", "CVE-2022-31402", "ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/webservices/export-v2.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/YavuzSahbaz/CVE-2022-31402 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41800", "In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.", "https://github.com/ARPSyndicate/cvemon https://github.com/f0cus77/awesome-iot-security-resource https://github.com/f1tao/awesome-iot-security-resource https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/j-baines/tippa-my-tongue", "No PoCs from references."], ["2022", "CVE-2022-0813", "PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-22762", "Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1743931 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31682", "VMware Aria Operations contains an arbitrary file read vulnerability. A malicious actor with administrative privileges may be able to read arbitrary files containing sensitive data.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31513", "The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46072", "Helmet Store Showroom v1.0 vulnerable to unauthenticated SQL Injection.", "No PoCs found on GitHub currently.", "https://yuyudhn.github.io/CVE-2022-46072/"], ["2022", "CVE-2022-21999", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/0xStrygwyr/OSCP-Guide https://github.com/0xZipp0/OSCP https://github.com/0xsyr0/OSCP https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/Pentest-Tips https://github.com/Ly0nt4r/OSCP https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/SirElmard/ethical_hacking https://github.com/WhooAmii/POC_to_review https://github.com/ahmetfurkans/CVE-2022-22718 https://github.com/binganao/vulns-2022 https://github.com/changtraixuqang97/changtraixuqang97 https://github.com/clearbluejar/cve-markdown-charts https://github.com/daphne97/daphne97 https://github.com/duytruongpham/duytruongpham https://github.com/e-hakson/OSCP https://github.com/eljosep/OSCP-Guide https://github.com/francevarotz98/WinPrintSpoolerSaga https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/k0mi-tg/CVE-POC https://github.com/k8gege/Ladon https://github.com/kgwanjala/oscp-cheatsheet https://github.com/lions2012/Penetration_Testing_POC https://github.com/ly4k/SpoolFool https://github.com/manas3c/CVE-POC https://github.com/nitishbadole/oscp-note-3 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/open-source-agenda/new-open-source-projects https://github.com/oscpname/OSCP_cheat https://github.com/revanmalang/OSCP https://github.com/sarutobi12/sarutobi12 https://github.com/soosmile/POC https://github.com/sponkmonk/Ladon_english_update https://github.com/taielab/awesome-hacking-lists https://github.com/trhacknon/Pocingit https://github.com/txuswashere/OSCP https://github.com/tzwlhack/SpoolFool https://github.com/whoforget/CVE-POC https://github.com/xhref/OSCP https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html"], ["2022", "CVE-2022-32879", "A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, watchOS 9, tvOS 16. A user with physical access to a device may be able to access contacts from the lock screen.", "https://github.com/ARPSyndicate/cvemon https://github.com/diego-acc/NVD-Scratching https://github.com/diegosanzmartin/NVD-Scratching", "No PoCs from references."], ["2022", "CVE-2022-2704", "A vulnerability was found in SourceCodester Simple E-Learning System. It has been declared as problematic. This vulnerability affects unknown code of the file downloadFiles.php. The manipulation of the argument download leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205828.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205828"], ["2022", "CVE-2022-2495", "Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.21.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798"], ["2022", "CVE-2022-0601", "The Countdown, Coming Soon, Maintenance WordPress plugin before 2.2.9 does not sanitize and escape the post parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf"], ["2022", "CVE-2022-0590", "The BulletProof Security WordPress plugin before 5.8 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e"], ["2022", "CVE-2022-27007", "nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/469"], ["2022", "CVE-2022-20964", "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system.
This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user.
Cisco has not yet released software updates that address this vulnerability.", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/"], ["2022", "CVE-2022-4199", "The Link Library WordPress plugin before 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d"], ["2022", "CVE-2022-4208", "The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'datef' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e"], ["2022", "CVE-2022-27147", "GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a use-after-free vulnerability in function gf_node_get_attribute_by_tag.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2109"], ["2022", "CVE-2022-32939", "The issue was addressed with improved bounds checks. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/h26forge/h26forge", "No PoCs from references."], ["2022", "CVE-2022-2947", "Altair HyperView Player versions 2021.1.0.27 and prior perform operations on a memory buffer but can read from or write to a memory location outside of the intended boundary of the buffer. This hits initially as a read access violation, leading to a memory corruption situation.", "No PoCs found on GitHub currently.", "https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01"], ["2022", "CVE-2022-44037", "An access control issue in APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights without authenticating allows him to perform multiple attacks, such as attacking wireless network in the product's range.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037"], ["2022", "CVE-2022-24029", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the rp-pppoe.so binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-2543", "The Visual Portfolio, Photo Gallery & Post Grid WordPress plugin before 2.18.0 does not have proper authorisation checks in some of its REST endpoints, allowing unauthenticated users to call them and inject arbitrary CSS in arbitrary saved layouts", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8"], ["2022", "CVE-2022-0446", "The Simple Banner WordPress plugin before 2.12.0 does not properly sanitize its \"Simple Banner Text\" Settings allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581"], ["2022", "CVE-2022-1829", "The Inline Google Maps WordPress plugin through 5.11 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b"], ["2022", "CVE-2022-34031", "Nginx NJS v0.7.5 was discovered to contain a segmentation violation via njs_value_to_number at src/njs_value_conversion.h.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/523"], ["2022", "CVE-2022-25345", "All versions of package @discordjs/opus are vulnerable to Denial of Service (DoS) when trying to encode using an encoder with zero channels, or a non-initialized buffer. This leads to a hard crash.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100"], ["2022", "CVE-2022-36074", "Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41684", "A heap out of bounds read vulnerability exists in the OpenImageIO master-branch-9aeece7a when parsing the image file directory part of a PSD image file. A specially-crafted .psd file can cause a read of arbitrary memory address which can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632"], ["2022", "CVE-2022-43781", "There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled \u201cAllow public signup\u201d.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-23498", "Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including `grafana_session`. As a result, any user that queries a datasource where the caching is enabled can acquire another user\u2019s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2403", "A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate.", "https://github.com/ARPSyndicate/cvemon https://github.com/sfowl/configmap-cleaner", "No PoCs from references."], ["2022", "CVE-2022-0697", "Open Redirect in GitHub repository archivy/archivy prior to 1.7.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b"], ["2022", "CVE-2022-47388", "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-0506", "Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f"], ["2022", "CVE-2022-37089", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function EditMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2"], ["2022", "CVE-2022-0994", "The Hummingbird WordPress plugin before 3.3.2 does not sanitise and escape the Config Name, which could allow high privilege users, such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a"], ["2022", "CVE-2022-24169", "Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formIPMacBindAdd. This vulnerability allows attackers to cause a Denial of Service (DoS) via the IPMacBindRule parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-33711", "Improper validation of integrity check vulnerability in Samsung USB Driver Windows Installer for Mobile Phones prior to version 1.7.56.0 allows local attackers to delete arbitrary directory using directory junction.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-31585", "The umeshpatil-dev/Home__internet repository through 2020-08-28 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-37209", "JFinal CMS 5.1.0 is affected by: SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/AgainstTheLight/CVE-2022-37209 https://github.com/AgainstTheLight/CVE-2022-37210 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit", "https://github.com/AgainstTheLight/CVE-2022-37209/tree/main https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md"], ["2022", "CVE-2022-0885", "The Member Hero WordPress plugin through 1.0.9 lacks authorization checks, and does not validate the a request parameter in an AJAX action, allowing unauthenticated users to call arbitrary PHP functions with no arguments.", "https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df"], ["2022", "CVE-2022-2980", "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea"], ["2022", "CVE-2022-29303", "SolarView Compact ver.6.00 was discovered to contain a command injection vulnerability via conf_mail.php.", "https://github.com/1f3lse/CVE-2022-29303 https://github.com/20142995/Goby https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Chocapikk/CVE-2022-29303 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/W01fh4cker/Serein https://github.com/WhooAmii/POC_to_review https://github.com/d4n-sec/d4n-sec.github.io https://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/CVE-2022-29303 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xaitax/cisa-catalog-known-vulnerabilities https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing"], ["2022", "CVE-2022-31705", "VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.", "https://github.com/ARPSyndicate/cvemon https://github.com/Wi1L-Y/News https://github.com/WinMin/awesome-vm-exploit https://github.com/aneasystone/github-trending https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/s0duku/cve-2022-31705 https://github.com/tanjiti/sec_profile https://github.com/whoforget/CVE-POC https://github.com/xairy/vmware-exploitation https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-31494", "LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php action XSS.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-31806", "In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.", "https://github.com/ARPSyndicate/cvemon https://github.com/ic3sw0rd/Codesys_V2_Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-27180", "Uncontrolled search path in the Intel(R) MacCPUID software before version 3.2 may allow an authenticated user to potentially enable escalation of privilege via local access.", "https://github.com/punggawacybersecurity/CVE-List", "No PoCs from references."], ["2022", "CVE-2022-41404", "An issue in the fetch() method in the BasicProfile class of org.ini4j before v0.5.4 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.", "https://github.com/veracode/ini4j_unpatched_DoS", "https://sourceforge.net/p/ini4j/bugs/56/"], ["2022", "CVE-2022-25314", "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25314 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-23589", "Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2683", "A vulnerability, which was classified as problematic, was found in SourceCodester Simple Food Ordering System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument email/password with the input \"> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205671.", "No PoCs found on GitHub currently.", "https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md https://vuldb.com/?id.205671"], ["2022", "CVE-2022-0786", "The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30"], ["2022", "CVE-2022-0417", "Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a"], ["2022", "CVE-2022-30469", "In Afian Filerun 20220202, lack of sanitization of the POST parameter \"metadata[]\" in `/?module=fileman§ion=get&page=grid` leads to SQL injection.", "No PoCs found on GitHub currently.", "https://github.com/blockomat2100/PoCs/blob/main/filerun/CVE-2022-30469.md"], ["2022", "CVE-2022-0557", "OS Command Injection in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/cr0ss2018/cr0ss2018 https://github.com/enesamaafkolan/enesamaafkolan https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/ezelnur6327/ezelnur6327", "http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8 https://www.exploit-db.com/exploits/50768"], ["2022", "CVE-2022-27351", "Zoo Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /public_html/apply_vacancy. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md"], ["2022", "CVE-2022-1938", "The Awin Data Feed WordPress plugin before 1.8 does not sanitise and escape a header when processing request to generate analytics data, allowing unauthenticated users to perform Stored Cross-Site Scripting attacks against a logged in admin viewing the plugin's settings", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa"], ["2022", "CVE-2022-41544", "GetSimple CMS v3.3.16 was discovered to contain a remote code execution (RCE) vulnerability via the edited_file parameter in admin/theme-edit.php.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/yosef0x01/CVE-2022-41544", "http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html"], ["2022", "CVE-2022-43441", "A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645"], ["2022", "CVE-2022-33740", "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24138", "IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has \"rwx\" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).", "https://github.com/ARPSyndicate/cvemon https://github.com/tomerpeled92/CVE", "https://github.com/tomerpeled92/CVE/"], ["2022", "CVE-2022-0775", "The WooCommerce WordPress plugin before 6.2.1 does not have proper authorisation check when deleting reviews, which could allow any authenticated users, such as subscriber to delete arbitrary comment", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/"], ["2022", "CVE-2022-40898", "An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.", "https://github.com/ARPSyndicate/cvemon https://github.com/GitHubForSnap/matrix-commander-gael https://github.com/SOOS-FJuarez/multi-branches https://github.com/fredrkl/trivy-demo https://github.com/jbugeja/test-repo", "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"], ["2022", "CVE-2022-25076", "TOTOLink A800R V4.1.2cu.5137_B20200730 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A800R/README.md"], ["2022", "CVE-2022-34093", "Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wagnerdracha/ProofOfConcept", "https://github.com/edmarmoretti/i3geo/issues/4 https://github.com/saladesituacao/i3geo/issues/4 https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44"], ["2022", "CVE-2022-43663", "An integer conversion vulnerability exists in the SORBAx64.dll RecvPacket functionality of WellinTech KingHistorian 35.01.00.05. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.", "https://github.com/karimhabush/cyberowl", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674"], ["2022", "CVE-2022-44003", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-22587", "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SoftwareDesignLab/automated_cve_severity_analysis https://github.com/b1n4r1b01/n-days", "No PoCs from references."], ["2022", "CVE-2022-22616", "This issue was addressed with improved checks. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A maliciously crafted ZIP archive may bypass Gatekeeper checks.", "https://github.com/ARPSyndicate/cvemon https://github.com/ZWDeJun/ZWDeJun https://github.com/d-rn/vulBox https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/jhftss/POC", "No PoCs from references."], ["2022", "CVE-2022-20713", "A vulnerability in the VPN web client services component of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct browser-based attacks against users of an affected device. This vulnerability is due to improper validation of input that is passed to the VPN web client services component before being returned to the browser that is in use. An attacker could exploit this vulnerability by persuading a user to visit a website that is designed to pass malicious requests to a device that is running Cisco ASA Software or Cisco FTD Software and has web services endpoints supporting VPN features enabled. A successful exploit could allow the attacker to reflect malicious input from the affected device to the browser that is in use and conduct browser-based attacks, including cross-site scripting attacks. The attacker could not directly impact the affected device.", "https://github.com/karimhabush/cyberowl", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO"], ["2022", "CVE-2022-1788", "Due to missing checks the Change Uploaded File Permissions WordPress plugin through 4.0.0 is vulnerable to CSRF attacks. This can be used to change the file and folder permissions of any folder. This could be problematic when specific files like ini files are made readable for everyone due to this.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462"], ["2022", "CVE-2022-0876", "The Social comments by WpDevArt WordPress plugin before 2.5.0 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a"], ["2022", "CVE-2022-0936", "Cross-site Scripting (XSS) - Stored in GitHub repository autolab/autolab prior to 2.8.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/90701766-bfed-409e-b3dd-6ff884373968"], ["2022", "CVE-2022-30948", "Jenkins Mercurial Plugin 2.16 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2833", "Endless Infinite loop in Blender-thumnailing due to logical bugs.", "https://github.com/5angjun/5angjun https://github.com/ARPSyndicate/cvemon", "https://developer.blender.org/T99711"], ["2022", "CVE-2022-22756", "If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.mozilla.org/show_bug.cgi?id=1317873 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31527", "The Wildog/flask-file-server repository through 2020-02-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20653", "A vulnerability in the DNS-based Authentication of Named Entities (DANE) email verification component of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling in DNS name resolution by the affected software. An attacker could exploit this vulnerability by sending specially formatted email messages that are processed by an affected device. A successful exploit could allow the attacker to cause the device to become unreachable from management interfaces or to process additional email messages for a period of time until the device recovers, resulting in a DoS condition. Continued attacks could cause the device to become completely unavailable, resulting in a persistent DoS condition.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1559", "The Clipr WordPress plugin through 1.2.3 does not sanitise and escape its API Key settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166530/ https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c"], ["2022", "CVE-2022-41925", "A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node\u2019s Tailscale environment variables. An attacker with access to the peer API on a node could use that access to read the node\u2019s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user\u2019s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop. All Tailscale clients prior to version v1.32.3 are affected. Upgrade to v1.32.3 or later to remediate the issue.", "No PoCs found on GitHub currently.", "https://emily.id.au/tailscale https://tailscale.com/security-bulletins/#ts-2022-005"], ["2022", "CVE-2022-25136", "A command injection vulnerability in the function meshSlaveUpdate of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-2730", "Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a81f39ab-092b-4941-b9ca-c4c8f2191504"], ["2022", "CVE-2022-20841", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit", "No PoCs from references."], ["2022", "CVE-2022-36256", "A SQL injection vulnerability in Stocks.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as \"productcode\".", "No PoCs found on GitHub currently.", "https://gist.github.com/ziyishen97/0fd90a5939ffb401e8a74f4a415e1610 https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-25027", "The Forgotten Password functionality of Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to bypass authentication and access restricted pages by validating the user's session token when the \"Password forgotten?\" button is clicked.", "No PoCs found on GitHub currently.", "https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/"], ["2022", "CVE-2022-39028", "telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a \"telnet/tcp server failing (looping), service terminated\" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.", "No PoCs found on GitHub currently.", "https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html"], ["2022", "CVE-2022-0724", "Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062"], ["2022", "CVE-2022-0827", "The Bestbooks WordPress plugin through 2.6.3 does not sanitise and escape some parameters before using them in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be"], ["2022", "CVE-2022-2922", "Relative Path Traversal in GitHub repository dnnsoftware/dnn.platform prior to 9.11.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703"], ["2022", "CVE-2022-43931", "Out-of-bounds write vulnerability in Remote Desktop Functionality in Synology VPN Plus Server before 1.4.3-0534 and 1.4.4-0635 allows remote attackers to execute arbitrary commands via unspecified vectors.", "https://github.com/Threekiii/CVE", "No PoCs from references."], ["2022", "CVE-2022-22647", "This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. A person with access to a Mac may be able to bypass Login Window.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29170", "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn\u2019t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/yijikeji/CVE-2022-29170", "No PoCs from references."], ["2022", "CVE-2022-44283", "AVS Audio Converter 10.3 is vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html"], ["2022", "CVE-2022-22707", "In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jreisinger/checkip", "No PoCs from references."], ["2022", "CVE-2022-31576", "The heidi-luong1109/shackerpanel repository through 2021-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41974", "multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/Mr-xn/CVE-2022-3328 https://github.com/fkie-cad/nvd-json-data-feeds", "http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"], ["2022", "CVE-2022-1508", "An out-of-bounds read flaw was found in the Linux kernel\u2019s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110"], ["2022", "CVE-2022-1699", "Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3024b2bb-50ca-46a2-85db-1cc916791cda"], ["2022", "CVE-2022-0967", "Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/iohehe/awesome-xss", "http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a"], ["2022", "CVE-2022-30919", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the Edit_BasicSSID_5G parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/13"], ["2022", "CVE-2022-2862", "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765"], ["2022", "CVE-2022-0664", "Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves", "https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac"], ["2022", "CVE-2022-40989", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'bandwidth WORD dlrate <1-9999> dlceil <1-9999> ulrate <1-9999> ulceil <1-9999> priority (highest|high|normal|low|lowest)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-36316", "When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-36087", "OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7"], ["2022", "CVE-2022-27062", "AeroCMS v0.0.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability via add_post.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Title text field.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc"], ["2022", "CVE-2022-21360", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon https://github.com/CodeIntelligenceTesting/jazzer", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26992", "Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-30014", "Lumidek Associates Simple Food Website 1.0 is vulnerable to Cross Site Request Forgery (CSRF) which allows anyone to takeover admin/moderater account.", "No PoCs found on GitHub currently.", "https://github.com/offsecin/bugsdisclose/blob/main/csrf"], ["2022", "CVE-2022-28783", "Improper validation of removing package name in Galaxy Themes prior to SMR May-2022 Release 1 allows attackers to uninstall arbitrary packages without permission. The patch adds proper validation logic for removing package name.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-28412", "Car Driving School Managment System v1.0 was discovered to contain a SQL injection vulnerability via /cdsms/classes/Master.php?f=delete_package.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md"], ["2022", "CVE-2022-36518", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function EditWlanMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8"], ["2022", "CVE-2022-22109", "In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim\u2019s browser when they open the \u201c/tasks\u201d page to view all the tasks.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109"], ["2022", "CVE-2022-24405", "OX App Suite through 7.10.6 allows OS Command Injection via a serialized Java class to the Documentconverter API.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Jul/11"], ["2022", "CVE-2022-35771", "Windows Defender Credential Guard Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html"], ["2022", "CVE-2022-26500", "Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Y4er/dotnet-deserialization https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/musil/100DaysOfHomeLab2022 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sinsinology/CVE-2022-26500", "No PoCs from references."], ["2022", "CVE-2022-24545", "Windows Kerberos Remote Code Execution Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html"], ["2022", "CVE-2022-37734", "graphql-java before19.0 is vulnerable to Denial of Service. An attacker can send a malicious GraphQL query that consumes CPU resources. The fixed versions are 19.0 and later, 18.3, and 17.4, and 0.0.0-2022-07-26T05-45-04-226aabd9.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26440", "In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420037; Issue ID: GN20220420037.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-3343", "The WPQA Builder WordPress plugin before 5.9.3 (which is a companion plugin used with Discy and Himer Discy WordPress themes) incorrectly tries to validate that a user already follows another in the wpqa_following_you_ajax action, allowing a user to inflate their score on the site by having another user send repeated follow actions to them.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a"], ["2022", "CVE-2022-22049", "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168069/Windows-sxssrv-BaseSrvActivationContextCacheDuplicateUnicodeString-Heap-Buffer-Overflow.html"], ["2022", "CVE-2022-41139", "MITRE CALDERA 4.1.0 allows stored XSS via app.contact.gist (aka the gist contact configuration field), leading to execution of arbitrary commands on agents.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45"], ["2022", "CVE-2022-36458", "TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the command parameter in the function setTracerouteCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md"], ["2022", "CVE-2022-30154", "Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Austin-Src/CVE-Checker", "No PoCs from references."], ["2022", "CVE-2022-47435", "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Olive Design WP-OliveCart plugin <=\u00a01.1.3 versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/me2nuk/me2nuk", "No PoCs from references."], ["2022", "CVE-2022-32051", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc, week, sTime, eTime parameters in the function FUN_004133c4.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules"], ["2022", "CVE-2022-41028", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no vpn schedule name1 WORD name2 WORD policy (failover|backup) description (WORD|null)' command template.", "https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-21331", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30045", "An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.", "No PoCs found on GitHub currently.", "https://sourceforge.net/p/ezxml/bugs/29/"], ["2022", "CVE-2022-28443", "UCMS v1.6 was discovered to contain an arbitrary file deletion vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-46648", "ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31269", "Nortek Linear eMerge E3-Series devices through 0.32-09c place admin credentials in /test.txt that allow an attacker to open a building's doors. (This occurs in situations where the CVE-2019-7271 default credentials have been changed.)", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/CVE-2022-31269 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/omarhashem123/CVE-2022-31269 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html https://eg.linkedin.com/in/omar-1-hashem https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c"], ["2022", "CVE-2022-1217", "The Custom TinyMCE Shortcode Button WordPress plugin through 1.1 does not sanitise and escape the PHP_SELF variable before outputting it back in an attribute in an admin page, leading to Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c"], ["2022", "CVE-2022-46499", "Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_admin_view_single_patient.php.", "https://github.com/ASR511-OO7/CVE-2022-46499", "No PoCs from references."], ["2022", "CVE-2022-3083", "All versions of Landis+Gyr E850 (ZMQ200) are vulnerable to CWE-784: Reliance on Cookies Without Validation and Integrity. The device's web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39974", "WASM3 v0.5.0 was discovered to contain a segmentation fault via the component op_Select_i32_srs in wasm3/source/m3_exec.h.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/wasm3/wasm3/issues/379"], ["2022", "CVE-2022-28991", "Multi Store Inventory Management System v1.0 was discovered to contain an information disclosure vulnerability which allows attackers to access sensitive files.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html"], ["2022", "CVE-2022-26780", "Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_init` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481"], ["2022", "CVE-2022-30105", "In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.", "No PoCs found on GitHub currently.", "https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root"], ["2022", "CVE-2022-21271", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32391", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/actions/view_action.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32391.md"], ["2022", "CVE-2022-24986", "KDE KCron through 21.12.2 uses a temporary file in /tmp when saving, but reuses the filename during an editing session. Thus, someone watching it be created the first time could potentially intercept the file the following time, enabling that person to run unauthorized commands.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41168", "Due to lack of proper memory management, when a victim opens a manipulated CATIA5 Part (.catpart, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-36928", "Zoom for Android clients before version 5.13.0 contain a path traversal vulnerability. A third party app could exploit this vulnerability to read and write to the Zoom application data directory.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ch0pin/related_work", "No PoCs from references."], ["2022", "CVE-2022-3130", "A vulnerability classified as critical has been found in codeprojects Online Driving School. This affects an unknown part of the file /login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-207873 was assigned to this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities", "https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md https://vuldb.com/?id.207873"], ["2022", "CVE-2022-42123", "A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17518"], ["2022", "CVE-2022-24736", "Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-26633", "Simple Student Quarterly Result/Grade System v1.0 was discovered to contain a SQL injection vulnerability via /sqgs/Actions.php.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50740"], ["2022", "CVE-2022-47945", "ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/altilunium/redtail", "No PoCs from references."], ["2022", "CVE-2022-0359", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def"], ["2022", "CVE-2022-30327", "An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The web interface is vulnerable to CSRF. An attacker can change the pre-shared key of the Wi-Fi router if the interface's IP address is known.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ https://research.nccgroup.com/?research=Technical+advisories"], ["2022", "CVE-2022-32222", "A cryptographic vulnerability exists on Node.js on linux in versions of 18.x prior to 18.40.0 which allowed a default path for openssl.cnf that might be accessible under some circumstances to a non-admin user instead of /etc/ssl as was the case in versions prior to the upgrade to OpenSSL 3.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/scovetta/omega-stracedb", "No PoCs from references."], ["2022", "CVE-2022-28721", "Certain HP Print Products are potentially vulnerable to Remote Code Execution.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4750", "The WP Responsive Testimonials Slider And Widget WordPress plugin through 1.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf"], ["2022", "CVE-2022-4610", "A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected by this issue is some unknown functionality. The manipulation leads to risky cryptographic algorithm. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216272.", "No PoCs found on GitHub currently.", "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"], ["2022", "CVE-2022-0219", "Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/CVE-2022-0219 https://github.com/Haxatron/Haxatron https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/binganao/vulns-2022 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/randomAnalyst/PoC-Fetcher https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e"], ["2022", "CVE-2022-0188", "The CMP WordPress plugin before 4.0.19 allows any user, even not logged in, to arbitrarily change the coming soon page layout.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332"], ["2022", "CVE-2022-21282", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-24975", "** DISPUTED ** The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the \"GitBleed\" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option. Note: This has been disputed by multiple 3rd parties who believe this is an intended feature of the git binary and does not pose a security risk.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-28962", "Online Sports Complex Booking System 1.0 is vulnerable to SQL Injection via /scbs/classes/Users.php?f=delete_client.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-39987", "A Command injection vulnerability in RaspAP 2.8.0 thru 2.9.2 allows an authenticated attacker to execute arbitrary OS commands as root via the \"entity\" POST parameters in /ajax/networking/get_wgkey.php.", "https://github.com/miguelc49/CVE-2022-39987-1 https://github.com/miguelc49/CVE-2022-39987-2 https://github.com/miguelc49/CVE-2022-39987-3", "https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2"], ["2022", "CVE-2022-24676", "update_code in Admin.php in HYBBS2 through 2.3.2 allows arbitrary file upload via a crafted ZIP archive.", "No PoCs found on GitHub currently.", "https://github.com/hyyyp/HYBBS2/issues/33"], ["2022", "CVE-2022-1175", "Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes.", "https://github.com/ARPSyndicate/cvemon https://github.com/Greenwolf/CVE-2022-1175 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html"], ["2022", "CVE-2022-3070", "The Generate PDF WordPress plugin before 3.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c"], ["2022", "CVE-2022-28873", "A vulnerability affecting F-Secure SAFE browser was discovered. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks.", "https://github.com/KirtiRamchandani/KirtiRamchandani https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35413", "WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/StarCrossPortal/scalpel https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb"], ["2022", "CVE-2022-24767", "GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.", "https://github.com/9069332997/session-1-full-stack", "No PoCs from references."], ["2022", "CVE-2022-1064", "SQL injection through marking blog comments on bulk as spam in GitHub repository forkcms/forkcms prior to 5.11.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40"], ["2022", "CVE-2022-4802", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956"], ["2022", "CVE-2022-21393", "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java VM. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-35881", "Four format string injection vulnerabilities exist in the UPnP logging functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted UPnP negotiation can lead to memory corruption, information disclosure, and denial of service. An attacker can host a malicious UPnP service to trigger these vulnerabilities.This vulnerability arises from format string injection via `errorCode` and `errorDescription` XML tags, as used within the `DoUpdateUPnPbyService` action handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583"], ["2022", "CVE-2022-23296", "Windows Installer Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/RonnieSalomonsen/My-CVEs", "No PoCs from references."], ["2022", "CVE-2022-23107", "Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39404", "Vulnerability in the MySQL Installer product of Oracle MySQL (component: Installer: General). Supported versions that are affected are 1.6.3 and prior. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Installer executes to compromise MySQL Installer. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Installer accessible data as well as unauthorized read access to a subset of MySQL Installer accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Installer. CVSS 3.1 Base Score 4.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L).", "https://github.com/ycdxsb/ycdxsb", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-28770", "Due to insufficient input validation, SAPUI5 library(vbm) - versions 750, 753, 754, 755, 75, allows an unauthenticated attacker to inject a script into the URL and execute code. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.", "https://github.com/karimhabush/cyberowl", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-45483", "Lazy Mouse allows an attacker (in a man in the middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "No PoCs found on GitHub currently.", "https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/"], ["2022", "CVE-2022-45712", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsForward function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/r1pG4cori"], ["2022", "CVE-2022-47757", "In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution.", "https://github.com/Ch0pin/related_work", "No PoCs from references."], ["2022", "CVE-2022-0248", "The Contact Form Submissions WordPress plugin before 1.7.3 does not sanitise and escape additional fields in contact form requests before outputting them in the related submission. As a result, unauthenticated attacker could perform Cross-Site Scripting attacks against admins viewing the malicious submission", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89"], ["2022", "CVE-2022-23047", "Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the \"Site/Organization Name\",\"Site Title\" and \"Site Header\" parameters while updating the site settings on \"/exponentcms/administration/configure_site\"", "No PoCs found on GitHub currently.", "https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459 https://fluidattacks.com/advisories/franklin/"], ["2022", "CVE-2022-24924", "An improper access control in LiveWallpaperService prior to versions 3.0.9.0 allows to create a specific named system directory without a proper permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/heegong/CVE-2022-24924 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-45652", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the startIp parameter in the formSetPPTPServer function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_startIp/formSetPPTPServer_startIp.md"], ["2022", "CVE-2022-38628", "Nortek Linear eMerge E3-Series 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e were discovered to contain a cross-site scripting (XSS) vulnerability which is chained with a local session fixation. This vulnerability allows attackers to escalate privileges via unspecified vectors.", "https://github.com/ARPSyndicate/cvemon https://github.com/JoshMorrison99/my-nuceli-templates", "https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt"], ["2022", "CVE-2022-3021", "The Slickr Flickr WordPress plugin through 2.8.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e"], ["2022", "CVE-2022-24627", "An issue was discovered in AudioCodes Device Manager Express through 7.8.20002.47752. It is an unauthenticated SQL injection in the p parameter of the process_login.php login form.", "https://github.com/tr3ss/newclei", "No PoCs from references."], ["2022", "CVE-2022-47854", "i-librarian 4.10 is vulnerable to Arbitrary file upload in ajaxsupplement.php.", "No PoCs found on GitHub currently.", "https://github.com/mkucej/i-librarian/issues/155 https://github.com/mkucej/i-librarian/issues/155#issue-1501906608"], ["2022", "CVE-2022-1223", "Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.", "https://github.com/gwyomarch/CVE-Collection", "https://huntr.dev/bounties/baec4c23-2466-4b13-b3c0-eaf1d000d4ab"], ["2022", "CVE-2022-3326", "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97"], ["2022", "CVE-2022-29958", "JTEKT TOYOPUC PLCs through 2022-04-29 do not ensure data integrity. They utilize the unauthenticated CMPLink/TCP protocol for engineering purposes, including downloading projects and control logic to the PLC. Control logic is downloaded to the PLC on a block-by-block basis with a given memory address and a blob of machine code. The logic that is downloaded to the PLC is not cryptographically authenticated, allowing an attacker to execute arbitrary machine code on the PLC's CPU module in the context of the runtime. In the case of the PC10G-CPU, and likely for other CPU modules of the TOYOPUC family, a processor without MPU or MMU is used and this no memory protection or privilege-separation capabilities are available, giving an attacker full control over the CPU.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-4546", "The Mapwiz WordPress plugin through 1.0.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8"], ["2022", "CVE-2022-30131", "Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/jercle/azgo", "No PoCs from references."], ["2022", "CVE-2022-21245", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32034", "Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the items parameter in the function formdelMasteraclist.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist"], ["2022", "CVE-2022-23340", "Joplin 2.6.10 allows remote attackers to execute system commands through malicious code in user search results.", "No PoCs found on GitHub currently.", "https://github.com/laurent22/joplin/issues/6004"], ["2022", "CVE-2022-21305", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/CanisYue/sftwretesting https://github.com/EngineeringSoftware/jattack", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-45415", "When downloading an HTML file, if the title of the page was formatted as a filename with a malicious extension, Firefox may have saved the file with that extension, leading to possible system compromise if the downloaded file was later ran. This vulnerability affects Firefox < 107.", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.mozilla.org/show_bug.cgi?id=1793551"], ["2022", "CVE-2022-32174", "In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32174"], ["2022", "CVE-2022-34478", "The ms-msdt, search, and search-ms protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Thunderbird), so in this release Thunderbird has blocked these protocols from prompting the user to open them. *This bug only affects Thunderbird on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.", "https://github.com/j00sean/CVE-2022-44666", "No PoCs from references."], ["2022", "CVE-2022-43288", "Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the order_by parameter at /rukovoditel/index.php?module=logs/view&type=php.", "No PoCs found on GitHub currently.", "https://github.com/Kubozz/rukovoditel-3.2.1/issues/2"], ["2022", "CVE-2022-43119", "A cross-site scripting (XSS) vulnerability in Clansphere CMS v2011.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username parameter.", "No PoCs found on GitHub currently.", "https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md"], ["2022", "CVE-2022-4797", "Improper Restriction of Excessive Authentication Attempts in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b"], ["2022", "CVE-2022-3266", "An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.", "https://github.com/h26forge/h26forge", "No PoCs from references."], ["2022", "CVE-2022-33189", "An OS command injection vulnerability exists in the XCMD setAlexa functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. A specially-crafted XCMD can lead to arbitrary command execution. An attacker can send a malicious XML payload to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558"], ["2022", "CVE-2022-35485", "OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x703969.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39800", "SAP BusinessObjects BI LaunchPad - versions 420, 430, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the user inputs while interacting on the network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-42275", "NVIDIA BMC IPMI handler allows an unauthenticated host to write to a host SPI flash bypassing secureboot protections. This may lead to a loss of integrity and denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-26565", "A cross-site scripting (XSS) vulnerability in Totaljs all versions before commit 95f54a5commit, allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Name text field when creating a new page.", "No PoCs found on GitHub currently.", "https://bug.pocas.kr/2022/03/01/2022-03-05-CVE-2022-26565/ https://github.com/totaljs/cms/issues/35"], ["2022", "CVE-2022-37611", "Prototype pollution vulnerability in tschaub gh-pages 3.1.0 via the partial variable in util.js.", "No PoCs found on GitHub currently.", "https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L11 https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L16"], ["2022", "CVE-2022-33098", "Magnolia CMS v6.2.19 was discovered to contain a cross-site scripting (XSS) vulnerability via the Edit Contact function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ozozuz/Mangolia-CMS-Stored-XSS", "No PoCs from references."], ["2022", "CVE-2022-35605", "A SQL injection vulnerability in UserDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as 'users', 'pass', etc.", "No PoCs found on GitHub currently.", "https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-24571", "Car Driving School Management System v1.0 is affected by SQL injection in the login page. An attacker can use simple SQL login injection payload to get admin access.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24571"], ["2022", "CVE-2022-45996", "Tenda W20E V16.01.0.6(3392) is vulnerable to Command injection via cmd_get_ping_output.", "No PoCs found on GitHub currently.", "https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2"], ["2022", "CVE-2022-47893", "There is a remote code execution vulnerability that affects all versions of NetMan 204. A remote attacker could upload a firmware file containing a webshell, that could allow him to execute arbitrary code as root.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-37700", "Zentao Demo15 is vulnerable to Directory Traversal. The impact is: obtain sensitive information (remote). The component is: URL : view-source:https://demo15.zentao.pm/user-login.html/zentao/index.php?mode=getconfig.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@sc0p3hacker/cve-2022-37700-directory-transversal-in-zentao-easy-soft-alm-2573c1f0fc21"], ["2022", "CVE-2022-37803", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromAddressNat.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8"], ["2022", "CVE-2022-45504", "An issue in the component tpi_systool_handle(0) (/goform/SysToolRestoreSet) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md"], ["2022", "CVE-2022-32065", "An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.", "https://github.com/ARPSyndicate/cvemon https://github.com/ChamalBandara/CVEs", "https://gitee.com/y_project/RuoYi/issues/I57IME https://github.com/yangzongzhuan/RuoYi/issues/118"], ["2022", "CVE-2022-23080", "In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23080"], ["2022", "CVE-2022-4686", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637"], ["2022", "CVE-2022-29909", "Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1755081"], ["2022", "CVE-2022-43148", "rtf2html v0.2.0 was discovered to contain a heap overflow in the component /rtf2html/./rtf_tools.h.", "No PoCs found on GitHub currently.", "https://github.com/lvu/rtf2html/issues/11"], ["2022", "CVE-2022-27658", "Under certain conditions, SAP Innovation management - version 2.0, allows an attacker to access information which could lead to information gathering for further exploits and attacks.", "No PoCs found on GitHub currently.", "https://launchpad.support.sap.com/#/notes/3165856"], ["2022", "CVE-2022-21354", "Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iStore accessible data as well as unauthorized read access to a subset of Oracle iStore accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28426", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/pagerole.php&action=edit&roleid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-35846", "An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiTester Telnet port 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to guess the credentials of an admin user via a brute force attack.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24431", "All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950"], ["2022", "CVE-2022-1332", "One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-3237", "The WP Contact Slider WordPress plugin before 2.4.8 does not sanitize and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e"], ["2022", "CVE-2022-4675", "The Mongoose Page Plugin WordPress plugin before 1.9.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052"], ["2022", "CVE-2022-24910", "A buffer overflow vulnerability exists in the httpd parse_ping_result API functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471"], ["2022", "CVE-2022-23073", "In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the \u2018Name\u2019 parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23073"], ["2022", "CVE-2022-2379", "The Easy Student Results WordPress plugin through 2.2.8 lacks authorisation in its REST API, allowing unauthenticated users to retrieve information related to the courses, exams, departments as well as student's grades and PII such as email address, physical address, phone number etc", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/soxoj/information-disclosure-writeups-and-pocs", "https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6"], ["2022", "CVE-2022-45666", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md"], ["2022", "CVE-2022-28907", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the hosttime function in /setting/NTPSyncWithHost.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/5"], ["2022", "CVE-2022-24613", "metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/drewnoakes/metadata-extractor/issues/561"], ["2022", "CVE-2022-24582", "Accounting Journal Management 1.0 is vulnerable to XSS-PHPSESSID-Hijacking. The parameter manage_user from User lists is vulnerable to XSS-Stored and PHPSESSID attacks. The malicious user can attack the system by using the already session which he has from inside and outside of the network.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management"], ["2022", "CVE-2022-26716", "A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37462", "A stored Cross-Site Scripting (XSS) vulnerability in the Chat gadget in Upstream Works Agent Desktop for Cisco Finesse through 4.2.12 and 5.0 allows remote attackers to inject arbitrary web script or HTML via AttachmentId in the file-upload details.", "No PoCs found on GitHub currently.", "https://www.campusguard.com/post/going-beyond-pen-testing-to-identify-zero-day-exploits"], ["2022", "CVE-2022-40103", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formSetAutoPing function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-1281", "The Photo Gallery WordPress plugin through 1.6.3 does not properly escape the $_POST['filter_tag'] parameter, which is appended to an SQL query, making SQL Injection attacks possible.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de"], ["2022", "CVE-2022-3015", "A vulnerability, which was classified as problematic, has been found in oretnom23 Fast Food Ordering System. This issue affects some unknown processing of the file admin/?page=reports. The manipulation of the argument date leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-207425 was assigned to this vulnerability.", "https://github.com/karimhabush/cyberowl", "https://vuldb.com/?id.207425"], ["2022", "CVE-2022-4836", "The Breadcrumb WordPress plugin before 1.5.33 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14"], ["2022", "CVE-2022-3155", "When saving or opening an email attachment on macOS, Thunderbird did not set attribute com.apple.quarantine on the received file. If the received file was an application and the user attempted to open it, then the application was started immediately without asking the user to confirm. This vulnerability affects Thunderbird < 102.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/kohnakagawa/kohnakagawa", "https://bugzilla.mozilla.org/show_bug.cgi?id=1789061"], ["2022", "CVE-2022-40043", "Centreon v20.10.18 was discovered to contain a SQL injection vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations.", "No PoCs found on GitHub currently.", "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/"], ["2022", "CVE-2022-32247", "SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the User inputs while interacting on the Network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-23133", "An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2239", "The Request a Quote WordPress plugin before 2.3.9 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e"], ["2022", "CVE-2022-47732", "In Yeastar N412 and N824 Configuration Panel 42.x and 45.x, an unauthenticated attacker can create backup file and download it, revealing admin hash, allowing, once cracked, to login inside the Configuration Panel, otherwise, replacing the hash in the archive and restoring it on the device which will change admin password granting access to the device.", "No PoCs found on GitHub currently.", "https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/"], ["2022", "CVE-2022-21127", "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/codexlynx/hardware-attacks-state-of-the-art", "No PoCs from references."], ["2022", "CVE-2022-45637", "An insecure password reset issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 service via insecure expiry mechanism.", "https://github.com/ARPSyndicate/cvemon https://github.com/WithSecureLabs/megafeis-palm", "https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637"], ["2022", "CVE-2022-2328", "The Flexi Quote Rotator WordPress plugin through 0.9.4 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552"], ["2022", "CVE-2022-4624", "The GS Logo Slider WordPress plugin before 3.3.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51"], ["2022", "CVE-2022-29539", "resi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\\r\\ commands) and inject arbitrary system commands with the privileges of the application user.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-45934", "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "https://github.com/ARPSyndicate/cvemon https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934 https://github.com/Trinadh465/linux-4.1.15_CVE-2022-45934 https://github.com/Trinadh465/linux-4.19.72_CVE-2022-45934 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/linux-3.0.35_CVE-2022-45934 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-28956", "An issue in the getcfg.php component of D-Link DIR816L_FW206b01 allows attackers to access the device via a crafted payload.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-35536", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: qos_bandwith and qos_dat, which leads to command injection in page /qos.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi"], ["2022", "CVE-2022-40152", "Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.", "https://github.com/mosaic-hgw/WildFly https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-42286", "DGX A100 SBIOS contains a vulnerability in Bds, which may lead to code execution, denial of service, or escalation of privileges.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-45874", "Huawei Aslan Children's Watch has an improper authorization vulnerability. Successful exploit could allow the attacker to access certain file.", "https://github.com/ARPSyndicate/cvemon https://github.com/liyansong2018/CVE", "No PoCs from references."], ["2022", "CVE-2022-24702", "** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in WinAPRS 2.9.0. A buffer overflow in the VHF KISS TNC component allows a remote attacker to achieve remote code execution via malicious AX.25 packets over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "https://github.com/ARPSyndicate/cvemon https://github.com/Coalfire-Research/WinAPRS-Exploits https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/goldenscale/GS_GithubMirror https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-26607", "A remote code execution (RCE) vulnerability in baigo CMS v3.0-alpha-2 was discovered to allow attackers to execute arbitrary code via uploading a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/baigoStudio/baigoCMS/issues/9"], ["2022", "CVE-2022-1001", "The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its \"WordPress Target Version\" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb"], ["2022", "CVE-2022-1390", "The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://packetstormsecurity.com/files/166476/ https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990"], ["2022", "CVE-2022-3104", "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2"], ["2022", "CVE-2022-3295", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.4.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233"], ["2022", "CVE-2022-4867", "Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.0-beta1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa"], ["2022", "CVE-2022-29479", "On F5 BIG-IP 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, and F5 BIG-IQ Centralized Management all versions of 8.x and 7.x, when an IPv6 self IP address is configured and the ipv6.strictcompliance database key is enabled (disabled by default) on a BIG-IP system, undisclosed packets may cause decreased performance. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4764", "The Simple File Downloader WordPress plugin through 1.0.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70"], ["2022", "CVE-2022-30313", "Honeywell Experion PKS Safety Manager through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0051, there is a Honeywell Experion PKS Safety Manager multiple proprietary protocols with unauthenticated functionality issue. The affected components are characterized as: Honeywell Experion TCP (51000/TCP), Safety Builder (51010/TCP). The potential impact is: Manipulate controller state, Manipulate controller configuration, Manipulate controller logic, Manipulate controller files, Manipulate IO. The Honeywell Experion PKS Distributed Control System (DCS) Safety Manager utilizes several proprietary protocols for a wide variety of functionality, including process data acquisition, controller steering and configuration management. These protocols include: Experion TCP (51000/TCP) and Safety Builder (51010/TCP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocols in question. An attacker capable of invoking the protocols' functionalities could achieve a wide range of adverse impacts, including (but not limited to), the following: for Experion TCP (51000/TCP): Issue IO manipulation commands, Issue file read/write commands; and for Safety Builder (51010/TCP): Issue controller start/stop commands, Issue logic download/upload commands, Issue file read commands, Issue system time change commands. A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-26904", "Windows User Profile Service Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/bha-vin/Compromise-Windows-10 https://github.com/bha-vin/Windows-10", "No PoCs from references."], ["2022", "CVE-2022-24801", "Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted Web's HTTP 1.1 server and/or proxy and also pass requests through a different HTTP server and/or proxy. The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected. The issue has been addressed in Twisted 22.4.0rc1. Two workarounds are available: Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading them; or filter malformed requests by other means, such as configuration of an upstream proxy.", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2268", "The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7"], ["2022", "CVE-2022-44898", "The MsIo64.sys component in Asus Aura Sync through v1.07.79 does not properly validate input to IOCTL 0x80102040, 0x80102044, 0x80102050, and 0x80102054, allowing attackers to trigger a memory corruption and cause a Denial of Service (DoS) or escalate privileges via crafted IOCTL requests.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/"], ["2022", "CVE-2022-4775", "The GeoDirectory WordPress plugin before 2.2.22 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c"], ["2022", "CVE-2022-23173", "this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the \"Login menu - demo site\" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-32207", "When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.", "https://github.com/ARPSyndicate/cvemon https://github.com/JtMotoX/docker-trivy https://github.com/maxim12z/ECommerce https://github.com/neo9/fluentd", "http://seclists.org/fulldisclosure/2022/Oct/41"], ["2022", "CVE-2022-2279", "NULL Pointer Dereference in GitHub repository bfabiszewski/libmobi prior to 0.11.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/68c249e2-779d-4871-b7e3-851f03aca2de"], ["2022", "CVE-2022-28495", "TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is discovered to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "No PoCs found on GitHub currently.", "https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md"], ["2022", "CVE-2022-47663", "GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2360"], ["2022", "CVE-2022-24713", "regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.", "https://github.com/ARPSyndicate/cvemon https://github.com/De30/osv-scanner https://github.com/ItzSwirlz/CVE-2022-24713-POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anmalkov/osv-scanner https://github.com/engn33r/awesome-redos-security https://github.com/flaging/feed https://github.com/google/osv-scanner https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3115", "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33"], ["2022", "CVE-2022-29468", "A cross-site request forgery (CSRF) vulnerability exists in WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534"], ["2022", "CVE-2022-1010", "The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/PazDak/feathers-macos-detections", "https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b"], ["2022", "CVE-2022-1381", "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4"], ["2022", "CVE-2022-29528", "An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.", "https://github.com/eslerm/nvd-api-client", "No PoCs from references."], ["2022", "CVE-2022-37422", "Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45925", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The action xmlexport accepts the parameter requestContext. If this parameter is present, the response includes most of the HTTP headers sent to the server and some of the CGI variables like remote_adde and server_name, which is an information disclosure.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html http://seclists.org/fulldisclosure/2023/Jan/14 https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/"], ["2022", "CVE-2022-42046", "wfshbr64.sys and wfshbr32.sys specially crafted IOCTL allows arbitrary user to perform local privilege escalation", "https://github.com/ARPSyndicate/cvemon https://github.com/Live-Hack-CVE/CVE-2022-42046 https://github.com/gmh5225/awesome-game-security https://github.com/goldenscale/GS_GithubMirror https://github.com/k0mi-tg/CVE-POC https://github.com/kkent030315/CVE-2022-42046 https://github.com/manas3c/CVE-POC https://github.com/nanaroam/kaditaroam https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/kkent030315/CVE-2022-42046"], ["2022", "CVE-2022-24950", "A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3"], ["2022", "CVE-2022-2339", "With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef"], ["2022", "CVE-2022-30242", "Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.", "No PoCs found on GitHub currently.", "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security"], ["2022", "CVE-2022-26855", "Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability, leading to a denial of service.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities"], ["2022", "CVE-2022-23122", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-24841", "fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. There are no known workarounds for this issue.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39421", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).", "https://github.com/dlehgus1023/dlehgus1023", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-47632", "Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\\Razer\\Synapse3\\Service\\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html http://seclists.org/fulldisclosure/2023/Sep/6 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt"], ["2022", "CVE-2022-4724", "Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445"], ["2022", "CVE-2022-4827", "The WP Tiles WordPress plugin through 1.1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51"], ["2022", "CVE-2022-1041", "In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-47931", "IO FinNet tss-lib before 2.0.0 allows a collision of hash values.", "No PoCs found on GitHub currently.", "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b"], ["2022", "CVE-2022-26496", "In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.", "https://github.com/fkie-cad/nvd-json-data-feeds", "http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html https://lists.debian.org/nbd/2022/01/msg00037.html"], ["2022", "CVE-2022-40112", "TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable Buffer Overflow via the hostname parameter in binary /bin/boa.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md"], ["2022", "CVE-2022-34919", "The file upload wizard in Zengenti Contensis Classic before 15.2.1.79 does not correctly check that a user has authenticated. By uploading a crafted aspx file, it is possible to execute arbitrary commands.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ahajnik/CVE-2022-34919 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3004", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/461e5f8f-17cf-4be4-9149-111d0bd92d14"], ["2022", "CVE-2022-3395", "The WP All Export Pro WordPress plugin before 1.7.9 uses the contents of the cc_sql POST parameter directly as a database query, allowing users which has been given permission to run exports to execute arbitrary SQL statements, leading to a SQL Injection vulnerability. By default only users with the Administrator role can perform exports, but this can be delegated to lower privileged users as well.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0"], ["2022", "CVE-2022-1290", "Stored XSS in \"Name\", \"Group Name\" & \"Title\" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed"], ["2022", "CVE-2022-4664", "The Logo Slider WordPress plugin before 3.6.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39"], ["2022", "CVE-2022-28615", "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/Totes5706/TotesHTB https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/kasem545/vulnsearch", "No PoCs from references."], ["2022", "CVE-2022-28584", "It is found that there is a command injection vulnerability in the setWiFiWpsStart interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/8"], ["2022", "CVE-2022-2368", "Authentication Bypass by Spoofing in GitHub repository microweber/microweber prior to 1.2.20.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhienit2010/Vulnerability", "https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452"], ["2022", "CVE-2022-45677", "SQL Injection Vulnerability in tanujpatra228 Tution Management System (TMS) via the email parameter to processes/student_login.process.php.", "No PoCs found on GitHub currently.", "https://github.com/yukar1z0e/temp/blob/main/README.md"], ["2022", "CVE-2022-42235", "A Stored XSS issue in Student Clearance System v.1.0 allows the injection of arbitrary JavaScript in the Student registration form.", "https://github.com/ARPSyndicate/cvemon https://github.com/draco1725/Stored-XSS", "https://github.com/draco1725/Stored-XSS/blob/main/poc"], ["2022", "CVE-2022-39840", "Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a direct message (DM).", "No PoCs found on GitHub currently.", "https://github.com/Cotonti/Cotonti/issues/1660"], ["2022", "CVE-2022-1323", "The Discy WordPress theme before 5.0 lacks authorization checks then processing ajax requests to the discy_update_options action, allowing any logged in users (with privileges as low as Subscriber,) to change Theme options by sending a crafted POST request.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b"], ["2022", "CVE-2022-4446", "PHP Remote File Inclusion in GitHub repository tsolucio/corebos prior to 8.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/718f1be6-3834-4ef2-8134-907a52009894"], ["2022", "CVE-2022-29858", "Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/"], ["2022", "CVE-2022-28437", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=Admin&userid=3.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-21345", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-45515", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the entries parameter at /goform/addressNat.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md"], ["2022", "CVE-2022-28577", "It is found that there is a command injection vulnerability in the delParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/3"], ["2022", "CVE-2022-23091", "A particular case of memory sharing is mishandled in the virtual memory system. This is very similar to SA-21:08.vm, but with a different root cause.An unprivileged local user process can maintain a mapping of a page after it is freed, allowing that process to read private data belonging to other processes or the kernel.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-32074", "A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/reewardius/CVE-2022-32074", "No PoCs from references."], ["2022", "CVE-2022-37812", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the firewallEn parameter in the function formSetFirewallCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12"], ["2022", "CVE-2022-27498", "A directory traversal vulnerability exists in the TicketTemplateActions.aspx GetTemplateAttachment functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531"], ["2022", "CVE-2022-34578", "Open Source Point of Sale v3.3.7 was discovered to contain an arbitrary file upload vulnerability via the Update Branding Settings page.", "No PoCs found on GitHub currently.", "https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3"], ["2022", "CVE-2022-4506", "Unrestricted Upload of File with Dangerous Type in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942"], ["2022", "CVE-2022-3366", "The PublishPress Capabilities WordPress plugin before 2.5.2, PublishPress Capabilities Pro WordPress plugin before 2.5.2 unserializes the content of imported files, which could lead to PHP object injection attacks by administrators, on multisite WordPress configurations. Successful exploitation in this case requires other plugins with a suitable gadget chain to be present on the site.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb"], ["2022", "CVE-2022-33318", "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server.", "https://github.com/0vercl0k/paracosme https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1263", "A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", "No PoCs found on GitHub currently.", "https://www.openwall.com/lists/oss-security/2022/04/07/1"], ["2022", "CVE-2022-35585", "A stored cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the \"start_date\" Parameter", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5-other-forkcms/"], ["2022", "CVE-2022-35705", "Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39811", "Italtel NetMatch-S CI 5.2.0-20211008 has incorrect Access Control under NMSCI-WebGui/advancedsettings.jsp and NMSCIWebGui/SaveFileUploader. By not verifying permissions for access to resources, it allows an attacker to view pages that are not allowed, and modify the system configuration, bypassing all controls (without checking for user identity).", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-45896", "Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/-"], ["2022", "CVE-2022-42264", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause the use of an out-of-range pointer offset, which may lead to data tampering, data loss, information disclosure, or denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-23180", "The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.7.4 doesn't have authorisation and nonce checks, which could allow any authenticated users, such as subscriber to update and change various settings", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/"], ["2022", "CVE-2022-21314", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4417", "The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5"], ["2022", "CVE-2022-43108", "Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.", "No PoCs found on GitHub currently.", "https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetfirewallcfg"], ["2022", "CVE-2022-4786", "The Video.js WordPress plugin through 4.5.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0"], ["2022", "CVE-2022-34529", "WASM3 v0.5.0 was discovered to contain a segmentation fault via the component Compile_Memory_CopyFill.", "No PoCs found on GitHub currently.", "https://github.com/wasm3/wasm3/issues/337"], ["2022", "CVE-2022-45544", "** DISPUTED ** Insecure Permission vulnerability in Schlix Web Inc SCHLIX CMS 2.2.7-2 allows attacker to upload arbitrary files and execute arbitrary code via the tristao parameter. NOTE: this is disputed by the vendor because an admin is intentionally allowed to upload new executable PHP code, such as a theme that was obtained from a trusted source or was developed for their own website. Only an admin can upload such code, not someone else in an \"attacker\" role.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tristao-marinho/CVE-2022-45544 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload/ https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md"], ["2022", "CVE-2022-32025", "Car Rental Management System v1.0 is vulnerable to SQL Injection via /car-rental-management-system/admin/view_car.php?id=.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-21254", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37843", "In TOTOLINK A860R V4.1.2cu.5182_B20201027 in cstecgi.cgi, the acquired parameters are directly put into the system for execution without filtering, resulting in a command injection vulnerability.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md"], ["2022", "CVE-2022-47441", "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Charitable Donations & Fundraising Team Donation Forms by Charitable plugin <=\u00a01.7.0.10 versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/me2nuk/me2nuk", "No PoCs from references."], ["2022", "CVE-2022-39951", "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 7.0.0 through 7.0.2, FortiWeb version 6.3.6 through 6.3.20, FortiWeb 6.4 all versions allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-20138", "In ACTION_MANAGED_PROFILE_PROVISIONED of DevicePolicyManagerService.java, there is a possible way for unprivileged app to send MANAGED_PROFILE_PROVISIONED intent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-210469972", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/ShaikUsaf/ShaikUsaf-frameworks_base_AOSP10_r33_CVE-2022-20138 https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20138 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20138 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1232", "Type confusion in V8 in Google Chrome prior to 100.0.4896.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-38639", "A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4953", "The Elementor Website Builder WordPress plugin before 3.5.5 does not filter out user-controlled URLs from being loaded into the DOM. This could be used to inject rogue iframes that point to malicious URLs.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/174550/WordPress-Elementor-Iframe-Injection.html https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7"], ["2022", "CVE-2022-3030", "An improper access control issue in GitLab CE/EE affecting all versions starting before 15.1.6, all versions from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of pipeline status to unauthorized users.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/37959"], ["2022", "CVE-2022-40126", "A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.", "https://github.com/ARPSyndicate/cvemon https://github.com/LovelyWei/CVE-2022-40126 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-23056", "In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23056"], ["2022", "CVE-2022-45643", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the addWifiMacFilter function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md"], ["2022", "CVE-2022-4650", "The HashBar WordPress plugin before 1.3.6 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075"], ["2022", "CVE-2022-4481", "The Mesmerize Companion WordPress plugin before 1.6.135 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0"], ["2022", "CVE-2022-23116", "Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-35890", "An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x before 8.1.17. Designer and Vision Client Session IDs are mishandled. An attacker can determine which session IDs were generated in the past and then hijack sessions assigned to these IDs via Randy.", "https://github.com/ARPSyndicate/cvemon https://github.com/sourceincite/randy", "https://github.com/sourceincite/randy"], ["2022", "CVE-2022-45703", "Heap buffer overflow vulnerability in binutils readelf before 2.40 via function display_debug_section in file readelf.c.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29799"], ["2022", "CVE-2022-0319", "Out-of-bounds Read in vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b"], ["2022", "CVE-2022-0088", "Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29"], ["2022", "CVE-2022-21382", "Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: WebUI). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. While the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 7.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26673", "ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28862", "In Archibus Web Central before 26.2, multiple SQL Injection vulnerabilities occur in dwr/call/plaincall/workflow.runWorkflowRule.dwr. Through the injection of arbitrary SQL statements, a potential attacker can modify query syntax and perform unauthorized (and unexpected) operations against the remote database. This is fixed in all recent versions, such as version 26.2.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html"], ["2022", "CVE-2022-42163", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromNatStaticSetting.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md"], ["2022", "CVE-2022-25888", "The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.", "https://github.com/claroty/opcua-exploit-framework", "https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751"], ["2022", "CVE-2022-38779", "An open redirect issue was discovered in Kibana that could lead to a user being redirected to an arbitrary website if they use a maliciously crafted Kibana URL.", "No PoCs found on GitHub currently.", "https://www.elastic.co/community/security"], ["2022", "CVE-2022-4813", "Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc"], ["2022", "CVE-2022-1075", "A vulnerability was found in College Website Management System 1.0 and classified as problematic. Affected by this issue is the file /cwms/classes/Master.php?f=save_contact of the component Contact Handler. The manipulation leads to persistent cross site scripting. The attack may be launched remotely and requires authentication.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.194846"], ["2022", "CVE-2022-37416", "Ittiam libmpeg2 before 2022-07-27 uses memcpy with overlapping memory blocks in impeg2_mc_fullx_fully_8x8.", "No PoCs found on GitHub currently.", "https://issuetracker.google.com/issues/231026247"], ["2022", "CVE-2022-26762", "A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious application may be able to execute arbitrary code with system privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-40177", "A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). Endpoints of the \u201cOperation\u201d web application that interpret and execute Axon language queries allow file read access to the device file system with root privileges. By supplying specific I/O related Axon queries, a remote low-privileged attacker can read sensitive files on the device.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28973", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the wanMTU parameter in the function fromAdvSetMacMtuWan. This vulnerability allows attackers to cause a Denial of Service (DoS).", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md"], ["2022", "CVE-2022-35513", "The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/p1ckzi/CVE-2022-35513 https://github.com/security-anthem/IoTPene https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html https://github.com/p1ckzi/CVE-2022-35513"], ["2022", "CVE-2022-38668", "HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive uninitialized data from stack memory when fulfilling a request for a static file smaller than 16 KB.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md https://gynvael.coldwind.pl/?id=752"], ["2022", "CVE-2022-1164", "The Wyzi Theme was affected by reflected XSS vulnerabilities in the business search feature", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286"], ["2022", "CVE-2022-36879", "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901"], ["2022", "CVE-2022-4601", "A vulnerability was found in Shoplazza LifeStyle 1.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/api/theme-edit/ of the component Shipping/Member Discount/Icon. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216196.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Dec/11"], ["2022", "CVE-2022-28670", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. Crafted data in an AcroForm can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16523.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-0208", "The MapPress Maps for WordPress plugin before 2.73.4 does not sanitise and escape the mapid parameter before outputting it back in the \"Bad mapid\" error message, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc"], ["2022", "CVE-2022-47717", "Last Yard 22.09.8-1 is vulnerable to Cross-origin resource sharing (CORS).", "https://github.com/l00neyhacker/CVE-2022-47717", "No PoCs from references."], ["2022", "CVE-2022-0199", "The Coming soon and Maintenance mode WordPress plugin before 3.6.8 does not have CSRF check in its coming_soon_send_mail AJAX action, allowing attackers to make logged in admin to send arbitrary emails to all subscribed users via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714"], ["2022", "CVE-2022-30276", "The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-21293", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47657", "GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2355"], ["2022", "CVE-2022-0348", "Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4"], ["2022", "CVE-2022-3121", "A vulnerability was found in SourceCodester Online Employee Leave Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/addemployee.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The identifier VDB-207853 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.207853"], ["2022", "CVE-2022-42132", "The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17438"], ["2022", "CVE-2022-28683", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deletePages method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16828.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-28512", "A SQL injection vulnerability exists in Sourcecodester Fantastic Blog CMS 1.0 . An attacker can inject query in \"/fantasticblog/single.php\" via the \"id=5\" parameters.", "https://github.com/20142995/pocsuite3 https://github.com/ARPSyndicate/cvemon https://github.com/ScarlettDefender/poc https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-21260", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30114", "A heap-based buffer overflow in a network service in Fastweb FASTGate MediaAccess FGA2130FWB, firmware version 18.3.n.0482_FW_230_FGA2130, and DGA4131FWB, firmware version up to 18.3.n.0462_FW_261_DGA4131, allows a remote attacker to reboot the device through a crafted HTTP request, causing DoS.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/str0ng4le/CVE-2022-30114", "https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/"], ["2022", "CVE-2022-41179", "Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JtTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-3303", "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d"], ["2022", "CVE-2022-37774", "There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.", "https://github.com/frame84/vulns", "No PoCs from references."], ["2022", "CVE-2022-42081", "Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via sched_end_time parameter.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md"], ["2022", "CVE-2022-3243", "The Import all XML, CSV & TXT WordPress plugin before 6.5.8 does not properly sanitise and escape imported data before using them back SQL statements, leading to SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a"], ["2022", "CVE-2022-22149", "A SQL injection vulnerability exists in the HelpdeskEmailActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441"], ["2022", "CVE-2022-1346", "Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8fe435b0-192f-41ca-b41e-580fcd34892f"], ["2022", "CVE-2022-28452", "Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452"], ["2022", "CVE-2022-30054", "In Covid 19 Travel Pass Management 1.0, the code parameter is vulnerable to SQL injection attacks.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management"], ["2022", "CVE-2022-21320", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-41128", "Windows Scripting Languages Remote Code Execution Vulnerability", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/"], ["2022", "CVE-2022-36449", "An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory, write a limited amount outside of buffer bounds, or to disclose details of memory mappings. This affects Midgard r4p0 through r32p0, Bifrost r0p0 through r38p0 and r39p0 before r38p1, and Valhall r19p0 through r38p0 and r39p0 before r38p1.", "https://github.com/austrisu/awesome-stuff", "http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html"], ["2022", "CVE-2022-25638", "In wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the sig_algo field differs between the certificate_verify message and the certificate message.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45521", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeUrlFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md"], ["2022", "CVE-2022-23334", "The Robot application in Ip-label Newtest before v8.5R0 was discovered to use weak signature checks on executed binaries, allowing attackers to have write access and escalate privileges via replacing NEWTESTREMOTEMANAGER.EXE.", "No PoCs found on GitHub currently.", "https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf"], ["2022", "CVE-2022-35923", "v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known workarounds for this issue.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2d92f644-593b-43b4-bfd1-c8042ac60609/"], ["2022", "CVE-2022-32040", "Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formSetCfm.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetCfm"], ["2022", "CVE-2022-21231", "All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655"], ["2022", "CVE-2022-35620", "D-LINK DIR-818LW A1:DIR818L_FW105b01 was discovered to contain a remote code execution (RCE) vulnerability via the function binary.soapcgi_main.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/DIR-818L.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-3352", "Use After Free in GitHub repository vim/vim prior to 9.0.0614.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60"], ["2022", "CVE-2022-1257", "Insecure storage of sensitive information vulnerability in MA for Linux, macOS, and Windows prior to 5.7.6 allows a local user to gain access to sensitive information through storage in ma.db. The sensitive information has been moved to encrypted database files.", "No PoCs found on GitHub currently.", "https://kc.mcafee.com/corporate/index?page=content&id=SB10382"], ["2022", "CVE-2022-3212", "::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String", "No PoCs found on GitHub currently.", "https://research.jfrog.com/vulnerabilities/axum-core-dos/"], ["2022", "CVE-2022-1086", "A vulnerability was found in DolphinPHP up to 1.5.0 and classified as problematic. Affected by this issue is the User Management Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md https://vuldb.com/?id.195368"], ["2022", "CVE-2022-40304", "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-24785", "Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.", "https://github.com/ARPSyndicate/cvemon https://github.com/octane23/CASE-STUDY-1", "No PoCs from references."], ["2022", "CVE-2022-32291", "In Real Player through 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file.", "https://github.com/Edubr2020/RP_RecordClip_DLL_Hijack", "No PoCs from references."], ["2022", "CVE-2022-24886", "Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. In versions prior to 3.19.0, any application with notification permission can access contacts if Nextcloud has access to Contacts without applying for the Contacts permission itself. Version 3.19.0 contains a fix for this issue. There are currently no known workarounds.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-37966", "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/takondo/11Bchecker", "No PoCs from references."], ["2022", "CVE-2022-21371", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ArrestX/--POC https://github.com/HimmelAward/Goby_POC https://github.com/Jean-Francois-C/Windows-Penetration-Testing https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/CVE-2022-21371 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/Vulnmachines/Oracle-WebLogic-CVE-2022-21371 https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/aymankhder/Windows-Penetration-Testing https://github.com/binganao/vulns-2022 https://github.com/d4n-sec/d4n-sec.github.io https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- https://github.com/xinyisleep/pocscan https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-36509", "H3C GR3200 MiniGR1B0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md"], ["2022", "CVE-2022-25778", "Cross-Site Request Forgery (CSRF) vulnerability in Web UI of Secomea GateManager allows phishing attacker to issue get request in logged in user session.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-4472", "The Simple Sitemap WordPress plugin before 3.5.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a"], ["2022", "CVE-2022-40998", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no gre index <1-8> destination A.B.C.D/M description (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-2770", "A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Book Store System. Affected is an unknown function of the file /obs/book.php. The manipulation of the argument bookisbn leads to sql injection. It is possible to launch the attack remotely. VDB-206166 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206166"], ["2022", "CVE-2022-22815", "path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-48114", "RuoYi up to v4.7.5 was discovered to contain a SQL injection vulnerability via the component /tool/gen/createTable.", "No PoCs found on GitHub currently.", "https://gitee.com/y_project/RuoYi/issues/I65V2B"], ["2022", "CVE-2022-41666", "A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).", "No PoCs found on GitHub currently.", "https://www.se.com/ww/en/download/document/SEVD-2022-284-01/"], ["2022", "CVE-2022-36096", "The XWiki Platform Index UI is an Index of all pages, attachments, orphans and deleted pages and attachments for XWiki Platform, a generic wiki platform. Prior to versions 13.10.6 and 14.3, it's possible to store JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3. As a workaround, modify fix the vulnerability by editing the wiki page `XWiki.DeletedAttachments` with the object editor, open the `JavaScriptExtension` object and apply on the content the changes that can be found on the fix commit.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-20613", "A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-31567", "The DSABenchmark/DSAB repository through 2.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1688", "The Note Press WordPress plugin through 0.1.10 does not sanitise and escape the id parameter before using it in various SQL statement via the admin dashboard, leading to SQL Injections", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/note-press_0-1-10_1 https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92"], ["2022", "CVE-2022-2873", "An out-of-bounds memory access flaw was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.", "https://github.com/ARPSyndicate/cvemon", "https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/"], ["2022", "CVE-2022-0836", "The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f"], ["2022", "CVE-2022-1459", "Non-Privilege User Can View Patient\u2019s Disclosures in GitHub repository openemr/openemr prior to 6.1.0.1.", "https://github.com/zn9988/publications", "No PoCs from references."], ["2022", "CVE-2022-29021", "A buffer overflow vulnerability exists in the razerkbd driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities"], ["2022", "CVE-2022-22955", "VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/nguyenv1nK/22954", "No PoCs from references."], ["2022", "CVE-2022-27133", "zbzcms v1.0 was discovered to contain an arbitrary file deletion vulnerability via /include/up.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-0735", "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. An unauthorised user was able to steal runner registration tokens through an information disclosure vulnerability using quick actions commands.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-22844", "LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.", "https://github.com/ARPSyndicate/cvemon https://github.com/waugustus/crash_analysis https://github.com/waugustus/poc https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/355"], ["2022", "CVE-2022-27022", "There is a stack overflow vulnerability in the SetSysTimeCfg() function in the httpd service of Tenda AC9 V15.03.2.21_cn. The attacker can obtain a stable root shell through a constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14"], ["2022", "CVE-2022-0624", "Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi", "https://huntr.dev/bounties/afffb2bd-fb06-4144-829e-ecbbcbc85388"], ["2022", "CVE-2022-30959", "A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.", "https://github.com/ARPSyndicate/cvemon https://github.com/EMLamban/jenkins https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-31536", "The jaygarza1982/ytdl-sync repository through 2021-01-02 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1548", "Mattermost Playbooks plugin 1.25 and earlier fails to properly restrict user-level permissions, which allows playbook members to escalate their membership privileges and perform actions restricted to playbook admins.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-20493", "In Condition of Condition.java, there is a possible way to grant notification access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242846316", "https://github.com/Trinadh465/frameworks_base_CVE-2022-20493 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-20702", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-1408", "The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.8 does not escape various settings before outputting them in attributes, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705"], ["2022", "CVE-2022-46286", "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1799", "Incorrect signature trust exists within Google Play services SDK play-services-basement. A debug version of Google Play services is trusted by the SDK for devices that are non-GMS. We recommend upgrading the SDK past the 2022-05-03 release.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43971", "An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root.", "No PoCs found on GitHub currently.", "https://youtu.be/73-1lhvJPNg https://youtu.be/RfWVYCUBNZ0 https://youtu.be/TeWAmZaKQ_w"], ["2022", "CVE-2022-44012", "An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-22596", "A memory corruption issue was addressed with improved validation. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2962", "A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0867", "The Pricing Table WordPress plugin before 3.6.1 fails to properly sanitize and escape user supplied POST data before it is being interpolated in an SQL statement and then executed via an AJAX action available to unauthenticated users", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494"], ["2022", "CVE-2022-0764", "Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.", "https://github.com/231tr0n/231tr0n https://github.com/ARPSyndicate/cvemon", "https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c https://github.com/strapi/strapi/issues/12879 https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5"], ["2022", "CVE-2022-36216", "DedeCMS v5.7.94 - v5.7.97 was discovered to contain a remote code execution vulnerability in member_toadmin.php.", "No PoCs found on GitHub currently.", "https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md"], ["2022", "CVE-2022-24129", "The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF"], ["2022", "CVE-2022-25245", "Zoho ManageEngine ServiceDesk Plus before 13001 allows anyone to know the organisation's default currency name.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0pak4/k0pak4", "https://raxis.com/blog/cve-2022-25245"], ["2022", "CVE-2022-1929", "An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the devcert npm package, when an attacker is able to supply arbitrary input to the certificateFor method", "No PoCs found on GitHub currently.", "https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/"], ["2022", "CVE-2022-43681", "An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.", "https://github.com/Forescout/bgp_boofuzzer", "No PoCs from references."], ["2022", "CVE-2022-25094", "Home Owners Collection Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the parameter \"cover\" in SystemSettings.php.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50731"], ["2022", "CVE-2022-25305", "The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the IP parameter found in the ~/includes/class-wp-statistics-ip.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d"], ["2022", "CVE-2022-27191", "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.", "https://github.com/ARPSyndicate/cvemon https://github.com/Giapppp/Secure-Shell https://github.com/nattvasan/energitest https://github.com/upsideon/shoveler", "No PoCs from references."], ["2022", "CVE-2022-36174", "FreshService Windows Agent < 2.11.0 and FreshService macOS Agent < 4.2.0 and FreshService Linux Agent < 3.3.0. are vulnerable to Broken integrity checking via the FreshAgent client and scheduled update service.", "No PoCs found on GitHub currently.", "https://public-exposure.inform.social/post/integrity-checking/"], ["2022", "CVE-2022-41415", "Acer Altos W2000h-W570h F4 R01.03.0018 was discovered to contain a stack overflow in the RevserveMem component. This vulnerability allows attackers to cause a Denial of Service (DoS) via injecting crafted shellcode into the NVRAM variable.", "No PoCs found on GitHub currently.", "https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md"], ["2022", "CVE-2022-1869", "Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-0797", "Out of bounds memory access in Mojo in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0406", "Improper Authorization in GitHub repository janeczku/calibre-web prior to 0.6.16.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/d7498799-4797-4751-b5e2-b669e729d5db"], ["2022", "CVE-2022-2692", "A vulnerability, which was classified as problematic, was found in SourceCodester Wedding Hall Booking System. This affects an unknown part of the file /whbs/admin/?page=user of the component Staff User Profile. The manipulation of the argument First Name/Last Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205815.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205815"], ["2022", "CVE-2022-2503", "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", "No PoCs found on GitHub currently.", "https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m"], ["2022", "CVE-2022-0894", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/noobpk/noobpk", "https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95"], ["2022", "CVE-2022-41887", "TensorFlow is an open source platform for machine learning. `tf.keras.losses.poisson` receives a `y_pred` and `y_true` that are passed through `functor::mul` in `BinaryOp`. If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. We have patched the issue in GitHub commit c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as these are also affected and still in supported range. However, we will not cherrypick this commit into TensorFlow 2.8.x, as it depends on Eigen behavior that changed between 2.8 and 2.9.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-38066", "An OS command injection vulnerability exists in the httpd SNMP functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP response can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615"], ["2022", "CVE-2022-44370", "NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856", "https://github.com/13579and2468/Wei-fuzz https://github.com/deezombiedude612/rca-tool", "No PoCs from references."], ["2022", "CVE-2022-2880", "Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrKsey/AdGuardHome https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-37098", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateIpv6Params.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12"], ["2022", "CVE-2022-37309", "OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Nov/18"], ["2022", "CVE-2022-46364", "A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "https://github.com/ARPSyndicate/cvemon https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-31594", "A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-38177", "By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0686", "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/Naruse-developer/Warframe_theme https://github.com/seal-community/patches", "https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c"], ["2022", "CVE-2022-47008", "An issue was discovered function make_tempdir, and make_tempname in bucomm.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.", "https://github.com/fokypoky/places-list https://github.com/fusion-scan/fusion-scan.github.io", "No PoCs from references."], ["2022", "CVE-2022-0517", "Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker with limited privileges could leverage this to launch arbitrary code with SYSTEM privilege. This vulnerability affects Mozilla VPN < 2.7.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-2412", "The Better Tag Cloud WordPress plugin through 0.99.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6"], ["2022", "CVE-2022-0457", "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2552", "The Duplicator WordPress plugin before 1.4.7 does not authenticate or authorize visitors before displaying information about the system such as server software, php version and full file system path to the site.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552 https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698"], ["2022", "CVE-2022-48336", "Widevine Trusted Application (TA) 5.0.0 through 7.1.1 has a PRDiagParseAndStoreData integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/"], ["2022", "CVE-2022-25354", "The package set-in before 2.0.3 are vulnerable to Prototype Pollution via the setIn method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-SETIN-2388571"], ["2022", "CVE-2022-34020", "Cross Site Request Forgery (CSRF) vulnerability in ResIOT ResIOT IOT Platform + LoRaWAN Network Server through 4.1.1000114 allows attackers to add new admin users to the platform or other unspecified impacts.", "https://github.com/karimhabush/cyberowl", "https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html https://securityblog101.blogspot.com/2022/09/cve-2022-34020.html"], ["2022", "CVE-2022-31846", "A vulnerability in live_mfg.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md"], ["2022", "CVE-2022-1838", "A vulnerability classified as critical has been found in Home Clean Services Management System 1.0. This affects an unknown part of admin/login.php. The manipulation of the argument username with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(5)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. It is possible to initiate the attack remotely but it requires authentication. Exploit details have been disclosed to the public.", "No PoCs found on GitHub currently.", "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_admin_SQL_Inject.md https://vuldb.com/?id.200583"], ["2022", "CVE-2022-20431", "There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221238", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-31745", "If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox < 101.", "https://github.com/googleprojectzero/fuzzilli https://github.com/zhangjiahui-buaa/MasterThesis", "No PoCs from references."], ["2022", "CVE-2022-22534", "Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-33640", "System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44321", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the LexSkipComment function in lex.c when called from LexScanGetToken.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-38037", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html"], ["2022", "CVE-2022-2956", "A vulnerability classified as problematic has been found in ConsoleTVs Noxen. Affected is an unknown function of the file /Noxen-master/users.php. The manipulation of the argument create_user_username with the input \"> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-207000.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0853", "A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak on the JBoss client-side, when using UserTransaction repeatedly and leads to information leakage vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/ByteHackr/CVE-2022-0853 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41840", "Unauth. Directory Traversal vulnerability in Welcart eCommerce plugin <= 2.7.7 on WordPress.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/Marcuccio/kevin https://github.com/d4n-sec/d4n-sec.github.io", "No PoCs from references."], ["2022", "CVE-2022-43945", "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"], ["2022", "CVE-2022-3539", "The Testimonials WordPress plugin before 2.7, super-testimonial-pro WordPress plugin before 1.0.8 do not sanitize and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db"], ["2022", "CVE-2022-22633", "A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, macOS Monterey 12.3. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4359", "The WP RSS By Publishers WordPress plugin through 0.1 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339"], ["2022", "CVE-2022-0750", "The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2655", "The Classified Listing Pro WordPress plugin before 2.0.20 does not escape a generated URL before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b"], ["2022", "CVE-2022-28328", "A vulnerability has been identified in SCALANCE W1788-1 M12 (All versions < V3.0.0), SCALANCE W1788-2 EEC M12 (All versions < V3.0.0), SCALANCE W1788-2 M12 (All versions < V3.0.0), SCALANCE W1788-2IA M12 (All versions < V3.0.0). Affected devices do not properly handle malformed Multicast LLC frames. This could allow an attacker to trigger a denial of service condition.", "No PoCs found on GitHub currently.", "https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf"], ["2022", "CVE-2022-0581", "Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-34267", "An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint.", "https://github.com/tanjiti/sec_profile", "https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver"], ["2022", "CVE-2022-4219", "The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the manage() function. This makes it possible for unauthenticated attackers to delete submitted quiz responses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e"], ["2022", "CVE-2022-27016", "There is a stack overflow vulnerability in the SetStaticRouteCfg() function in the httpd service of Tenda AC9 15.03.2.21_cn.", "https://github.com/hogehuga/epss-db", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/10"], ["2022", "CVE-2022-27387", "MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26422"], ["2022", "CVE-2022-36362", "A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable and could only be recovered by power cycling the device.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-31502", "The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-3479", "A vulnerability found in nss. By this security vulnerability, nss client auth crash without a user certificate in the database and this can lead us to a segmentation fault or crash.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29104", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ChristosSmiliotopoulos/Lateral-Movement-Dataset--LMD_Collections", "No PoCs from references."], ["2022", "CVE-2022-32868", "A logic issue was addressed with improved state management. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. A website may be able to track users through Safari web extensions.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/39 http://seclists.org/fulldisclosure/2022/Oct/40 http://seclists.org/fulldisclosure/2022/Oct/50"], ["2022", "CVE-2022-2816", "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58"], ["2022", "CVE-2022-0913", "Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f"], ["2022", "CVE-2022-31782", "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.", "No PoCs found on GitHub currently.", "https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8"], ["2022", "CVE-2022-46172", "authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also affect other applications as these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations. This vulnerability pertains to the user context used in the default-user-settings-flow, /api/v3/flows/instances/default-user-settings-flow/execute/. This issue has been fixed in versions 2022.10.4 and 2022.11.4.", "No PoCs found on GitHub currently.", "https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5"], ["2022", "CVE-2022-22662", "A cookie management issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5. Processing maliciously crafted web content may disclose sensitive user information.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0701", "The SEO 301 Meta WordPress plugin through 1.9.1 does not escape its Request and Destination settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1"], ["2022", "CVE-2022-2595", "Improper Authorization in GitHub repository kromitgmbh/titra prior to 0.79.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1c6afb84-2025-46d8-9e9f-cbfc20e5d04d"], ["2022", "CVE-2022-25393", "Simple Bakery Shop Management v1.0 was discovered to contain a SQL injection vulnerability via the username parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Bakery-Shop-Management"], ["2022", "CVE-2022-22961", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an information disclosure vulnerability due to returning excess information. A malicious actor with remote access may leak the hostname of the target system. Successful exploitation of this issue can lead to targeting victims.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/sourceincite/hekate", "No PoCs from references."], ["2022", "CVE-2022-4099", "The Joy Of Text Lite WordPress plugin before 2.3.1 does not properly sanitise and escape some parameters before using them in SQL statements accessible to unauthenticated users, leading to unauthenticated SQL injection", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028"], ["2022", "CVE-2022-36273", "Tenda AC9 V15.03.2.21_cn is vulnerable to command injection via goform/SetSysTimeCfg.", "https://github.com/ARPSyndicate/cvemon https://github.com/zhefox/IOT_Vul", "https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9"], ["2022", "CVE-2022-4248", "A vulnerability, which was classified as critical, has been found in Movie Ticket Booking System. This issue affects some unknown processing of the file editBooking.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214625 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/aman05382/movie_ticket_booking_system_php/issues/3 https://vuldb.com/?id.214625"], ["2022", "CVE-2022-0641", "The Popup Like box WordPress plugin before 3.6.1 does not sanitize and escape the ays_fb_tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f"], ["2022", "CVE-2022-2847", "A vulnerability, which was classified as critical, has been found in SourceCodester Guest Management System. This issue affects some unknown processing of the file /guestmanagement/front.php. The manipulation of the argument rid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206489 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206489"], ["2022", "CVE-2022-0942", "Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9"], ["2022", "CVE-2022-31553", "The rainsoupah/sleep-learner repository through 2021-02-21 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-29155", "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44137", "SourceCodester Sanitization Management System 1.0 is vulnerable to SQL Injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/y1s3m0/vulnfind", "No PoCs from references."], ["2022", "CVE-2022-3909", "The Add Comments WordPress plugin through 1.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78"], ["2022", "CVE-2022-22992", "A command injection remote code execution vulnerability was discovered on Western Digital My Cloud Devices that could allow an attacker to execute arbitrary system commands on the device. The vulnerability was addressed by escaping individual arguments to shell functions coming from user input.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-36280", "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.openanolis.cn/show_bug.cgi?id=2071"], ["2022", "CVE-2022-36111", "immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.", "No PoCs found on GitHub currently.", "https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake"], ["2022", "CVE-2022-2566", "A heap out-of-bounds memory write exists in FFMPEG since version 5.1. The size calculation in `build_open_gop_key_points()` goes through all entries in the loop and adds `sc->ctts_data[i].count` to `sc->sample_offsets_count`. This can lead to an integer overflow resulting in a small allocation with `av_calloc()`. An attacker can cause remote code execution via a malicious mp4 file. We recommend upgrading past commit c953baa084607dd1d84c3bfcce3cf6a87c3e6e05", "https://github.com/mark0519/mark0519.github.io", "No PoCs from references."], ["2022", "CVE-2022-26109", "When a user opens a manipulated Portable Document Format (.pdf, PDFView.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-44315", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionAssign function in expression.c when called from ExpressionParseFunctionCall.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-38392", "Certain 5400 RPM hard drives, for laptops and other PCs in approximately 2005 and later, allow physically proximate attackers to cause a denial of service (device malfunction and system crash) via a resonant-frequency attack with the audio signal from the Rhythm Nation music video. A reported product is Seagate STDT4000100 763649053447.", "https://github.com/ARPSyndicate/cvemon https://github.com/Live-Hack-CVE/CVE-2022-38392 https://github.com/zdimension/links", "No PoCs from references."], ["2022", "CVE-2022-38143", "A heap out-of-bounds write vulnerability exists in the way OpenImageIO v2.3.19.0 processes RLE encoded BMP images. A specially-crafted bmp file can write to arbitrary out of bounds memory, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630"], ["2022", "CVE-2022-26049", "This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0523", "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69"], ["2022", "CVE-2022-21629", "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-2426", "The Thinkific Uploader WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks against other administrators.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422"], ["2022", "CVE-2022-3849", "The WP User Merger WordPress plugin before 1.5.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/ https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5"], ["2022", "CVE-2022-34154", "Authenticated (author or higher user role) Arbitrary File Upload vulnerability in ideasToCode Enable SVG, WebP & ICO Upload plugin <= 1.0.1 at WordPress.", "https://github.com/ARPSyndicate/cvemon https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-25220", "PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code inside the markdown descriptions while creating a product, report or finding.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://fluidattacks.com/advisories/armstrong/ https://github.com/1modm/petereport/issues/35"], ["2022", "CVE-2022-0432", "Prototype Pollution in GitHub repository mastodon/mastodon prior to 3.5.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/d06da292-7716-4d74-a129-dd04773398d7"], ["2022", "CVE-2022-32549", "Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2537", "The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 3.0.1 does not sanitise and escape some parameters before outputting them back in an attributes of an admin page, leading to Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f"], ["2022", "CVE-2022-45028", "A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.", "No PoCs found on GitHub currently.", "https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html"], ["2022", "CVE-2022-25331", "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-05"], ["2022", "CVE-2022-34045", "Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-36140", "SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::DeclareFunction2::write(SWF::Writer*, SWF::Context*).", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/57"], ["2022", "CVE-2022-29326", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addhostfilter parameter in /goform/websHostFilter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/7 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-26158", "An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. It accepts and reflects arbitrary domains supplied via a client-controlled Host header. Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/karimhabush/cyberowl https://github.com/l00neyhacker/CVE-2022-26158 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-35269", "A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_e2c_json_file/` API.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575"], ["2022", "CVE-2022-31660", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-29266", "In APache APISIX before 3.13.1, the jwt-auth plugin has a security issue that leaks the user's secret key because the error message returned from the dependency lua-resty-jwt contains sensitive information.", "https://github.com/43622283/cloud-security-guides https://github.com/ARPSyndicate/cvemon https://github.com/GRQForCloud/cloud-security-guides https://github.com/YDCloudSecurity/cloud-security-guides https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-44204", "D-Link DIR3060 DIR3060A1_FW111B04.bin is vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3060/5.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-27374", "Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via the function sub_42E328 at /goform/SysToolReboot.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AX12/AX12.md"], ["2022", "CVE-2022-0572", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf"], ["2022", "CVE-2022-32409", "A local file inclusion (LFI) vulnerability in the component codemirror.php of Portal do Software Publico Brasileiro i3geo v7.0.5 allows attackers to execute arbitrary PHP code via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Marcuccio/kevin https://github.com/wagnerdracha/ProofOfConcept", "https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion"], ["2022", "CVE-2022-46080", "Nexxt Nebula 1200-AC 15.03.06.60 allows authentication bypass and command execution by using the HTTPD service to enable TELNET.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/yerodin/CVE-2022-46080", "No PoCs from references."], ["2022", "CVE-2022-35279", "\"IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, and 22.0.1 could disclose sensitive version information to authenticated users which could be used in further attacks against the system. IBM X-Force ID: 230537.\"", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2467", "A vulnerability has been found in SourceCodester Garage Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument username with the input 1@a.com' AND (SELECT 6427 FROM (SELECT(SLEEP(5)))LwLu) AND 'hsvT'='hsvT leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md"], ["2022", "CVE-2022-45178", "An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdeskintegration/saml/user/createorupdate endpoint, the /settings/guest-settings endpoint, the /settings/samlusers-settings endpoint, and the /settings/users-settings endpoint. A malicious user (already logged in as a SAML User) is able to achieve privilege escalation from a low-privilege user (FGM user) to an administrative user (GGU user), including the administrator, or create new users even without an admin role.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-32788", "A buffer overflow was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. A remote user may be able to cause kernel code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "No PoCs from references."], ["2022", "CVE-2022-21668", "pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). When pip installs from a source distribution, any code in the setup.py is executed by the install process. This issue is patched in version 2022.1.8. The GitHub Security Advisory contains more information about this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigpick/cve-reading-list https://github.com/jacksont432/hello_world_python https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/sreeram281997/CVE-2022-21668-Pipenv-RCE-vulnerability https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0562", "Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.", "No PoCs found on GitHub currently.", "https://gitlab.com/libtiff/libtiff/-/issues/362"], ["2022", "CVE-2022-41571", "An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur.", "https://github.com/ARPSyndicate/cvemon https://github.com/Orange-Cyberdefense/CVE-repository", "No PoCs from references."], ["2022", "CVE-2022-22893", "Jerryscript 3.0.0 was discovered to contain a stack overflow via vm_loop.lto_priv.304 in /jerry-core/vm/vm.c.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/jerryscript-project/jerryscript/issues/4901"], ["2022", "CVE-2022-36150", "tifig v0.2.2 was discovered to contain a heap-buffer overflow via __asan_memmove at /asan/asan_interceptors_memintrinsics.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-25321", "An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.", "https://github.com/eslerm/nvd-api-client", "No PoCs from references."], ["2022", "CVE-2022-21728", "Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mwina/CVE-2022-21728-test https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0422", "The White Label CMS WordPress plugin before 2.2.9 does not sanitise and validate the wlcms[_login_custom_js] parameter before outputting it back in the response while previewing, leading to a Reflected Cross-Site Scripting issue", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Marcuccio/kevin", "https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc"], ["2022", "CVE-2022-26148", "An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC", "No PoCs from references."], ["2022", "CVE-2022-44354", "SolarView Compact 4.0 and 5.0 is vulnerable to Unrestricted File Upload via a crafted php file.", "No PoCs found on GitHub currently.", "https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md"], ["2022", "CVE-2022-22541", "SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users to access information they shouldn't see through relational or OLAP connections. The main impact is the disclosure of company data to people that shouldn't or don't need to have access.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-35228", "SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-42749", "CandidATS version 3.0.0 on 'page' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "No PoCs from references."], ["2022", "CVE-2022-38153", "An issue was discovered in wolfSSL before 5.5.0 (when --enable-session-ticket is used); however, only version 5.3.0 is exploitable. Man-in-the-middle attackers or a malicious server can crash TLS 1.2 clients during a handshake. If an attacker injects a large ticket (more than 256 bytes) into a NewSessionTicket message in a TLS 1.2 handshake, and the client has a non-empty session cache, the session cache frees a pointer that points to unallocated memory, causing the client to crash with a \"free(): invalid pointer\" message. NOTE: It is likely that this is also exploitable during TLS 1.3 handshakes between a client and a malicious server. With TLS 1.3, it is not possible to exploit this as a man-in-the-middle.", "https://github.com/ARPSyndicate/cvemon https://github.com/trailofbits/publications", "http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/"], ["2022", "CVE-2022-29227", "Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there\u2019s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local reply when the redirect headers are processed, the downstream state indicates that the downstream stream is not complete. On sending the local reply, Envoy will attempt to reset the upstream stream, but as it is actually complete, and deleted, this result in a use-after-free. Users are advised to upgrade. Users unable to upgrade are advised to disable internal redirects if crashes are observed.", "https://github.com/ARPSyndicate/cvemon https://github.com/ssst0n3/docker_archive", "https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6"], ["2022", "CVE-2022-48252", "The jokob-sk/Pi.Alert fork (before 22.12.20) of Pi.Alert allows Remote Code Execution via nmap_scan.php (scan parameter) OS Command Injection.", "No PoCs found on GitHub currently.", "https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r"], ["2022", "CVE-2022-3859", "An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.", "No PoCs found on GitHub currently.", "https://kcm.trellix.com/corporate/index?page=content&id=SB10391"], ["2022", "CVE-2022-45129", "Payara before 2022-11-04, when deployed to the root context, allows attackers to visit META-INF and WEB-INF, a different vulnerability than CVE-2022-37422. This affects Payara Platform Community before 4.1.2.191.38, 5.x before 5.2022.4, and 6.x before 6.2022.1, and Payara Platform Enterprise before 5.45.0.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html http://seclists.org/fulldisclosure/2022/Nov/11"], ["2022", "CVE-2022-21639", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Elastic Search Integration). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0533", "The Ditty (formerly Ditty News Ticker) WordPress plugin before 3.0.15 is affected by a Reflected Cross-Site Scripting (XSS) vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74"], ["2022", "CVE-2022-32508", "An issue was discovered on certain Nuki Home Solutions devices. By sending a malformed HTTP verb, it is possible to force a reboot of the device. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/"], ["2022", "CVE-2022-27275", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_122D0. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-33967", "squashfs filesystem implementation of U-Boot versions from v2020.10-rc2 to v2022.07-rc5 contains a heap-based buffer overflow vulnerability due to a defect in the metadata reading process. Loading a specially crafted squashfs image may lead to a denial-of-service (DoS) condition or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3919", "The Jetpack CRM WordPress plugin before 5.4.3 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb"], ["2022", "CVE-2022-20784", "A vulnerability in the Web-Based Reputation Score (WBRS) engine of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass established web request policies and access blocked content on an affected device. This vulnerability is due to incorrect handling of certain character combinations inserted into a URL. An attacker could exploit this vulnerability by sending crafted URLs to be processed by an affected device. A successful exploit could allow the attacker to bypass the web proxy and access web content that has been blocked by policy.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2754", "The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not validate and escape some reservation parameters before using them in SQL statements, which could allow unauthenticated attackers to perform SQL Injection attacks", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5"], ["2022", "CVE-2022-0651", "The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042"], ["2022", "CVE-2022-48130", "Tenda W20E v15.11.0.6 was discovered to contain multiple stack overflows in the function formSetStaticRoute via the parameters staticRouteNet, staticRouteMask, staticRouteGateway, staticRouteWAN.", "No PoCs found on GitHub currently.", "https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md"], ["2022", "CVE-2022-22831", "An issue was discovered in Servisnet Tessa 0.0.2. An attacker can add a new sysadmin user via a manipulation of the Authorization HTTP header.", "https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/Enes4xd/aleyleiftaradogruu https://github.com/Enes4xd/ezelnur6327 https://github.com/Enes4xd/kirik_kalpli_olan_sayfa https://github.com/Enes4xd/salih_.6644 https://github.com/Enes4xd/salihalkan4466 https://github.com/aleyleiftaradogruu/aleyleiftaradogruu https://github.com/cayserkiller/cayserkiller https://github.com/cr0ss2018/cr0ss2018 https://github.com/crossresmii/cayserkiller https://github.com/crossresmii/crossresmii https://github.com/crossresmii/salihalkan4466 https://github.com/ezelnur6327/enesamaafkolan https://github.com/ezelnur6327/ezelnur6327 https://github.com/xr4aleyna/Enes4xd https://github.com/xr4aleyna/aleyleiftaradogruu https://github.com/xr4aleyna/crossresmii https://github.com/xr4aleyna/xr4aleyna", "http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html https://www.exploit-db.com/exploits/50714 https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html"], ["2022", "CVE-2022-34226", "Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/ARPSyndicate/cvemon https://github.com/dhn/dhn", "No PoCs from references."], ["2022", "CVE-2022-3438", "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.0a4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67"], ["2022", "CVE-2022-29145", ".NET and Visual Studio Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31543", "The maxtortime/SetupBox repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0952", "The Sitemap by click5 WordPress plugin before 1.0.36 does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin. As a result, unauthenticated attackers could change arbitrary blog options, such as the users_can_register and default_role, allowing them to create a new admin account and take over the blog.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/RandomRobbieBF/CVE-2022-0952 https://github.com/cyllective/CVEs https://github.com/nomi-sec/PoC-in-GitHub", "https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b"], ["2022", "CVE-2022-2857", "Use after free in Blink in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0812", "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1 https://ubuntu.com/security/CVE-2022-0812"], ["2022", "CVE-2022-22672", "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.4 and iPadOS 15.4, Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. A malicious application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/b1n4r1b01/n-days", "No PoCs from references."], ["2022", "CVE-2022-3578", "The ProfileGrid WordPress plugin before 5.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345"], ["2022", "CVE-2022-29394", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macAddress parameter in the function FUN_0041b448.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig"], ["2022", "CVE-2022-29005", "Multiple cross-site scripting (XSS) vulnerabilities in the component /obcs/user/profile.php of Online Birth Certificate System v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname or lname parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-29005 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-31403", "ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/IbrahimEkimIsik/CVE-2022-31403 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-20777", "Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM. For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g"], ["2022", "CVE-2022-27286", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanNonLogin. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-4318", "A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-43596", "An information disclosure vulnerability exists in the IFFOutput channel interleaving functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654"], ["2022", "CVE-2022-43607", "An out-of-bounds write vulnerability exists in the MOL2 format attribute and value functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664"], ["2022", "CVE-2022-4089", "A vulnerability was found in rickxy Stock Management System. It has been declared as problematic. This vulnerability affects unknown code of the file /pages/processlogin.php. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214324.", "No PoCs found on GitHub currently.", "https://github.com/rickxy/Stock-Management-System/issues/3"], ["2022", "CVE-2022-22971", "In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.", "https://github.com/ARPSyndicate/cvemon https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/muneebaashiq/MBProjects https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tchize/CVE-2022-22971 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-25012", "Argus Surveillance DVR v4.0 employs weak password encryption.", "https://github.com/ARPSyndicate/cvemon https://github.com/deathflash1411/CVEs https://github.com/deathflash1411/cve-2022-25012 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/s3l33/CVE-2022-25012", "https://www.exploit-db.com/exploits/50130"], ["2022", "CVE-2022-2585", "It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.", "https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/greek0x0/2022-LPE-UAF https://github.com/konoha279/2022-LPE-UAF https://github.com/pirenga/2022-LPE-UAF", "https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://www.openwall.com/lists/oss-security/2022/08/09/7"], ["2022", "CVE-2022-2614", "Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0480", "A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042 https://github.com/kata-containers/kata-containers/issues/3373 https://ubuntu.com/security/CVE-2022-0480"], ["2022", "CVE-2022-0711", "A flaw was found in the way HAProxy processed HTTP responses containing the \"Set-Cookie2\" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20965", "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface.
This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted.
{{value}} [\"%7b%7bvalue%7d%7d\"])}]]", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/"], ["2022", "CVE-2022-4209", "The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pointsf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e"], ["2022", "CVE-2022-4198", "The WP Social Sharing WordPress plugin through 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2"], ["2022", "CVE-2022-2494", "Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/74ddb017-c1fd-4e72-bd30-3b2033911472"], ["2022", "CVE-2022-2705", "A vulnerability was found in SourceCodester Simple Student Information System. It has been rated as critical. This issue affects some unknown processing of the file admin/departments/manage_department.php. The manipulation of the argument id with the input -5756%27%20UNION%20ALL%20SELECT%20NULL,database(),user(),NULL,NULL,NULL,NULL--%20- leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205829 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205829"], ["2022", "CVE-2022-0591", "The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/im-hanzou/FC3er https://github.com/nomi-sec/PoC-in-GitHub", "https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47"], ["2022", "CVE-2022-0600", "The Conference Scheduler WordPress plugin before 2.4.3 does not sanitize and escape the tab parameter before outputting back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d"], ["2022", "CVE-2022-0903", "A call stack overflow bug in the SAML login feature in Mattermost server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted POST body.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-3469", "The WP Attachments WordPress plugin before 5.0.5 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63"], ["2022", "CVE-2022-46073", "Helmet Store Showroom 1.0 is vulnerable to Cross Site Scripting (XSS).", "No PoCs found on GitHub currently.", "https://yuyudhn.github.io/CVE-2022-46073/"], ["2022", "CVE-2022-31512", "The Atom02/flask-mvc repository through 2020-09-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22623", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "https://github.com/ARPSyndicate/cvemon https://github.com/bagder/log", "No PoCs from references."], ["2022", "CVE-2022-2946", "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5"], ["2022", "CVE-2022-32938", "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. A shortcut may be able to check the existence of an arbitrary path on the file system.", "https://github.com/iCMDdev/iCMDdev", "No PoCs from references."], ["2022", "CVE-2022-2645", "A vulnerability has been found in SourceCodester Garage Management System and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edituser.php. The manipulation of the argument id with the input 1\\\"> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205573 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205573"], ["2022", "CVE-2022-27146", "GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vulnerability in function gf_isom_apple_enum_tag.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2120"], ["2022", "CVE-2022-4349", "A vulnerability classified as problematic has been found in CTF-hacker pwn. This affects an unknown part of the file delete.html. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-215109 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://gitee.com/CTF-hacker/pwn/issues/I5WAAB"], ["2022", "CVE-2022-1828", "The PDF24 Articles To PDF WordPress plugin through 4.2.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8"], ["2022", "CVE-2022-31856", "Newsletter Module v3.x was discovered to contain a SQL injection vulnerability via the zemez_newsletter_email parameter at /index.php.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50942"], ["2022", "CVE-2022-25344", "An XSS issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application doesn't properly check parameters, sent in a /dvcset/sysset/set.cgi POST request via the arg01.Hostname field, before saving them on the server. In addition, the JavaScript malicious content is then reflected back to the end user and executed by the web browser.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-34030", "Nginx NJS v0.7.5 was discovered to contain a segmentation violation via njs_djb_hash at src/njs_djb_hash.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/540"], ["2022", "CVE-2022-43551", "A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.", "https://github.com/1g-v/DevSec_Docker_lab https://github.com/ARPSyndicate/cvemon https://github.com/L-ivan7/-.-DevSec_Docker https://github.com/a23au/awe-base-images https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/fokypoky/places-list https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-23648", "containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd\u2019s CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd\u2019s CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground https://github.com/brant-ruan/poc-demo https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/raesene/CVE-2022-23648-POC https://github.com/soosmile/POC https://github.com/ssst0n3/docker_archive https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html"], ["2022", "CVE-2022-47158", "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pakpobox alfred24 Click & Collect plugin <=\u00a01.1.7 versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/me2nuk/me2nuk", "No PoCs from references."], ["2022", "CVE-2022-0447", "The Post Grid WordPress plugin before 2.1.16 does not sanitise and escape the post_types parameter before outputting it back in the response of the post_grid_update_taxonomies_terms_by_posttypes AJAX action, available to any authenticated users, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe"], ["2022", "CVE-2022-40738", "An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, called from AP4_EsDescriptor::WriteFields and AP4_Expandable::Write.", "https://github.com/karimhabush/cyberowl", "https://github.com/axiomatic-systems/Bento4/issues/756"], ["2022", "CVE-2022-24028", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the libcommonprod.so binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-33650", "Azure Site Recovery Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20421", "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "https://github.com/0xkol/badspin https://github.com/ARPSyndicate/cvemon https://github.com/johe123qwe/github-trending https://github.com/nomi-sec/PoC-in-GitHub https://github.com/xairy/linux-kernel-exploitation", "No PoCs from references."], ["2022", "CVE-2022-29213", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-31584", "The stonethree/s3label repository through 2019-08-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0995", "An out-of-bounds (OOB) memory write flaw was found in the Linux kernel\u2019s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.", "https://github.com/1nzag/CVE-2022-0995 https://github.com/ARPSyndicate/cvemon https://github.com/Al1ex/LinuxEelvation https://github.com/AndreevSemen/CVE-2022-0995 https://github.com/Awrrays/Pentest-Tips https://github.com/B0nfee/CVE-2022-0995 https://github.com/Bonfee/CVE-2022-0995 https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Ch4nc3n/PublicExploitation https://github.com/GhostTroops/TOP https://github.com/JERRY123S/all-poc https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/Metarget/metarget https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/WhooAmii/POC_to_review https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/frankzappasmustache/starred-repos https://github.com/goldenscale/GS_GithubMirror https://github.com/hktalent/TOP https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/ssr-111/linux-kernel-exploitation https://github.com/taielab/awesome-hacking-lists https://github.com/tanjiti/sec_profile https://github.com/trhacknon/Pocingit https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zzcentury/PublicExploitation", "http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb"], ["2022", "CVE-2022-37088", "H3C H200 H200V100R004 was discovered to contain a stack overflow via the function SetAP5GWifiById.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4"], ["2022", "CVE-2022-24168", "Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a command injection vulnerability in the function formSetIpGroup. This vulnerability allows attackers to execute arbitrary commands via the IPGroupStartIP and IPGroupEndIP parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-2890", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5d228a33-eda3-4cff-91da-7bc43e6636da"], ["2022", "CVE-2022-2402", "The vulnerability in the driver dlpfde.sys enables a user logged into the system to perform system calls leading to kernel stack overflow, resulting in a system crash, for instance, a BSOD.", "https://github.com/SecurityAndStuff/CVE-2022-2402 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/securityandstuff/CVE-2022-2402 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-0507", "Found a potential security vulnerability inside the Pandora API. Affected Pandora FMS version range: all versions of NG version, up to OUM 759. This vulnerability could allow an attacker with authenticated IP to inject SQL.", "https://github.com/ARPSyndicate/cvemon", "https://khoori.org/posts/cve-2022-0507/"], ["2022", "CVE-2022-47389", "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-0696", "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f"], ["2022", "CVE-2022-1968", "Use After Free in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b"], ["2022", "CVE-2022-36075", "Nextcloud files access control is a nextcloud app to manage access control for files. Users with limited access can see file names in certain cases where they do not have privilege to do so. This issue has been addressed and it is recommended that the Nextcloud Files Access Control app is upgraded to 1.12.2, 1.13.1 or 1.14.1. There are no known workarounds for this issue", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0787", "The Limit Login Attempts (Spam Protection) WordPress plugin before 5.1 does not sanitise and escape some parameters before using them in SQL statements via AJAX actions (available to unauthenticated users), leading to SQL Injections", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd"], ["2022", "CVE-2022-41794", "A heap based buffer overflow vulnerability exists in the PSD thumbnail resource parsing code of OpenImageIO 2.3.19.0. A specially-crafted PSD file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626"], ["2022", "CVE-2022-27181", "On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when APM is configured on a virtual server and the associated access profile is configured with APM AAA NTLM Auth, undisclosed requests can cause an increase in internal resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25315", "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Nivaskumark/external_expat_v2.1.0_CVE-2022-25315 https://github.com/SYRTI/POC_to_review https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25315 https://github.com/WhooAmii/POC_to_review https://github.com/fokypoky/places-list https://github.com/gatecheckdev/gatecheck https://github.com/hshivhare67/external_expat_v2.1.0_CVE-2022-25315 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/libexpat/libexpat/pull/559 https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-25084", "TOTOLink T6 V5.9c.4085_B20190428 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "https://github.com/0day404/vulnerability-poc https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/ArrestX/--POC https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md"], ["2022", "CVE-2022-20470", "In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191", "https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-31495", "LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php return_page XSS.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-31704", "The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution.", "https://github.com/getdrive/PoC https://github.com/horizon3ai/CVE-2023-34051 https://github.com/horizon3ai/vRealizeLogInsightRCE https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html"], ["2022", "CVE-2022-40769", "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.", "https://github.com/ARPSyndicate/cvemon https://github.com/PLSRcoin/CVE-2022-40769 https://github.com/nomi-sec/PoC-in-GitHub", "https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c"], ["2022", "CVE-2022-0884", "The Profile Builder WordPress plugin before 3.6.8 does not sanitise and escape Form Fields titles and description, which could allow high privilege user such as admin to perform Criss-Site Scripting attacks even when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba"], ["2022", "CVE-2022-37208", "JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/AgainstTheLight/CVE-2022-37208 https://github.com/AgainstTheLight/CVE-2022-37209 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md"], ["2022", "CVE-2022-2981", "The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305"], ["2022", "CVE-2022-24139", "In IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -> SYSTEM or from Local ADMIN-> Domain ADMIN depending on the user and named pipe that is used.", "https://github.com/ARPSyndicate/cvemon https://github.com/tomerpeled92/CVE", "https://github.com/tomerpeled92/CVE/"], ["2022", "CVE-2022-29242", "GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-33741", "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1939", "The Allow svg files WordPress plugin before 1.1 does not properly validate uploaded files, which could allow high privilege users such as admin to upload PHP files even when they are not allowed to", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f"], ["2022", "CVE-2022-36024", "py-cord is a an API wrapper for Discord written in Python. Bots creating using py-cord version 2.0.0 are vulnerable to remote shutdown if they are added to the server with the `application.commands` scope without the `bot` scope. Currently, it appears that all public bots that use slash commands are affected. This issue has been patched in version 2.0.1. There are currently no recommended workarounds - please upgrade to a patched version.", "https://github.com/LDH0094/security-vulnerability-py-cord", "No PoCs from references."], ["2022", "CVE-2022-34121", "Cuppa CMS v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the component /templates/default/html/windows/right.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/CuppaCMS/CuppaCMS/issues/18 https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates"], ["2022", "CVE-2022-2453", "Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a"], ["2022", "CVE-2022-30528", "SQL Injection vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to execute arbitrary commands via the username parameter to /system/user/modules/mod_users/controller.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0imet/pyfetch", "No PoCs from references."], ["2022", "CVE-2022-0877", "Cross-site Scripting (XSS) - Stored in GitHub repository bookstackapp/bookstack prior to v22.02.3.", "https://github.com/416e6e61/My-CVEs https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c"], ["2022", "CVE-2022-22586", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38314", "Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the urls parameter at /goform/saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1"], ["2022", "CVE-2022-44002", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient output encoding of user-supplied data, the web application is vulnerable to cross-site scripting (XSS) at various locations.", "No PoCs found on GitHub currently.", "https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-1418", "The Social Stickers WordPress plugin through 2.2.9 does not have CSRF checks in place when updating its Social Network settings, and does not escape some of these fields, which could allow attackers to make a logged-in admin change them and lead to Stored Cross-Site Scripting issues.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559"], ["2022", "CVE-2022-20712", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-36197", "BigTree CMS 4.4.16 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted PDF file.", "No PoCs found on GitHub currently.", "https://github.com/bigtreecms/BigTree-CMS/issues/392"], ["2022", "CVE-2022-20811", "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27172", "A hard-coded password vulnerability exists in the console infactory functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted network request can lead to privileged operation execution. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496"], ["2022", "CVE-2022-34092", "Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via svg2img.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wagnerdracha/ProofOfConcept", "https://github.com/edmarmoretti/i3geo/issues/3 https://github.com/saladesituacao/i3geo/issues/3 https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23"], ["2022", "CVE-2022-25077", "TOTOLink A3100R V4.1.2cu.5050_B20200504 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3100R/README.md"], ["2022", "CVE-2022-2671", "A vulnerability was found in SourceCodester Garage Management System and classified as critical. This issue affects some unknown processing of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205655.", "https://github.com/ARPSyndicate/cvemon https://github.com/skydiver-jay/WaterHole", "https://vuldb.com/?id.205655"], ["2022", "CVE-2022-40899", "An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.", "https://github.com/ARPSyndicate/cvemon", "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"], ["2022", "CVE-2022-2731", "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/20b8d5c5-0764-4f0b-8ab3-b9f6b857175e"], ["2022", "CVE-2022-0634", "The ThirstyAffiliates WordPress plugin before 3.10.5 lacks authorization checks in the ta_insert_external_image action, allowing a low-privilege user (with a role as low as Subscriber) to add an image from an external URL to an affiliate link. Further the plugin lacks csrf checks, allowing an attacker to trick a logged in user to perform the action by crafting a special request.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3"], ["2022", "CVE-2022-20951", "A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network.
{{value}} [\"%7b%7bvalue%7d%7d\"])}]]", "https://github.com/fardeen-ahmed/Bug-bounty-Writeups", "No PoCs from references."], ["2022", "CVE-2022-25137", "A command injection vulnerability in the function recvSlaveUpgstatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-22757", "Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. *This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-41924", "A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code. In the Tailscale Windows client, the local API was bound to a local TCP socket, and communicated with the Windows client GUI in cleartext with no Host header verification. This allowed an attacker-controlled website visited by the node to rebind DNS to an attacker-controlled DNS server, and then make local API requests in the client, including changing the coordination server to an attacker-controlled coordination server. An attacker-controlled coordination server can send malicious URL responses to the client, including pushing executables or installing an SMB share. These allow the attacker to remotely execute code on the node. All Windows clients prior to version v.1.32.3 are affected. If you are running Tailscale on Windows, upgrade to v1.32.3 or later to remediate the issue.", "https://github.com/fardeen-ahmed/Bug-bounty-Writeups", "https://emily.id.au/tailscale https://tailscale.com/security-bulletins/#ts-2022-004"], ["2022", "CVE-2022-1558", "The Curtain WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166839/ https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d"], ["2022", "CVE-2022-46047", "AeroCMS v0.0.1 is vulnerable to SQL Injection via the delete parameter.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/categories_delete_sql_injection/categories_delete_sql_injection.md"], ["2022", "CVE-2022-31526", "The ThundeRatz/ThunderDocs repository through 2020-05-01 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0937", "Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5"], ["2022", "CVE-2022-2832", "A flaw was found in Blender 3.3.0. A null pointer dereference exists in source/blender/gpu/opengl/gl_backend.cc that may lead to loss of confidentiality and integrity.", "https://github.com/5angjun/5angjun https://github.com/ARPSyndicate/cvemon", "https://developer.blender.org/D15463 https://developer.blender.org/T99706"], ["2022", "CVE-2022-30858", "An issue was discovered in ngiflib 0.4. There is SEGV in SDL_LoadAnimatedGif when use SDLaffgif. poc : ./SDLaffgif CA_file2_0", "https://github.com/Marsman1996/pocs", "https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md https://github.com/miniupnp/ngiflib/issues/22"], ["2022", "CVE-2022-0826", "The WP Video Gallery WordPress plugin through 1.7.1 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action, leading to an SQL Injection exploitable by unauthenticated users", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5"], ["2022", "CVE-2022-2923", "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2"], ["2022", "CVE-2022-0725", "A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.", "https://github.com/ARPSyndicate/cvemon https://github.com/ByteHackr/keepass_poc https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://bugzilla.redhat.com/show_bug.cgi?id=2052696"], ["2022", "CVE-2022-36257", "A SQL injection vulnerability in UserDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as \"users\", \"pass\", etc.", "No PoCs found on GitHub currently.", "https://gist.github.com/ziyishen97/ff3816032a76796f45368ed243ab3343 https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-27123", "Employee Performance Evaluation v1.0 was discovered to contain a SQL injection vulnerability via the email parameter.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "No PoCs from references."], ["2022", "CVE-2022-25026", "A Server-Side Request Forgery (SSRF) in Rocket TRUfusion Portal v7.9.2.1 allows remote attackers to gain access to sensitive resources on the internal network via a crafted HTTP request to /trufusionPortal/upDwModuleProxy.", "No PoCs found on GitHub currently.", "https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/"], ["2022", "CVE-2022-27063", "AeroCMS v0.0.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability via view_all_comments.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comments text field.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc"], ["2022", "CVE-2022-36317", "When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 103.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1759951 https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-22805", "A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists that could cause remote code execution when an improperly handled TLS packet is reassembled. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)", "No PoCs found on GitHub currently.", "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02"], ["2022", "CVE-2022-25166", "An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4cksploit/CVEs-master https://github.com/RhinoSecurityLabs/CVEs https://github.com/merlinepedra/RHINOECURITY-CVEs https://github.com/merlinepedra25/RHINOSECURITY-CVEs", "https://github.com/RhinoSecurityLabs/CVEs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/"], ["2022", "CVE-2022-40988", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'ipv6 static dns WORD WORD WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-0665", "Path Traversal in GitHub repository pimcore/pimcore prior to 10.3.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3"], ["2022", "CVE-2022-30918", "H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the Asp_SetTelnet parameter at /goform/aspForm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/8"], ["2022", "CVE-2022-0966", "Stored XSS via File Upload in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.4.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe"], ["2022", "CVE-2022-2863", "The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/incogbyte/incogbyte https://github.com/rodnt/rodnt https://github.com/unp4ck/unp4ck", "http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5"], ["2022", "CVE-2022-22706", "Arm Mali GPU Kernel Driver allows a non-privileged user to achieve write access to read-only memory pages. This affects Midgard r26p0 through r31p0, Bifrost r0p0 through r35p0, and Valhall r19p0 through r35p0.", "https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-1698", "Allowing long password leads to denial of service in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f4ab747b-e89a-4514-9432-ac1ea56639f3"], ["2022", "CVE-2022-1509", "Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338"], ["2022", "CVE-2022-46387", "ConEmu through 220807 and Cmder before 1.3.21 report the title of the terminal, including control characters, which allows an attacker to change the title and then execute it as commands.", "https://github.com/dgl/houdini-kubectl-poc", "No PoCs from references."], ["2022", "CVE-2022-41975", "RealVNC VNC Server before 6.11.0 and VNC Viewer before 6.22.826 on Windows allow local privilege escalation via MSI installer Repair mode.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31577", "The longmaoteamtf/audio_aligner_app repository through 2020-01-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-28881", "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the aerdl.dll component used in certain WithSecure products unpacker function crashes which leads to scanning engine crash. The exploit can be triggered remotely by an attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/karimhabush/cyberowl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-35770", "Windows NTLM Spoofing Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/danielcunn123/Security", "No PoCs from references."], ["2022", "CVE-2022-24404", "Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-26501", "Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2).", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/musil/100DaysOfHomeLab2022", "No PoCs from references."], ["2022", "CVE-2022-26690", "Description: A race condition was addressed with additional validation. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to modify protected parts of the file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jhftss/POC", "No PoCs from references."], ["2022", "CVE-2022-1096", "Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mav3r1ck0x1/Chrome-and-Edge-Version-Dumper https://github.com/Maverick-cmd/Chrome-and-Edge-Version-Dumper https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/oxy-compsci/tech-in-the-news https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-22108", "In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108"], ["2022", "CVE-2022-36519", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function AddWlanMacList.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9"], ["2022", "CVE-2022-26993", "Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pppoe function via the pppoeUserName, pppoePassword, and pppoe_Service parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-21361", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Sample apps). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/thiscodecc/thiscodecc", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28413", "Car Driving School Management System v1.0 was discovered to contain a SQL injection vulnerability via /cdsms/classes/Master.php?f=delete_enrollment.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md"], ["2022", "CVE-2022-28782", "Improper access control vulnerability in Contents To Window prior to SMR May-2022 Release 1 allows physical attacker to install package before completion of Setup wizard. The patch blocks entry point of the vulnerability.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-30155", "Windows Kernel Denial of Service Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html"], ["2022", "CVE-2022-32050", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the cloneMac parameter in the function FUN_0041af40.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg"], ["2022", "CVE-2022-36459", "TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md"], ["2022", "CVE-2022-41138", "In Zutty before 0.13, DECRQSS in text written to the terminal can achieve arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "https://bugs.gentoo.org/868495"], ["2022", "CVE-2022-1247", "An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh->use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their \u201ccount\u201d and \u201cuse\u201d are zero.", "No PoCs found on GitHub currently.", "https://bugzilla.redhat.com/show_bug.cgi?id=2066799"], ["2022", "CVE-2022-31239", "Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, and 9.3.0.6, contain sensitive data in log files vulnerability. A privileged local user may potentially exploit this vulnerability, leading to disclosure of this sensitive data.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en"], ["2022", "CVE-2022-22048", "BitLocker Security Feature Bypass Vulnerability", "https://github.com/Wack0/bitlocker-attacks", "No PoCs from references."], ["2022", "CVE-2022-26441", "In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420044; Issue ID: GN20220420044.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-21330", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-35822", "Windows Defender Credential Guard Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/SettRaziel/bsi_cert_bot https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/168331/Windows-Credential-Guard-TGT-Renewal-Information-Disclosure.html"], ["2022", "CVE-2022-41029", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'wlan filter mac address WORD descript WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-36408", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-31181. Reason: This candidate is a duplicate of CVE-2022-31181. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2022-31181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/drkbcn/lblfixer_cve_2022_31181 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-41169", "Due to lack of proper memory management, when a victim opens manipulated CATIA5 Part (.catpart, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-21270", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-42300", "An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server nbars process can be crashed resulting in a denial of service. (Note: the watchdog service will automatically restart the process.)", "No PoCs found on GitHub currently.", "https://www.veritas.com/content/support/en_US/security/VTS22-013#M2"], ["2022", "CVE-2022-28990", "WASM3 v0.5.0 was discovered to contain a heap overflow via the component /wabt/bin/poc.wasm.", "No PoCs found on GitHub currently.", "https://github.com/wasm3/wasm3/issues/323"], ["2022", "CVE-2022-39975", "The Layout module in Liferay Portal v7.3.3 through v7.4.3.34, and Liferay DXP 7.3 before update 10, and 7.4 before update 35 does not check user permission before showing the preview of a \"Content Page\" type page, allowing attackers to view unpublished \"Content Page\" pages via URL manipulation.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-26781", "Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_print` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481"], ["2022", "CVE-2022-46498", "Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the doc_number parameter at his_admin_view_single_employee.php.", "https://github.com/ASR511-OO7/CVE-2022-46498", "No PoCs from references."], ["2022", "CVE-2022-1216", "The Advanced Image Sitemap WordPress plugin through 1.2 does not sanitise and escape the PHP_SELF PHP variable before outputting it back in an attribute in an admin page, leading to Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd"], ["2022", "CVE-2022-46709", "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13, iOS 16. An app may be able to execute arbitrary code with kernel privileges", "https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-31268", "A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/Marcuccio/kevin", "https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md"], ["2022", "CVE-2022-3082", "The miniOrange Discord Integration WordPress plugin before 2.1.6 does not have authorisation and CSRF in some of its AJAX actions, allowing any logged in users, such as subscriber to call them, and disable the app for example", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f"], ["2022", "CVE-2022-4751", "The Word Balloon WordPress plugin before 4.19.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478"], ["2022", "CVE-2022-26931", "Windows Kerberos Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/HackingCost/AD_Pentest https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest", "No PoCs from references."], ["2022", "CVE-2022-30326", "An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The network pre-shared key field on the web interface is vulnerable to XSS. An attacker can use a simple XSS payload to crash the basic.config page of the web interface.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ https://research.nccgroup.com/?research=Technical+advisories"], ["2022", "CVE-2022-24834", "Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.", "https://github.com/convisolabs/CVE-2022-24834 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-32223", "Node.js is vulnerable to Hijack Execution Flow: DLL Hijacking under certain conditions on Windows platforms.This vulnerability can be exploited if the victim has the following dependencies on a Windows machine:* OpenSSL has been installed and \u201cC:\\Program Files\\Common Files\\SSL\\openssl.cnf\u201d exists.Whenever the above conditions are present, `node.exe` will search for `providers.dll` in the current user directory.After that, `node.exe` will try to search for `providers.dll` by the DLL Search Order in Windows.It is possible for an attacker to place the malicious file `providers.dll` under a variety of paths and exploit this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/ianyong/cve-2022-32223 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-42122", "A SQL injection vulnerability in the Friendly Url module in Liferay Portal 7.3.7, and Liferay DXP 7.3 fix pack 2 through update 4 allows attackers to execute arbitrary SQL commands via a crafted payload injected into the `title` field of a friendly URL.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17520"], ["2022", "CVE-2022-26632", "Multi-Vendor Online Groceries Management System v1.0 was discovered to contain a blind SQL injection vulnerability via the id parameter in /products/view_product.php.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50739"], ["2022", "CVE-2022-1034", "There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7"], ["2022", "CVE-2022-3131", "The Search Logger WordPress plugin through 0.9 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d"], ["2022", "CVE-2022-1174", "A potential DoS vulnerability was discovered in Gitlab CE/EE versions 13.7 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to trigger high CPU usage via a special crafted input added in Issues, Merge requests, Milestones, Snippets, Wiki pages, etc.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/338721"], ["2022", "CVE-2022-38678", "In contacts service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-25989", "An authentication bypass vulnerability exists in the libxm_av.so getpeermac() functionality of Anker Eufy Homebase 2 2.1.8.5h. A specially-crafted DHCP packet can lead to authentication bypass. An attacker can DHCP poison to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479"], ["2022", "CVE-2022-35503", "Improper verification of a user input in Open Source MANO v7-v12 allows an authenticated attacker to execute arbitrary code within the LCM module container via a Virtual Network Function (VNF) descriptor. An attacker may be able execute code to change the normal execution of the OSM components, retrieve confidential information, or gain access other parts of a Telco Operator infrastructure other than OSM itself.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://osm.etsi.org/ https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure"], ["2022", "CVE-2022-24677", "Admin.php in HYBBS2 through 2.3.2 allows remote code execution because it writes plugin-related configuration information to conf.php.", "No PoCs found on GitHub currently.", "https://github.com/hyyyp/HYBBS2/issues/34"], ["2022", "CVE-2022-39986", "A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.", "https://github.com/WhiteOwl-Pub/RaspAP-CVE-2022-39986-PoC https://github.com/getdrive/PoC https://github.com/mind2hex/CVE-2022-39986 https://github.com/mind2hex/RaspAP_Hunter https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tucommenceapousser/RaspAP-CVE-2022-39986-PoC", "http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2"], ["2022", "CVE-2022-37797", "In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.", "No PoCs found on GitHub currently.", "https://redmine.lighttpd.net/issues/3165"], ["2022", "CVE-2022-21283", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26871", "An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/v-p-b/avpwn", "No PoCs from references."], ["2022", "CVE-2022-0189", "The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014"], ["2022", "CVE-2022-0218", "The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-35991", "TensorFlow is an open source platform for machine learning. When `TensorListScatter` and `TensorListScatterV2` receive an `element_shape` of a rank greater than one, they give a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit bb03fdf4aae944ab2e4b35c7daa051068a8b7f61. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-48579", "UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.", "No PoCs found on GitHub currently.", "https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee"], ["2022", "CVE-2022-4611", "A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability.", "https://github.com/Phamchie/CVE-2022-4611 https://github.com/fgsoftware1/CVE-2022-4611 https://github.com/nomi-sec/PoC-in-GitHub", "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"], ["2022", "CVE-2022-4580", "The Twenty20 Image Before-After WordPress plugin through 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca"], ["2022", "CVE-2022-21392", "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Policy Framework). Supported versions that are affected are 13.4.0.0 and 13.5.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 8.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", "https://github.com/mbadanoiu/CVE-2022-21392 https://github.com/nomi-sec/PoC-in-GitHub", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26960", "connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-45482", "Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated users to easily and quickly brute force the PIN and execute arbitrary commands. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "https://github.com/ARPSyndicate/cvemon https://github.com/M507/nmap-vulnerability-scan-scripts", "https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/"], ["2022", "CVE-2022-28771", "Due to missing authentication check, SAP Business one License service API - version 10.0 allows an unauthenticated attacker to send malicious http requests over the network. On successful exploitation, an attacker can break the whole application making it inaccessible.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-39405", "Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Authentication Engine). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Access Manager accessible data. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-24865", "HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76/"], ["2022", "CVE-2022-35880", "Four format string injection vulnerabilities exist in the UPnP logging functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted UPnP negotiation can lead to memory corruption, information disclosure, and denial of service. An attacker can host a malicious UPnP service to trigger these vulnerabilities.This vulnerability arises from format string injection via `NewInternalClient` XML tag, as used within the `DoUpdateUPnPbyService` action handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583"], ["2022", "CVE-2022-32272", "OPSWAT MetaDefender Core before 5.1.2, MetaDefender ICAP before 4.12.1, and MetaDefender Email Gateway Security before 5.6.1 have incorrect access control, resulting in privilege escalation.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html"], ["2022", "CVE-2022-4700", "The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_activate_required_theme' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to activate the 'royal-elementor-kit' theme. If no such theme is installed doing so can also impact site availability as the site attempts to load a nonexistent theme.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4491", "The WP-Table Reloaded WordPress plugin through 1.9.4 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc"], ["2022", "CVE-2022-1065", "A vulnerability within the authentication process of Abacus ERP allows a remote attacker to bypass the second authentication factor. This issue affects: Abacus ERP v2022 versions prior to R1 of 2022-01-15; v2021 versions prior to R4 of 2022-01-15; v2020 versions prior to R6 of 2022-01-15; v2019 versions later than R5 (service pack); v2018 versions later than R5 (service pack). This issue does not affect: Abacus ERP v2019 versions prior to R5 of 2020-03-15; v2018 versions prior to R7 of 2020-04-15; v2017 version and prior versions and prior versions.", "No PoCs found on GitHub currently.", "https://www.redguard.ch/advisories/abacus_mfa_bypass.txt"], ["2022", "CVE-2022-4803", "Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286"], ["2022", "CVE-2022-25898", "The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.", "https://github.com/ARPSyndicate/cvemon https://github.com/KarthickSivalingam/jsrsasign-github https://github.com/coachaac/jsrsasign-npm https://github.com/diotoborg/laudantium-itaque-esse https://github.com/f1stnpm2/nobis-minima-odio https://github.com/firanorg/et-non-error https://github.com/kjur/jsrsasign https://github.com/zibuthe7j11/repellat-sapiente-quas", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896 https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122"], ["2022", "CVE-2022-28872", "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop.", "https://github.com/KirtiRamchandani/KirtiRamchandani https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-40076", "Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: fromSetWifiGusetBasic.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4"], ["2022", "CVE-2022-28932", "D-Link DSL-G2452DG HW:T1\\\\tFW:ME_2.00 was discovered to contain insecure permissions.", "https://github.com/1759134370/iot", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-26723", "A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution.", "https://github.com/felix-pb/remote_pocs", "No PoCs from references."], ["2022", "CVE-2022-4640", "A vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216499.", "No PoCs found on GitHub currently.", "https://gitee.com/mingSoft/MCMS/issues/I65KI5"], ["2022", "CVE-2022-26820", "Windows DNS Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45653", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the page parameter in the fromNatStaticSetting function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromNatStaticSetting/fromNatStaticSetting_page.md"], ["2022", "CVE-2022-23046", "PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the \"subnet\" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php", "https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bernauers/CVE-2022-23046 https://github.com/binganao/vulns-2022 https://github.com/cr0ss2018/cr0ss2018 https://github.com/dnr6419/CVE-2022-23046 https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/ezelnur6327 https://github.com/hadrian3689/phpipam_1.4.4 https://github.com/jcarabantes/CVE-2022-23046 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rodnt/rodnt https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html https://fluidattacks.com/advisories/mercury/"], ["2022", "CVE-2022-21244", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30130", ".NET Framework Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-32035", "Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formMasterMng.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng"], ["2022", "CVE-2022-4547", "The Conditional Payment Methods for WooCommerce WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by [high privilege users such as admin|users with a role as low as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99"], ["2022", "CVE-2022-29959", "Emerson OpenBSI through 2022-04-29 mishandles credential storage. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. This environment provides access control functionality through user authentication and privilege management. The credentials for various users are stored insecurely in the SecUsers.ini file by using a simple string transformation rather than a cryptographic mechanism.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-1222", "Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.", "https://github.com/ARPSyndicate/cvemon https://github.com/tianstcht/tianstcht", "https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d"], ["2022", "CVE-2022-44638", "In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html https://gitlab.freedesktop.org/pixman/pixman/-/issues/63"], ["2022", "CVE-2022-3327", "Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1"], ["2022", "CVE-2022-24521", "Windows Common Log File System Driver Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/AabyssZG/AWD-Guide https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/fr4nkxixi/CVE-2022-24481-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/robotMD5/CVE-2022-24481-POC", "No PoCs from references."], ["2022", "CVE-2022-42274", "NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can cause a buffer overflow and cause a denial of service or gain code execution.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-39801", "SAP GRC Access control Emergency Access Management allows an authenticated attacker to access a Firefighter session even after it is closed in Firefighter Logon Pad. This attack can be launched only within the firewall. On successful exploitation the attacker can gain access to admin session and completely compromise the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-26564", "HotelDruid Hotel Management Software v3.0.3 contains a cross-site scripting (XSS) vulnerability via the prezzoperiodo4 parameter in creaprezzi.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC", "No PoCs from references."], ["2022", "CVE-2022-47983", "IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 243161.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-3267", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2"], ["2022", "CVE-2022-4796", "Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6"], ["2022", "CVE-2022-43289", "Deark v.1.6.2 was discovered to contain a stack overflow via the do_prism_read_palette() function at /modules/atari-img.c.", "No PoCs found on GitHub currently.", "https://github.com/jsummers/deark/issues/52"], ["2022", "CVE-2022-4407", "Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.9.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b"], ["2022", "CVE-2022-37913", "Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21304", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32175", "In AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32175"], ["2022", "CVE-2022-45414", "If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4687", "Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b908377f-a61b-432c-8e6a-c7498da69788"], ["2022", "CVE-2022-34568", "SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c.", "https://github.com/fusion-scan/fusion-scan.github.io", "No PoCs from references."], ["2022", "CVE-2022-27488", "A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6.0.x FortiRecorder version 6.4.0 through 6.4.2, 6.0.x, 2.7.x, 2.6.x, FortiNDR version 1.x.x allows a remote unauthenticated attacker to execute commands on the CLI via\u00a0tricking an authenticated administrator to execute malicious GET requests.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-21184", "An information disclosure vulnerability exists in the License registration functionality of Bachmann Visutec GmbH Atvise 3.5.4, 3.6 and 3.7. A plaintext HTTP request can lead to a disclosure of login credentials. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461"], ["2022", "CVE-2022-37802", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromNatStaticSetting.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6"], ["2022", "CVE-2022-23081", "In openlibrary versions deploy-2016-07-0 through deploy-2021-12-22 are vulnerable to Reflected XSS.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23081"], ["2022", "CVE-2022-45505", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md"], ["2022", "CVE-2022-45997", "Tenda W20E V16.01.0.6(3392) is vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/1"], ["2022", "CVE-2022-35604", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-35601. Reason: This candidate is a duplicate of CVE-2022-35601. Notes: All CVE users should reference CVE-2022-35601 instead of this candidate.", "No PoCs found on GitHub currently.", "https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-47892", "All versions of NetMan 204 could allow an unauthenticated remote attacker to read a file (config.cgi) containing sensitive information, like credentials.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-1273", "The Import WP WordPress plugin before 2.4.6 does not validate the imported file in some cases, allowing high privilege users such as admin to upload arbitrary files (such as PHP), leading to RCE", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603"], ["2022", "CVE-2022-33099", "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.", "https://github.com/ARPSyndicate/cvemon https://github.com/yikesoftware/yikesoftware", "https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf https://lua-users.org/lists/lua-l/2022-05/msg00035.html"], ["2022", "CVE-2022-3376", "Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed"], ["2022", "CVE-2022-1333", "Mattermost Playbooks plugin v1.24.0 and earlier fails to properly check the limit on the number of webhooks, which allows authenticated and authorized users to create a specifically drafted Playbook which could trigger a large amount of webhook requests leading to Denial of Service.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-44729", "Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.", "https://github.com/nbxiglk0/nbxiglk0", "No PoCs from references."], ["2022", "CVE-2022-3236", "A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/karimhabush/cyberowl https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pipiscrew/timeline https://github.com/wr0x00/Lsploit", "No PoCs from references."], ["2022", "CVE-2022-40320", "cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read.", "No PoCs found on GitHub currently.", "https://github.com/libconfuse/libconfuse/issues/163"], ["2022", "CVE-2022-21355", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28427", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/inbox.php&action=read&msgid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-29848", "In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1280", "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.", "https://github.com/ARPSyndicate/cvemon https://github.com/cadjai/redhat-cve-to-csv", "https://www.openwall.com/lists/oss-security/2022/04/12/3"], ["2022", "CVE-2022-1111", "A business logic error in Project Import in GitLab CE/EE versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.0 prior to 14.7.7 under certain conditions caused imported projects to show an incorrect user in the 'Access Granted' column in the project membership pages", "https://github.com/Trinity-SYT-SECURITY/NLP_jieba", "No PoCs from references."], ["2022", "CVE-2022-3014", "A vulnerability classified as problematic was found in SourceCodester Simple Task Managing System. This vulnerability affects unknown code. The manipulation of the argument student_add leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-207424.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.207424"], ["2022", "CVE-2022-28906", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the langtype parameter in /setting/setLanguageCfg.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/2"], ["2022", "CVE-2022-40102", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDset function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-26486", "An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-26717", "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/taielab/awesome-hacking-lists https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit https://github.com/trhacknon/CVE-2022-26717-Safari-WebGL-Exploit https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-30203", "Windows Boot Manager Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45667", "Tenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md"], ["2022", "CVE-2022-2378", "The Easy Student Results WordPress plugin through 2.2.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596"], ["2022", "CVE-2022-23072", "In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in \u201cAdd to Cart\u201d functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the \u2018Name\u2019 parameter and clicks on the Add to Shopping Cart icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23072"], ["2022", "CVE-2022-4674", "The Ibtana WordPress plugin before 1.1.8.8 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b"], ["2022", "CVE-2022-2238", "A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24851", "LDAP Account Manager (LAM) is an open source web frontend for managing entries stored in an LDAP directory. The profile editor tool has an edit profile functionality, the parameters on this page are not properly sanitized and hence leads to stored XSS attacks. An authenticated user can store XSS payloads in the profiles, which gets triggered when any other user try to access the edit profile page. The pdf editor tool has an edit pdf profile functionality, the logoFile parameter in it is not properly sanitized and an user can enter relative paths like ../../../../../../../../../../../../../usr/share/icons/hicolor/48x48/apps/gvim.png via tools like burpsuite. Later when a pdf is exported using the edited profile the pdf icon has the image on that path(if image is present). Both issues require an attacker to be able to login to LAM admin interface. The issue is fixed in version 7.9.1.", "https://github.com/karimhabush/cyberowl", "https://github.com/LDAPAccountManager/lam/issues/170"], ["2022", "CVE-2022-23132", "During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-32246", "SAP Busines Objects Business Intelligence Platform (Visual Difference Application) - versions 420, 430, allows an authenticated attacker who has access to BI admin console to send crafted queries and extract data from the SQL backend. On successful exploitation, the attacker can cause limited impact on confidentiality and integrity of the application", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1051", "The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin for the Discy and Himer , does not sanitise and escape the city, phone or profile credentials fields when outputting it in the profile page, allowing any authenticated user to perform Cross-Site Scripting attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/V35HR4J/CVE-2022-1051 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765"], ["2022", "CVE-2022-3154", "The Woo Billingo Plus WordPress plugin before 4.4.5.4, Integration for Billingo & Gravity Forms WordPress plugin before 1.0.4, Integration for Szamlazz.hu & Gravity Forms WordPress plugin before 1.2.7 are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd"], ["2022", "CVE-2022-4837", "The CPO Companion WordPress plugin before 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da"], ["2022", "CVE-2022-35537", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: mac_5g and Newname, which leads to command injection in page /wifi_mesh.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_meshshtml-hidden-parameter-command-injection-in-wirelesscgi"], ["2022", "CVE-2022-45935", "Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command.This issue affects Apache James server version 3.7.2 and prior versions.", "https://github.com/Threekiii/CVE", "No PoCs from references."], ["2022", "CVE-2022-40153", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-29538", "RESI Gemini-Net Web 4.2 is affected by Improper Access Control in authorization logic. An unauthenticated user is able to access some critical resources.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-4625", "The Login Logout Menu WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15"], ["2022", "CVE-2022-45636", "An issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 allows attacker to unlock model(s) without authorization via arbitrary API requests.", "https://github.com/ARPSyndicate/cvemon https://github.com/WithSecureLabs/megafeis-palm", "https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636 https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co"], ["2022", "CVE-2022-30312", "The Trend Controls IC protocol through 2022-05-06 allows Cleartext Transmission of Sensitive Information. According to FSCT-2022-0050, there is a Trend Controls Inter-Controller (IC) protocol cleartext transmission of credentials issue. The affected components are characterized as: Inter-Controller (IC) protocol (57612/UDP). The potential impact is: Compromise of credentials. Several Trend Controls building automation controllers utilize the Inter-Controller (IC) protocol in for information exchange and automation purposes. This protocol offers authentication in the form of a 4-digit PIN in order to protect access to sensitive operations like strategy uploads and downloads as well as optional 0-30 character username and password protection for web page access protection. Both the PIN and usernames and passwords are transmitted in cleartext, allowing an attacker with passive interception capabilities to obtain these credentials. Credentials are transmitted in cleartext. An attacker who obtains Trend IC credentials can carry out sensitive engineering actions such as manipulating controller strategy or configuration settings. If the credentials in question are (re)used for other applications, their compromise could potentially facilitate lateral movement.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-47673", "An issue was discovered in Binutils addr2line before 2.39.3, function parse_module contains multiple out of bound reads which may cause a denial of service or other unspecified impacts.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29876"], ["2022", "CVE-2022-2269", "The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capability (by default admins), leading to an SQL injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65"], ["2022", "CVE-2022-4765", "The Portfolio for Elementor WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb"], ["2022", "CVE-2022-1391", "The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://packetstormsecurity.com/files/166533/ https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac"], ["2022", "CVE-2022-1000", "Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7.", "https://github.com/nomi-sec/PoC-in-GitHub", "https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424"], ["2022", "CVE-2022-4866", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff"], ["2022", "CVE-2022-3105", "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531"], ["2022", "CVE-2022-24492", "Remote Procedure Call Runtime Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-45875", "Improper validation of script alert plugin parameters in Apache DolphinScheduler to avoid remote command execution vulnerability. This issue affects Apache DolphinScheduler version 3.0.1 and prior versions; version 3.1.0 and prior versions.This attack can be performed only by authenticated users which can login to DS.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-42287", "NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can upload and download arbitrary files under certain circumstances, which may lead to denial of service, escalation of privileges, information disclosure and data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-23003", "When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario or incorrect choice of session key in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities"], ["2022", "CVE-2022-24960", "A use after free vulnerability was discovered in PDFTron SDK version 9.2.0. A crafted PDF can overwrite RIP with data previously allocated on the heap. This issue affects: PDFTron PDFTron SDK 9.2.0 on OSX; 9.2.0 on Linux; 9.2.0 on Windows.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28674", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16644.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-2098", "Weak Password Requirements in GitHub repository kromitgmbh/titra prior to 0.78.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a5d6c854-e158-49e9-bf40-bddc93dda7e6"], ["2022", "CVE-2022-45587", "Stack overflow vulnerability in function gmalloc in goo/gmem.cc in xpdf 4.04, allows local attackers to cause a denial of service.", "https://github.com/DiliLearngent/BugReport", "https://forum.xpdfreader.com/viewtopic.php?t=42361"], ["2022", "CVE-2022-2309", "NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.", "https://github.com/ARPSyndicate/cvemon https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/chainguard-dev/image-comparison", "https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba"], ["2022", "CVE-2022-21297", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30272", "The Motorola ACE1000 RTU through 2022-05-02 mishandles firmware integrity. It utilizes either the STS software suite or ACE1000 Easy Configurator for performing firmware updates. In case of the Easy Configurator, firmware updates are performed through access to the Web UI where file system, kernel, package, bundle, or application images can be installed. Firmware updates for the Front End Processor (FEP) module are performed via access to the SSH interface (22/TCP), where a .hex file image is transferred and a bootloader script invoked. File system, kernel, package, and bundle updates are supplied as RPM (RPM Package Manager) files while FEP updates are supplied as S-rec files. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-4605", "Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367"], ["2022", "CVE-2022-29689", "CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/singer/del.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/28#issue-1209044410"], ["2022", "CVE-2022-3065", "Improper Access Control in GitHub repository jgraph/drawio prior to 20.2.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76"], ["2022", "CVE-2022-1160", "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c"], ["2022", "CVE-2022-26766", "A certificate parsing issue was addressed with improved checks. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. A malicious app may be able to bypass signature validation.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ingan121/FSUntether https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zhuowei/CoreTrustDemo", "No PoCs from references."], ["2022", "CVE-2022-45915", "ILIAS before 7.16 allows OS Command Injection.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html http://seclists.org/fulldisclosure/2022/Dec/7 https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/"], ["2022", "CVE-2022-24663", "PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via WordPress shortcodes, which can be used by any authenticated user.", "https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-35517", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi"], ["2022", "CVE-2022-47950", "An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24723", "URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/"], ["2022", "CVE-2022-29458", "ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.", "https://github.com/1g-v/DevSec_Docker_lab https://github.com/ARPSyndicate/cvemon https://github.com/L-ivan7/-.-DevSec_Docker https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/adegoodyer/ubuntu https://github.com/cdupuis/image-api", "http://seclists.org/fulldisclosure/2022/Oct/41 https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html"], ["2022", "CVE-2022-3125", "The Frontend File Manager Plugin WordPress plugin before 21.3 allows any authenticated users, such as subscriber, to rename a file to an arbitrary extension, like PHP, which could allow them to basically be able to upload arbitrary files on the server and achieve RCE", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e"], ["2022", "CVE-2022-4846", "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3"], ["2022", "CVE-2022-1020", "The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/xaitax/cisa-catalog-known-vulnerabilities", "https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5"], ["2022", "CVE-2022-4745", "The WP Customer Area WordPress plugin before 8.1.4 does not have CSRF checks when performing some actions such as chmod, mkdir and copy, which could allow attackers to make a logged-in admin perform them and create arbitrary folders, copy file for example.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425"], ["2022", "CVE-2022-32237", "When a user opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-24820", "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-28734", "Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/ozun215/shim-review https://github.com/puzzleos/uefi-shim_review https://github.com/rhboot/shim-review https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-47653", "GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2349"], ["2022", "CVE-2022-26925", "Windows LSA Spoofing Vulnerability", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4654", "The Pricing Tables WordPress Plugin WordPress plugin before 3.2.3 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881"], ["2022", "CVE-2022-24931", "Improper access control vulnerability in dynamic receiver in ApkInstaller prior to SMR MAR-2022 Release allows unauthorized attackers to execute arbitrary activity without a proper permission", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-23052", "PeteReport Version 0.5 contains a Cross Site Request Forgery (CSRF) vulnerability allowing an attacker to trick users into deleting users, products, reports and findings on the application.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/jett/"], ["2022", "CVE-2022-45647", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeed parameter in the formSetClientState function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md"], ["2022", "CVE-2022-30223", "Windows Hyper-V Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40122", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/edit_customer_action.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection10.md https://github.com/zakee94/online-banking-system/issues/15"], ["2022", "CVE-2022-29549", "An issue was discovered in Qualys Cloud Agent 4.8.0-49. It executes programs at various full pathnames without first making ownership and permission checks (e.g., to help ensure that a program was installed by root) and without integrity checks (e.g., a checksum comparison against known legitimate programs). Also, the vendor recommendation is to install this agent software with root privileges. Thus, privilege escalation is possible on systems where any of these pathnames is controlled by a non-root user. An example is /opt/firebird/bin/isql, where the /opt/firebird directory is often owned by the firebird user.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html https://blog.qualys.com/vulnerabilities-threat-research"], ["2022", "CVE-2022-3174", "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce"], ["2022", "CVE-2022-1071", "User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3"], ["2022", "CVE-2022-42167", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetFirewallCfg.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md"], ["2022", "CVE-2022-28866", "Multiple Improper Access Control was discovered in Nokia AirFrame BMC Web GUI < R18 Firmware v4.13.00. It does not properly validate requests for access to (or editing of) data and functionality in all endpoints under /#settings/* and /api/settings/*. By not verifying the permissions for access to resources, it allows a potential attacker to view pages, with sensitive data, that are not allowed, and modify system configurations also causing DoS, which should be accessed only by user with administration profile, bypassing all controls (without checking for user identity).", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html"], ["2022", "CVE-2022-24772", "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23112", "A missing permission check in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers with Overall/Read access to connect to an attacker-specified SSH server using attacker-specified credentials.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45707", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsHijack function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HyEfIEpBj"], ["2022", "CVE-2022-2189", "The WP Video Lightbox WordPress plugin before 1.9.5 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546"], ["2022", "CVE-2022-2218", "Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5"], ["2022", "CVE-2022-39411", "Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Business Process Automation). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Transportation Management accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-37991", "Windows Kernel Elevation of Privilege Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html"], ["2022", "CVE-2022-21386", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4714", "The WP Dark Mode WordPress plugin before 4.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340"], ["2022", "CVE-2022-4485", "The Page-list WordPress plugin before 5.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7"], ["2022", "CVE-2022-33328", "Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove/` API is affected by a command injection vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573"], ["2022", "CVE-2022-1253", "Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1-other-strukturag/libde265"], ["2022", "CVE-2022-35624", "In Nordic nRF5 SDK for Mesh 5.0, a heap overflow vulnerability can be triggered by sending a series of segmented packets with SegO > SegN", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-45525", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the downaction parameter at /goform/CertListInfo.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md"], ["2022", "CVE-2022-32044", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the password parameter in the function FUN_00413f80.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/5.setWiFiRepeaterCfg"], ["2022", "CVE-2022-37822", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the function fromSetRouteStatic.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/3"], ["2022", "CVE-2022-21235", "The package github.com/masterminds/vcs before 1.13.3 are vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078"], ["2022", "CVE-2022-43029", "Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the time parameter at /goform/SetSysTimeCfg.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-4.md"], ["2022", "CVE-2022-34408", "Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43169", "A stored cross-site scripting (XSS) vulnerability in the Users Access Groups feature (/index.php?module=users_groups/users_groups) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking \"Add New Group\".", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/3"], ["2022", "CVE-2022-4476", "The Download Manager WordPress plugin before 3.2.62 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45"], ["2022", "CVE-2022-28796", "jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1"], ["2022", "CVE-2022-23270", "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/corelight/CVE-2022-23270-PPTP https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/murchie85/twitterCyberMonitor https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-21375", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26987", "TP-Link TL-WDR7660 2.0.30, Mercury D196G 20200109_2.0.4, and Fast FAC1900R 20190827_2.0.2 routers have a stack overflow issue in `MmtAtePrase` function. Local users could get remote code execution.", "https://github.com/GANGE666/Vulnerabilities", "No PoCs from references."], ["2022", "CVE-2022-40300", "Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection vulnerabilities.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-37661", "SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html https://packetstormsecurity.com/files/cve/CVE-2022-37661"], ["2022", "CVE-2022-28895", "A command injection vulnerability in the component /setnetworksettings/IPAddress of D-Link DIR882 DIR882A1_FW130B06 allows attackers to escalate privileges to root via a crafted payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/1 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-42205", "PHPGurukul Hospital Management System In PHP V 4.0 is vulnerable to Cross Site Scripting (XSS) via add-patient.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/riccardo-nannini/CVE", "No PoCs from references."], ["2022", "CVE-2022-3216", "A vulnerability has been found in Nintendo Game Boy Color and classified as problematic. This vulnerability affects unknown code of the component Mobile Adapter GB. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-208606 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.208606"], ["2022", "CVE-2022-20388", "Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-20019", "In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1082", "A vulnerability was found in SourceCodester Microfinance Management System 1.0. It has been rated as critical. This issue affects the file /mims/login.php of the Login Page. The manipulation of the argument username/password with the input '||1=1# leads to sql injection. The attack may be initiated remotely.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.195641"], ["2022", "CVE-2022-37770", "libjpeg commit 281daa9 was discovered to contain a segmentation fault via LineMerger::GetNextLowpassLine at linemerger.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/79"], ["2022", "CVE-2022-24501", "VP9 Video Extensions Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3096", "The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d"], ["2022", "CVE-2022-20108", "In voice service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330702; Issue ID: DTV03330702.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-1202", "The WP-CRM WordPress plugin through 1.2.1 does not validate and sanitise fields when exporting people to a CSV file, leading to a CSV injection vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a"], ["2022", "CVE-2022-1193", "Improper access control in GitLab CE/EE versions 10.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/351823"], ["2022", "CVE-2022-43078", "A cross-site scripting (XSS) vulnerability in /admin/add-fee.php of Web-Based Student Clearance System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter.", "No PoCs found on GitHub currently.", "https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md"], ["2022", "CVE-2022-4567", "Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2"], ["2022", "CVE-2022-28687", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16257.", "https://github.com/ARPSyndicate/cvemon https://github.com/rdomanski/Exploits_and_Advisories", "No PoCs from references."], ["2022", "CVE-2022-35976", "The GitOps Tools Extension for VSCode relies on kubeconfigs in order to communicate with Kubernetes clusters. A specially crafted kubeconfig leads to arbitrary code execution on behalf of the user running VSCode. Users relying on kubeconfigs that are generated or altered by other processes or users are affected by this issue. Please note that the vulnerability is specific to this extension, and the same kubeconfig would not result in arbitrary code execution when used with kubectl. Using only trust-worthy kubeconfigs is a safe mitigation. However, updating to the latest version of the extension is still highly recommended.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32015", "Complete Online Job Search System v1.0 is vulnerable to SQL Injection via /eris/index.php?q=category&search=.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-21264", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23221", "H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.", "https://github.com/ARPSyndicate/cvemon https://github.com/KevinMendes/evotingBounty https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/hktalent/exploit-poc https://github.com/mbianchi/e-voting https://github.com/mosaic-hgw/WildFly https://github.com/nscuro/dtapac https://github.com/zhaoolee/garss", "http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2022/Jan/39 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21324", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47531", "An issue was discovered in Ericsson Evolved Packet Gateway (EPG) versions 3.x before 3.25 and 2.x before 2.16, allows authenticated users to bypass system CLI and execute commands they are authorized to execute directly in the UNIX shell.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-43138", "Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50248"], ["2022", "CVE-2022-29839", "Insufficiently Protected Credentials vulnerability in the remote backups application on Western Digital My Cloud devices that could allow an attacker who has gained access to a relevant endpoint to use that information to access protected data. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124"], ["2022", "CVE-2022-3247", "The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.9.10 does not have authorisation in an AJAX action, and does not ensure that the URL to make a request to is an external one. As a result, any authenticated users, such as subscriber could perform SSRF attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf"], ["2022", "CVE-2022-42254", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an out-of-bounds array access may lead to denial of service, data tampering, or information disclosure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-39821", "In NOKIA 1350 OMS R14.2, an Insertion of Sensitive Information into an Application Log File vulnerability occurs. The web application stores critical information, such as cleartext user credentials, in world-readable files in the filesystem.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-47935", "A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a memory corruption vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19078)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-38749", "Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/NicheToolkit/rest-toolkit https://github.com/danielps99/startquarkus https://github.com/fernandoreb/dependency-check-springboot https://github.com/mosaic-hgw/WildFly https://github.com/scordero1234/java_sec_demo-main https://github.com/sr-monika/sprint-rest https://github.com/srchen1987/springcloud-distributed-transaction", "No PoCs from references."], ["2022", "CVE-2022-1045", "Stored XSS viva .svg file upload in GitHub repository polonel/trudesk prior to v1.2.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b0c4f992-4ac8-4479-82f4-367ed1a2a826"], ["2022", "CVE-2022-4720", "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70"], ["2022", "CVE-2022-23126", "TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-39425", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/bob11vrdp/CVE-2022-39425 https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0329", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/v1a0/sqllex https://github.com/vin01/bogus-cves", "No PoCs from references."], ["2022", "CVE-2022-47636", "A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user.", "https://github.com/fkie-cad/nvd-json-data-feeds", "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html https://www.exploit-db.com/exploits/51678"], ["2022", "CVE-2022-23066", "In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not. The vulnerability affects both integrity and may cause serious availability problems.", "No PoCs found on GitHub currently.", "https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324 https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066"], ["2022", "CVE-2022-45673", "Tenda AC6V1.0 V15.03.05.19 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.", "https://github.com/ARPSyndicate/cvemon https://github.com/iceyjchen/VulnerabilityProjectRecords", "https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md"], ["2022", "CVE-2022-28580", "It is found that there is a command injection vulnerability in the setL2tpServerCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/5"], ["2022", "CVE-2022-0269", "Cross-Site Request Forgery (CSRF) in Packagist yetiforce/yetiforce-crm prior to 6.3.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0"], ["2022", "CVE-2022-46888", "Multiple reflective cross-site scripting (XSS) vulnerabilities in NexusPHP before 1.7.33 allow remote attackers to inject arbitrary web script or HTML via the secret parameter in /login.php; q parameter in /user-ban-log.php; query parameter in /log.php; text parameter in /moresmiles.php; q parameter in myhr.php; or id parameter in /viewrequests.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities"], ["2022", "CVE-2022-48508", "Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-48699", "In the Linux kernel, the following vulnerability has been resolved:sched/debug: fix dentry leak in update_sched_domain_debugfsKuyo reports that the pattern of using debugfs_remove(debugfs_lookup())leaks a dentry and with a hotplug stress test, the machine eventuallyruns out of memory.Fix this up by using the newly created debugfs_lookup_and_remove() callinstead which properly handles the dentry reference counting logic.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-3391", "The Retain Live Chat WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2"], ["2022", "CVE-2022-4963", "A vulnerability was found in Folio Spring Module Core up to 1.1.5. It has been rated as critical. Affected by this issue is the function dropSchema of the file tenant/src/main/java/org/folio/spring/tenant/hibernate/HibernateSchemaService.java of the component Schema Name Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is d374a5f77e6b58e36f0e0e4419be18b95edcd7ff. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-257516.", "https://github.com/NaInSec/CVE-LIST", "No PoCs from references."], ["2022", "CVE-2022-3000", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c"], ["2022", "CVE-2022-1294", "The IMDB info box WordPress plugin through 2.0 does not sanitize and escape some of its settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7"], ["2022", "CVE-2022-47875", "A Directory Traversal vulnerability in /be/erpc.php in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to execute arbitrary code.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html"], ["2022", "CVE-2022-40116", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/beneficiary.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection9.md https://github.com/zakee94/online-banking-system/issues/13"], ["2022", "CVE-2022-28912", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUpgradeFW.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/8"], ["2022", "CVE-2022-38489", "An issue was discovered in EasyVista 2020.2.125.3 and 2022.1.109.0.03 It is prone to stored Cross-site Scripting (XSS). Version 2022.1.110.1.02 fixes the vulnerably.", "https://github.com/Live-Hack-CVE/CVE-2022-38489", "No PoCs from references."], ["2022", "CVE-2022-4872", "The Chained Products WordPress plugin before 2.12.0 does not have authorisation and CSRF checks, as well as does not ensure that the option to be updated belong to the plugin, allowing unauthenticated attackers to set arbitrary options to 'no'", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6"], ["2022", "CVE-2022-3111", "An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078"], ["2022", "CVE-2022-1385", "Mattermost 6.4.x and earlier fails to properly invalidate pending email invitations when the action is performed from the system console, which allows accidentally invited users to join the workspace and access information from the public teams and channels.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-1014", "The WP Contacts Manager WordPress plugin through 2.2.4 fails to properly sanitize user supplied POST data before it is being interpolated in an SQL statement and then executed, leading to an SQL injection vulnerability.", "https://github.com/cyllective/CVEs https://github.com/superlink996/chunqiuyunjingbachang", "https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b"], ["2022", "CVE-2022-26612", "In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-24814", "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.7.0, unauthorized JavaScript (JS) can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag. This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS. This issue was resolved in version 9.7.0. As a workaround, disable the live embed in the what-you-see-is-what-you-get by adding `{ \"media_live_embeds\": false }` to the _Options Overrides_ option of the Rich Text HTML interface.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28491", "TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 contains a command injection vulnerability in the NTPSyncWithHost function via the host_name parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "No PoCs found on GitHub currently.", "https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md"], ["2022", "CVE-2022-0378", "Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/0xPugal/One-Liners https://github.com/0xPugazh/One-Liners https://github.com/0xlittleboy/One-Liner-Scripts https://github.com/0xlittleboy/One-Liners https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/BugBlocker/lotus-scripts https://github.com/EmadYaY/BugBountys https://github.com/MedoX71T/Awesome-Oneliner-Bugbounty https://github.com/SecuritySphinx/Can-I-Check https://github.com/ayhan-dev/BugBountys https://github.com/ayush2000003/bb-onliner https://github.com/bhavesh-pardhi/One-Liner https://github.com/dwisiswant0/awesome-oneliner-bugbounty https://github.com/harshinsecurity/one_liner https://github.com/hexxxvenom/bugliner https://github.com/libralog/Can-I-Check https://github.com/litt1eb0yy/One-Liner-Scripts https://github.com/mk-g1/Awesome-One-Liner-Bug-Bounty https://github.com/naufalqwe/awesome-oneliner https://github.com/nitishbadole/bug1 https://github.com/nitishbadole/bug2 https://github.com/ronin-dojo/Oneliners3 https://github.com/rumputliar/copy-awesome-oneliner-bugbounty https://github.com/rusty-sec/lotus-scripts https://github.com/thecyberworld/cybersec-oneliner https://github.com/thecyberworld/hackliner https://github.com/trhacknon/One-Liners https://github.com/tucommenceapousser/awesome-oneliner-bugbounty https://github.com/vohvelikissa/bugbouncing https://github.com/x86trace/Oneliners", "https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31"], ["2022", "CVE-2022-24954", "Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have a Stack-Based Buffer Overflow related to XFA, for the 'subform colSpan=\"-2\"' and 'draw colSpan=\"1\"' substrings.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-23037", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28640", "A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.", "No PoCs found on GitHub currently.", "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us"], ["2022", "CVE-2022-0238", "phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/63f24b24-4af2-47b8-baea-7ad5f4db3633"], ["2022", "CVE-2022-26851", "Dell PowerScale OneFS, 8.2.2-9.3.x, contains a predictable file name from observable state vulnerability. An unprivileged network attacker could potentially exploit this vulnerability, leading to data loss.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities"], ["2022", "CVE-2022-37426", "Unrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection.", "No PoCs found on GitHub currently.", "https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/"], ["2022", "CVE-2022-35523", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi"], ["2022", "CVE-2022-1154", "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-41009", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'port triger protocol (tcp|udp|tcp/udp) triger port <1-65535> forward port <1-65535> description WORD' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-36568", "Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the list parameter at /goform/setPptpUserList.", "No PoCs found on GitHub currently.", "https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/3/tenda_ac9_setPptpUserList.md"], ["2022", "CVE-2022-25488", "Atom CMS v2.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/ajax/avatar.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/superlink996/chunqiuyunjingbachang", "https://github.com/thedigicraft/Atom.CMS/issues/257"], ["2022", "CVE-2022-4782", "The ClickFunnels WordPress plugin through 3.1.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5"], ["2022", "CVE-2022-4413", "Cross-site Scripting (XSS) - Reflected in GitHub repository nuxt/framework prior to v3.0.0-rc.13.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/70ac720d-c932-4ed3-98b1-dd2cbcb90185"], ["2022", "CVE-2022-21310", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-45892", "In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-42260", "NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-39815", "In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities occurs. This vulnerability allow unauthenticated users to execute commands on the operating system.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-3273", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a4.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6"], ["2022", "CVE-2022-31308", "A vulnerability in live_mfg.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.191012 allows attackers to obtain sensitive router information via execution of the exec cmd function.", "No PoCs found on GitHub currently.", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md"], ["2022", "CVE-2022-3333", "A vulnerability, which was classified as problematic, was found in Zephyr Project Manager up to 3.2.4. Affected is an unknown function of the file /v1/tasks/create/ of the component REST Call Handler. The manipulation of the argument onanimationstart leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.2.5 is able to address this issue. It is recommended to upgrade the affected component. VDB-209370 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed"], ["2022", "CVE-2022-22039", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-45540", "EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value \"name\" if the value contains a malformed UTF-8 char.", "https://github.com/Srpopty/Corax", "https://github.com/weng-xianhu/eyoucms/issues/37"], ["2022", "CVE-2022-28522", "ZCMS v20170206 was discovered to contain a stored cross-site scripting (XSS) vulnerability via index.php?m=home&c=message&a=add.", "No PoCs found on GitHub currently.", "https://github.com/zhendezuile/bug_report/blob/main/zcms"], ["2022", "CVE-2022-35942", "Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection. When the extended filter property `contains` is permitted to be interpreted by the Postgres connector, it is possible to inject arbitrary SQL which may affect the confidentiality and integrity of data stored on the connected database. A patch was released in version 5.5.1. This affects users who does any of the following: - Connect to the database via the DataSource with `allowExtendedProperties: true` setting OR - Uses the connector's CRUD methods directly OR - Uses the connector's other methods to interpret the LoopBack filter. Users who are unable to upgrade should do the following if applicable: - Remove `allowExtendedProperties: true` DataSource setting - Add `allowExtendedProperties: false` DataSource setting - When passing directly to the connector functions, manually sanitize the user input for the `contains` LoopBack filter beforehand.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21250", "Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: GL Accounts). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4553", "The FL3R FeelBox WordPress plugin through 8.1 does not have CSRF check when updating reseting moods which could allow attackers to make logged in admins perform such action via a CSRF attack and delete the lydl_posts & lydl_poststimestamp DB tables", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f"], ["2022", "CVE-2022-28433", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=display&value=Show&userid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-45451", "Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984.", "https://github.com/alfarom256/CVE-2022-45451 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-21341", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37956", "Windows Kernel Elevation of Privilege Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168723/Windows-Kernel-Registry-Subkey-Lists-Integer-Overflow.html"], ["2022", "CVE-2022-36539", "WeDayCare B.V Ouderapp before v1.1.22 allows attackers to alter the ID value within intercepted calls to gain access to data of other parents and children.", "https://github.com/ARPSyndicate/cvemon https://github.com/Fopje/CVE-2022-36539 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-4442", "The Custom Post Types and Custom Fields creator WordPress plugin before 2.3.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a"], ["2022", "CVE-2022-3222", "Uncontrolled Recursion in GitHub repository gpac/gpac prior to 2.1.0-DEV.", "https://github.com/ARPSyndicate/cvemon https://github.com/ooooooo-q/cve-2022-32224-rails", "https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235"], ["2022", "CVE-2022-1327", "The Image Gallery WordPress plugin before 1.1.6 does not sanitize and escape some of its Image fields, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e"], ["2022", "CVE-2022-26521", "Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html"], ["2022", "CVE-2022-39844", "Improper validation of integrity check vulnerability in Smart Switch PC prior to version 4.3.22083 allows local attackers to delete arbitrary directory using directory junction.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-3362", "Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1"], ["2022", "CVE-2022-31188", "CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/emirpolatt/CVE-2022-31188 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html"], ["2022", "CVE-2022-1267", "The BMI BMR Calculator WordPress plugin through 1.3 does not sanitise and escape arbitrary POST data before outputting it back in the response, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed"], ["2022", "CVE-2022-36479", "TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3"], ["2022", "CVE-2022-4693", "The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user\u2019s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea"], ["2022", "CVE-2022-4502", "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5bdef791-6886-4008-b9ba-045cb4524114"], ["2022", "CVE-2022-28573", "D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetNTPserverSeting. This vulnerability allows attackers to execute arbitrary commands via the system_time_timezone parameter.", "No PoCs found on GitHub currently.", "https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-45511", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the PPPOEPassword parameter at /goform/QuickIndex.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md"], ["2022", "CVE-2022-35913", "Samourai Wallet Stonewallx2 0.99.98e allows a denial of service via a P2P coinjoin. The attacker and victim must follow each other's paynym. Then, the victim must try to collaborate with the attacker for a Stonewallx2 transaction. Next, the attacker broadcasts a tx, spending the inputs used in Stonewallx2 before the victim can broadcast the collaborative transaction. The attacker does not signal opt in RBF, and uses the lowest fee rate. This would result in the victim being unable to perform Stonewallx2. (Note that the attacker could use multiple paynyms.)", "No PoCs found on GitHub currently.", "https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html"], ["2022", "CVE-2022-23304", "The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37816", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromSetIpMacBind.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13"], ["2022", "CVE-2022-30175", "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21190", "This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.", "https://github.com/dellalibera/dellalibera", "https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808 https://snyk.io/vuln/SNYK-JS-CONVICT-2774757"], ["2022", "CVE-2022-21201", "A stack-based buffer overflow vulnerability exists in the confers ucloud_add_node_new functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456"], ["2022", "CVE-2022-48064", "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29922"], ["2022", "CVE-2022-22965", "A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.", "https://github.com/0ofo/vul-check https://github.com/0x801453/SpringbootGuiExploit https://github.com/0xr1l3s/CVE-2022-22965 https://github.com/0xrobiul/CVE-2022-22965 https://github.com/0zvxr/CVE-2022-22965 https://github.com/13exp/SpringBoot-Scan-GUI https://github.com/189569400/Meppo https://github.com/20142995/Goby https://github.com/20142995/pocsuite3 https://github.com/20142995/sectool https://github.com/2lambda123/SBSCAN https://github.com/2lambda123/spring4shell-scan https://github.com/4nth0ny1130/spring4shell_behinder https://github.com/ADP-Dynatrace/dt-appsec-powerup https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AabyssZG/SpringBoot-Scan https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCE https://github.com/BC-SECURITY/Moriarty https://github.com/BKLockly/CVE-2022-22965 https://github.com/Bl0omZ/JAVAExploitStudy https://github.com/BobTheShoplifter/Spring4Shell-POC https://github.com/CLincat/vulcat https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara https://github.com/D1mang/Spring4Shell-CVE-2022-22965 https://github.com/DDuarte/springshell-rce-poc https://github.com/DataDog/security-labs-pocs https://github.com/Enokiy/cve_learning_record https://github.com/Enokiy/javaThings https://github.com/Enokiy/java_things https://github.com/Enokiy/spring-RCE-CVE-2022-22965 https://github.com/FourCoreLabs/spring4shell-exploit-poc https://github.com/GhostTroops/TOP https://github.com/GibzB/THM-Captured-Rooms https://github.com/GoogleCloudPlatform/security-analytics https://github.com/GuayoyoCyber/CVE-2022-22965 https://github.com/Gunavardhan-Naidu/Firewall_Server https://github.com/Habib0x0/Spring4Shell https://github.com/HackJava/HackSpring https://github.com/HackJava/Spring https://github.com/HimmelAward/Goby_POC https://github.com/Iyamroshan/CVE-2022-22965 https://github.com/JERRY123S/all-poc https://github.com/Joe1sn/CVE-2022-22965 https://github.com/Kirill89/CVE-2022-22965-PoC https://github.com/Ljw1114/SpringFramework-Vul https://github.com/Loneyers/Spring4Shell https://github.com/LucasPDiniz/CVE-2022-22965 https://github.com/LucasPDiniz/StudyRoom https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Mr-xn/spring-core-rce https://github.com/NCSC-NL/spring4shell https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/NodyHub/fifi https://github.com/OWASP/www-project-ide-vulscanner https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965- https://github.com/OpenNMS/opennms-spring-patched https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/OverflowMyBuffers/Spring4ShellScanner https://github.com/Pear1y/Vuln-Env https://github.com/Pear1y/VulnEnv https://github.com/PetrusViet/Poc-Spring4Shell-Jetty https://github.com/Qualys/spring4scanwin https://github.com/Rakshithac183/Palo-Alto-Networks https://github.com/Retrospected/spring-rce-poc https://github.com/RinkuDas7857/Vuln https://github.com/RogerSugit/spring_onekeyshell https://github.com/SYRTI/POC_to_review https://github.com/SeanWrightSec/spring-rce-poc https://github.com/Secd0g/go-awvscan https://github.com/SheL3G/Spring4Shell-PoC https://github.com/SnailDev/github-hot-hub https://github.com/Snip3R69/spring-shell-vuln https://github.com/Sparrow-Co-Ltd/real_cve_examples https://github.com/SummerSec/BlogPapers https://github.com/SummerSec/SummerSec https://github.com/TheGejr/SpringShell https://github.com/Threekiii/Awesome-Exploit https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Vulhub-Reproduce https://github.com/Trendyol/AppSec-Presentations https://github.com/TungLVHE163594/Spring4Shell-CVE-2022-22965 https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/W3BZT3R/Inject https://github.com/WhooAmii/POC_to_review https://github.com/Will-Beninger/CVE-2022-22965_SpringShell https://github.com/WingsSec/Meppo https://github.com/Wrin9/CVE-2022-22965 https://github.com/Wrin9/POC https://github.com/XRSec/AWVS14-Update https://github.com/XRSecAdmin/AWVS14-Update https://github.com/XuCcc/VulEnv https://github.com/Y4tacker/JavaSec https://github.com/Z0fhack/Goby_POC https://github.com/acibojbp/Telstra-Spring4Shell https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC https://github.com/anair-it/springshell-vuln-POC https://github.com/anquanscan/sec-tools https://github.com/au-abd/python-stuff https://github.com/au-abddakkak/python-stuff https://github.com/avboy1337/CVE-2022-22966 https://github.com/avergnaud/spring4shell-intro https://github.com/ax1sX/SpringSecurity https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience- https://github.com/bakery312/Vulhub-Reproduce https://github.com/basu1706/590JFinalProject https://github.com/bb33bb/CVE-2022-22966 https://github.com/binganao/vulns-2022 https://github.com/bollwarm/SecToolSet https://github.com/bowwowxx/spring4Shell https://github.com/brootware/awesome-cyber-security-university https://github.com/brootware/cyber-security-university https://github.com/c33dd/CVE-2022-22965 https://github.com/c4mx/CVE-2022-22965_PoC https://github.com/chaosec2021/CVE-2022-22965-POC https://github.com/chaosec2021/EXP-POC https://github.com/chaosec2021/fscan-POC https://github.com/charonlight/SpringExploitGUI https://github.com/chenzhouwen/vul-check https://github.com/chiangyaw/pc-demo-temp https://github.com/clemoregan/SSE4-CVE-2022-22965 https://github.com/cnspary/Spring4Shell https://github.com/codedsprit/CVE-2022-22965 https://github.com/coffeehb/Spring4Shell https://github.com/colincowie/Safer_PoC_CVE-2022-22965 https://github.com/crac-learning/CVE-analysis-reports https://github.com/cristianovisk/intel-toolkit https://github.com/cxzero/CVE-2022-22965-spring4shell https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/cybersecurityworks553/spring4shell-exploit https://github.com/czhouw/vul-check https://github.com/dacesmo/kcd-costarica-scarleteel-unanubedeeventosdesconfigurados https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck https://github.com/datawiza-inc/spring-rec-demo https://github.com/dbgee/Spring4Shell https://github.com/devengpk/CVE-2022-22965 https://github.com/dotnes/spring4shell https://github.com/draios/onprem-install-docs https://github.com/dravenww/curated-article https://github.com/dtact/spring4shell-scanner https://github.com/edsonjt81/spring4shell https://github.com/edsonjt81/spring4shell-scan https://github.com/elijah-g-14/Spring4Shell-Demo https://github.com/feereel/wb_soc https://github.com/fracturelabs/go-scan-spring https://github.com/fracturelabs/spring4shell_victim https://github.com/fransvanbuul/CVE-2022-22965-susceptibility https://github.com/fullhunt/spring4shell-scan https://github.com/getastra/hypejab https://github.com/giterlizzi/secdb-feeds https://github.com/gog1071/Spring4Shell-CVE-2022-22965 https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit https://github.com/govindarajulumedini/docker-poc https://github.com/gpiechnik2/nmap-spring4shell https://github.com/gwyomarch/CVE-Collection https://github.com/h4ck0rman/Spring4Shell-PoC https://github.com/hab1b0x/Spring4Shell https://github.com/helsecert/CVE-2022-22965 https://github.com/hillu/local-spring-vuln-scanner https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/huan-cdm/secure_tools_link https://github.com/huimzjty/vulwiki https://github.com/iloveflag/Fast-CVE-2022-22965 https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell https://github.com/irgoncalves/irule-cve-2022-22965 https://github.com/itsecurityco/CVE-2022-22965 https://github.com/iwarsong/CVE-2022-22965-POC https://github.com/iyamroshan/CVE-2022-22965 https://github.com/iyamrotrix/CVE-2022-22965 https://github.com/j4k0m/spring4shell-secdojo https://github.com/jakabakos/CVE-2022-22965-Spring4Shell https://github.com/jakabakos/spring4shell https://github.com/jbmihoub/all-poc https://github.com/jfrog/jfrog-spring-tools https://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.py https://github.com/jschauma/check-springshell https://github.com/junxiant/xnat-aws-monailabel https://github.com/justmumu/SpringShell https://github.com/k0mi-tg/CVE-POC https://github.com/k3rwin/spring-core-rce https://github.com/karimhabush/cyberowl https://github.com/kevin-s31/spring-bean https://github.com/kh4sh3i/Spring-CVE https://github.com/khidottrivi/CVE-2022-22965 https://github.com/khulnasoft-lab/awesome-security https://github.com/khulnasoft-labs/awesome-security https://github.com/kongjiexi/reznok-Spring4Shell-POC https://github.com/kun-g/Scraping-Github-trending https://github.com/lamyongxian/crmmvc https://github.com/lamyongxian/cs5439-spring4shell https://github.com/langu-xyz/JavaVulnMap https://github.com/lcarea/CVE-2022-22965 https://github.com/lcarea/PocSuite_POC https://github.com/leoambrus/CheckersNomisec https://github.com/liangyueliangyue/spring-core-rce https://github.com/light-Life/CVE-2022-22965-GUItools https://github.com/likewhite/CVE-2022-22965 https://github.com/lions2012/Penetration_Testing_POC https://github.com/lolminerxmrig/Capricornus https://github.com/lonnyzhang423/github-hot-hub https://github.com/luoqianlin/CVE-2022-22965 https://github.com/lzbzzz/JAVAExploitStudy https://github.com/magicming200/ChatGPT-Function-Call-Red-Team-Tool https://github.com/mamba-2021/EXP-POC https://github.com/mamba-2021/fscan-POC https://github.com/manas3c/CVE-POC https://github.com/mariomamo/CVE-2022-22965 https://github.com/matheuscezar/spring4shell-massive-scan https://github.com/me2nuk/CVE-2022-22965 https://github.com/mebibite/springhound https://github.com/metaStor/SpringScan https://github.com/mikaelkall/Spring4Shell https://github.com/mirsaes/cyao2pdf https://github.com/mrfossbrain/CVE-2022-22965 https://github.com/muldos/dgs-skeleton https://github.com/murchie85/twitterCyberMonitor https://github.com/mwojterski/cve-2022-22965 https://github.com/n11dc0la/PocSuite_POC https://github.com/nBp1Ng/FrameworkAndComponentVulnerabilities https://github.com/nBp1Ng/SpringFramework-Vul https://github.com/netcode/Spring4shell-CVE-2022-22965-POC https://github.com/netlas-io/netlas-cookbook https://github.com/netsentriesdev/spring4Shell-Safe-Exploit https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nu0l/CVE-2022-22965 https://github.com/nu1r/yak-module-Nu https://github.com/onurgule/S4S-Scanner https://github.com/opennms-forge/opennms-spring-patched https://github.com/p1ckzi/CVE-2022-22965 https://github.com/paulseo0827/Amazon-EKS-Security https://github.com/pipiscrew/timeline https://github.com/pvnovarese/2022-04-enterprise-demo https://github.com/pwnwriter/CVE-2022-22965 https://github.com/queencitycyber/Spring4Shell-cURL https://github.com/radiusmethod/awesome-gists https://github.com/rainboyan/grails-issue-12460-demo https://github.com/rajasoun/spring4shell-tomcat https://github.com/redhuntlabs/Hunt4Spring https://github.com/renovatebot/spring-remediations https://github.com/reznok/Spring4Shell-POC https://github.com/ribeirux/spring4shell https://github.com/robiul-awal/CVE-2022-22965 https://github.com/rtkwlf/wolf-tools https://github.com/rwincey/spring4shell-CVE-2022-22965 https://github.com/scordero1234/java_sec_demo-main https://github.com/seal-community/patches https://github.com/shengshengli/fscan-POC https://github.com/sinjap/spring4shell https://github.com/snicoll-scratches/spring-boot-cve-2022-22965 https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965 https://github.com/sr-monika/sprint-rest https://github.com/sspsec/Scan-Spring-GO https://github.com/sule01u/SBSCAN https://github.com/sunnyvale-it/CVE-2022-22965-PoC https://github.com/sunnyvale-it/cvss-calculator https://github.com/superfish9/pt https://github.com/superlink996/chunqiuyunjingbachang https://github.com/syalioune/spring4shell-jdk8-demo https://github.com/t3amj3ff/Spring4ShellPoC https://github.com/talentsec/SpringShell https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-CachedintrospectionResults-Rce https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce https://github.com/teresaweber685/book_list https://github.com/test502git/awvs14-scan https://github.com/thenurhabib/s4sScanner https://github.com/thomasvincent/Spring4Shell-resources https://github.com/thomasvincent/spring-shell-resources https://github.com/thomasvincent/springshell https://github.com/tpt11fb/SpringVulScan https://github.com/trhacknon/CVE-2022-22965 https://github.com/trhacknon/Pocingit https://github.com/trhacknon/Spring4Shell-POC https://github.com/tweedge/springcore-0day-en https://github.com/twseptian/cve-2022-22965 https://github.com/vasoo4411/Sample-Kubernetes-Cluster https://github.com/veo/vscan https://github.com/viniciuspereiras/CVE-2022-22965-poc https://github.com/wcoreiron/Sentinel_Analtic_Rules https://github.com/webraybtl/springcore_detect https://github.com/weeka10/-hktalent-TOP https://github.com/west-wind/Spring4Shell-Detection https://github.com/west-wind/Threat-Hunting-With-Splunk https://github.com/whitesource/spring4shell-detect https://github.com/whoami0622/CVE-2022-22965-POC https://github.com/whoforget/CVE-POC https://github.com/wikiZ/springboot_CVE-2022-22965 https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE https://github.com/wshon/spring-framework-rce https://github.com/xnderLAN/CVE-2022-22965 https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/yevh/VulnPlanet https://github.com/youwizard/CVE-POC https://github.com/zangcc/CVE-2022-22965-rexbb https://github.com/zecool/cve https://github.com/zer0yu/CVE-2022-22965 https://github.com/zjc9/mytools https://github.com/zjx/Spring4Shell-RCE", "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-33980", "Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/Code-971/CVE-2022-33980-EXP https://github.com/HKirito/CVE-2022-33980 https://github.com/LaNyer640/java_asm_parse https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/P0lar1ght/CVE-2022-33980-EXP https://github.com/Pear1y/Vuln-Env https://github.com/Phuong39/2022-HW-POC https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/chains-project/exploits-for-sbom.exe https://github.com/d4n-sec/d4n-sec.github.io https://github.com/joseluisinigo/riskootext4shell https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sammwyy/CVE-2022-33980-POC https://github.com/tangxiaofeng7/CVE-2022-33980-Apache-Commons-Configuration-RCE https://github.com/trhacknon/CVE-2022-33980-Apache-Commons-Configuration-RCE https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41716", "Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string \"A=B\\x00C=D\" sets the variables \"A=B\" and \"C=D\".", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-27292", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formLanguageChange. This vulnerability allows attackers to cause a Denial of Service (DoS) via the nextPage parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-27103", "element-plus 2.0.5 is vulnerable to Cross Site Scripting (XSS) via el-table-column.", "https://github.com/Esonhugh/Esonhugh", "No PoCs from references."], ["2022", "CVE-2022-31885", "Marval MSM v14.19.0.12476 is vulnerable to OS Command Injection due to the insecure handling of VBScripts.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/os-command-injection"], ["2022", "CVE-2022-0494", "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.", "https://github.com/ARPSyndicate/cvemon https://github.com/sam8k/Dynamic-and-Static-Analysis-of-SOUPs", "No PoCs from references."], ["2022", "CVE-2022-0705", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b"], ["2022", "CVE-2022-2591", "A vulnerability classified as critical has been found in TEM FLEX-1085 1.6.0. Affected is an unknown function of the file /sistema/flash/reboot. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html"], ["2022", "CVE-2022-2600", "The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel=\"noopener noreferer\" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39009", "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2903", "The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864"], ["2022", "CVE-2022-20763", "A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31786", "IdeaLMS 2022 allows reflected Cross Site Scripting (XSS) via the IdeaLMS/Class/Assessment/ PATH_INFO.", "https://github.com/ARPSyndicate/cvemon https://github.com/RNPG/CVEs", "https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe"], ["2022", "CVE-2022-46176", "Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url..insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.", "https://github.com/ARPSyndicate/cvemon https://github.com/kherrick/lobsters", "No PoCs from references."], ["2022", "CVE-2022-1469", "The FiboSearch WordPress plugin before 1.17.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d"], ["2022", "CVE-2022-29380", "Academy-LMS v4.3 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the SEO panel.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/49298"], ["2022", "CVE-2022-22666", "A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, watchOS 8.5. Processing a maliciously crafted image may lead to heap corruption.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html"], ["2022", "CVE-2022-33683", "Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could leak authentication data, configuration data, and any other data sent by these clients. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. This issue affects Apache Pulsar Broker and Proxy versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31557", "The seveas/golem repository through 2016-05-17 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41955", "Autolab is a course management service, initially developed by a team of students at Carnegie Mellon University, that enables instructors to offer autograded programming assignments to their students over the Web. A remote code execution vulnerability was discovered in Autolab's MOSS functionality, whereby an instructor with access to the feature might be able to execute code on the server hosting Autolab. This vulnerability has been patched in version 2.10.0. As a workaround, disable the MOSS feature if it is unneeded by replacing the body of `run_moss` in `app/controllers/courses_controller.rb` with `render(plain: \"Feature disabled\", status: :bad_request) && return`.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/"], ["2022", "CVE-2022-1529", "An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.", "https://github.com/mistymntncop/CVE-2022-1802", "https://bugzilla.mozilla.org/show_bug.cgi?id=1770048"], ["2022", "CVE-2022-2843", "A vulnerability was found in MotoPress Timetable and Event Schedule. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /wp-admin/admin-ajax.php of the component Quick Edit. The manipulation of the argument post_title with the input leads to cross site scripting. The attack may be launched remotely. VDB-206486 is the identifier assigned to this vulnerability.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0946", "Stored XSS viva cshtm file upload in GitHub repository star7th/showdoc prior to v2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1"], ["2022", "CVE-2022-0645", "Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c13258a2-30e3-4261-9a3b-2f39c49a8bd6"], ["2022", "CVE-2022-48124", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the FileName parameter in the setting/setOpenVpnCertGenerationCfg function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/14"], ["2022", "CVE-2022-25146", "The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22825", "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-43753", "A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10.", "No PoCs found on GitHub currently.", "https://bugzilla.suse.com/show_bug.cgi?id=1204716"], ["2022", "CVE-2022-0754", "SQL Injection in GitHub repository salesagility/suitecrm prior to 7.12.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8afb7991-c6ed-42d9-bd9b-1cc83418df88"], ["2022", "CVE-2022-2651", "Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html"], ["2022", "CVE-2022-22934", "An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion\u2019s public key, which can result in attackers substituting arbitrary pillar data.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/saltstack/salt/releases,"], ["2022", "CVE-2022-36226", "SiteServerCMS 5.X has a Remote-download-Getshell-vulnerability via /SiteServer/Ajax/ajaxOtherService.aspx.", "No PoCs found on GitHub currently.", "https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell"], ["2022", "CVE-2022-31446", "Tenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.", "No PoCs found on GitHub currently.", "https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md"], ["2022", "CVE-2022-41844", "An issue was discovered in Xpdf 4.04. There is a crash in XRef::fetch(int, int, Object*, int) in xpdf/XRef.cc, a different vulnerability than CVE-2018-16369 and CVE-2019-16088.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928 https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844"], ["2022", "CVE-2022-38334", "XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122"], ["2022", "CVE-2022-44022", "PwnDoc through 0.5.3 might allow remote attackers to identify valid user account names by leveraging response timings for authentication attempts.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-22637", "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30969", "A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31506", "The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-1578", "The My wpdb WordPress plugin before 2.5 is missing CSRF check when running SQL queries, which could allow attacker to make a logged in admin run arbitrary SQL query via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b"], ["2022", "CVE-2022-33891", "The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.", "https://github.com/0day404/vulnerability-poc https://github.com/1f3lse/taiE https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AkbarTrilaksana/cve-2022-33891 https://github.com/AmoloHT/CVE-2022-33891 https://github.com/DrLinuxOfficial/CVE-2022-33891 https://github.com/HuskyHacks/cve-2022-33891 https://github.com/IMHarman/CVE-2022-33891 https://github.com/JD2344/SecGen_Exploits https://github.com/K3ysTr0K3R/CVE-2022-33891-EXPLOIT https://github.com/K3ysTr0K3R/K3ysTr0K3R https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/SummerSec/BlogPapers https://github.com/SummerSec/SummerSec https://github.com/Threekiii/Awesome-POC https://github.com/Vulnmachines/Apache-spark-CVE-2022-33891 https://github.com/W01fh4cker/Serein https://github.com/W01fh4cker/cve-2022-33891 https://github.com/WhooAmii/POC_to_review https://github.com/XmasSnowISBACK/CVE-2022-33891 https://github.com/Y4tacker/JavaSec https://github.com/anquanscan/sec-tools https://github.com/d4n-sec/d4n-sec.github.io https://github.com/devengpk/Apache-zero-days https://github.com/elsvital/cve-2022-33891-fix https://github.com/h00die-gr3y/Metasploit https://github.com/ilkinur/certificates https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/llraudseppll/cve-2022-33891 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ps-interactive/lab_security_apache_spark_emulation_detection https://github.com/tr3ss/gofetch https://github.com/trhacknon/Pocingit https://github.com/tufanturhan/Apache-Spark-Rce https://github.com/west-wind/CVE-2022-33891 https://github.com/west-wind/Threat-Hunting-With-Splunk https://github.com/whoforget/CVE-POC https://github.com/wm-team/WMCTF2022 https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html"], ["2022", "CVE-2022-48175", "Rukovoditel v3.2.1 was discovered to contain a remote code execution (RCE) vulnerability in the component /rukovoditel/index.php?module=dashboard/ajax_request.", "https://github.com/ARPSyndicate/cvemon https://github.com/y1s3m0/vulnfind", "No PoCs from references."], ["2022", "CVE-2022-43702", "When the directory containing the installer does not have sufficiently restrictive file permissions, an attacker can modify (or replace) the installer to execute malicious code.", "No PoCs found on GitHub currently.", "https://developer.arm.com/documentation/ka005596/latest"], ["2022", "CVE-2022-0614", "Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879"], ["2022", "CVE-2022-2480", "Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html"], ["2022", "CVE-2022-2711", "The Import any XML or CSV File to WordPress plugin before 3.6.9 is not validating the paths of files contained in uploaded zip archives, allowing highly privileged users, such as admins, to write arbitrary files to any part of the file system accessible by the web server via a path traversal vector.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1"], ["2022", "CVE-2022-22555", "Dell EMC PowerStore, contains an OS command injection Vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the PowerStore underlying OS, with the privileges of the vulnerable application. Exploitation may lead to an elevation of privilege.", "https://github.com/colaoo123/cve-2022-22555", "No PoCs from references."], ["2022", "CVE-2022-29322", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the IPADDR and nvmacaddr parameters in /goform/form2Dhcpip.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/5 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-31827", "MonstaFTP v2.10.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the function performFetchRequest at HTTPFetcher.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/zer0yu/CVE_Request", "https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md"], ["2022", "CVE-2022-36144", "SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via base64_encode.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/63"], ["2022", "CVE-2022-41425", "Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/772"], ["2022", "CVE-2022-1859", "Use after free in Performance Manager in Google Chrome prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-0436", "Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/HotDB-Community/HotDB-Engine https://github.com/shawnhooper/restful-localized-scripts https://github.com/shawnhooper/wpml-rest-api", "https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b"], ["2022", "CVE-2022-0576", "Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/faisalfs10x/CVE-IDs", "https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177"], ["2022", "CVE-2022-47069", "p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.", "No PoCs found on GitHub currently.", "https://sourceforge.net/p/p7zip/bugs/241/"], ["2022", "CVE-2022-30508", "DedeCMS v5.7.93 was discovered to contain arbitrary file deletion vulnerability in upload.php via the delete parameter.", "No PoCs found on GitHub currently.", "https://github.com/1security/Vulnerability/blob/master/web/dedecms/1.md"], ["2022", "CVE-2022-23779", "Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Vulnmachines/Zoho_CVE-2022-23779 https://github.com/WhooAmii/POC_to_review https://github.com/fbusr/CVE-2022-23779 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2473", "The WP-UserOnline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018templates[browsingpage][text]' parameter in versions up to, and including, 2.87.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative capabilities and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The only affects multi-site installations and installations where unfiltered_html is disabled.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt https://www.exploit-db.com/exploits/50988 https://youtu.be/Q3zInrUnAV0"], ["2022", "CVE-2022-34101", "A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.", "No PoCs found on GitHub currently.", "https://www.crestron.com/Security/Security_Advisories"], ["2022", "CVE-2022-31664", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-24288", "In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Hax0rG1rl/my_cve_and_bounty_poc https://github.com/happyhacking-k/happyhacking-k https://github.com/happyhacking-k/my_cve_and_bounty_poc", "No PoCs from references."], ["2022", "CVE-2022-44311", "html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file.", "https://github.com/ARPSyndicate/cvemon https://github.com/DesmondSanctity/CVE-2022-44311 https://github.com/Halcy0nic/CVE-2022-44311 https://github.com/Halcy0nic/Trophies https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skinnyrad/Trophies https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-24008", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the confcli binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-24399", "The SAP Focused Run (Real User Monitoring) - versions 200, 300, REST service does not sufficiently sanitize the input name of the file using multipart/form-data, resulting in Cross-Site Scripting (XSS) vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/Onapsis/vulnerability_advisories", "http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2022/Jun/37"], ["2022", "CVE-2022-40489", "ThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users.", "No PoCs found on GitHub currently.", "https://github.com/thinkcmf/thinkcmf/issues/736"], ["2022", "CVE-2022-30788", "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.", "No PoCs found on GitHub currently.", "https://github.com/tuxera/ntfs-3g/releases"], ["2022", "CVE-2022-43571", "In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ohnonoyesyes/CVE-2022-43571 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-22996", "The G-RAID 4/8 Software Utility setups for Windows were affected by a DLL hijacking vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the system user.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22007-sandisk-professional-g-raid-4-8-software-utility-setup-for-windows-privilege-escalation"], ["2022", "CVE-2022-48306", "Improper Validation of Certificate with Host Mismatch vulnerability in Gotham Chat IRC helper of Palantir Gotham allows A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. This issue affects: Palantir Palantir Gotham Chat IRC helper versions prior to 30221005.210011.9242.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md"], ["2022", "CVE-2022-36115", "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for unintended functionality. An attacker can abuse the CreateProcessAutosave() method to inject their own functionality into a development process. If (upon a warning) a user decides to recover unsaved work by using the last saved version, the malicious code could enter the workflow. Should the process action stages not be fully reviewed before publishing, this could result in the malicious code being run in a production environment.", "No PoCs found on GitHub currently.", "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise"], ["2022", "CVE-2022-31876", "netgear wnap320 router WNAP320_V2.0.3_firmware is vulnerable to Incorrect Access Control via /recreate.php, which can leak all users cookies.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md"], ["2022", "CVE-2022-27261", "An arbitrary file write vulnerability in Express-FileUpload v1.3.1 allows attackers to upload multiple files with the same name, causing an overwrite of files in the web application server.", "https://github.com/speedyfriend67/Experiments", "No PoCs from references."], ["2022", "CVE-2022-41474", "RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily change the password of any account.", "No PoCs found on GitHub currently.", "https://github.com/ralap-z/rpcms/issues/3"], ["2022", "CVE-2022-25224", "Proton v0.2.0 allows an attacker to create a malicious link inside a markdown file. When the victim clicks the link, the application opens the site in the current frame allowing an attacker to host JavaScript code in the malicious link in order to trigger an XSS attack. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/lennon/"], ["2022", "CVE-2022-36055", "Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. Fuzz testing, provided by the CNCF, identified input to functions in the _strvals_ package that can cause an out of memory panic. The _strvals_ package contains a parser that turns strings in to Go structures. The _strvals_ package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. Applications that use the _strvals_ package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The Helm Client will panic with input to `--set`, `--set-string`, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. This issue has been resolved in 3.9.4. SDK users can validate strings supplied by users won't create large arrays causing significant memory usage before passing them to the _strvals_ functions.", "https://github.com/ARPSyndicate/cvemon https://github.com/JtMotoX/docker-trivy", "No PoCs from references."], ["2022", "CVE-2022-1948", "An issue has been discovered in GitLab affecting all versions starting from 15.0 before 15.0.1. Missing validation of input used in quick actions allowed an attacker to exploit XSS by injecting HTML in contact details.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/security/gitlab/-/issues/673"], ["2022", "CVE-2022-24148", "Tenda AX3 v16.03.12.10_CN was discovered to contain a command injection vulnerability in the function mDMZSetCfg. This vulnerability allows attackers to execute arbitrary commands via the dmzIp parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-38147", "Silverstripe silverstripe/framework through 4.11 allows XSS (issue 3 of 3).", "https://github.com/ARPSyndicate/cvemon https://github.com/nhienit2010/Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-31532", "The dankolbman/travel_blahg repository through 2016-01-16 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-44156", "Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetIpMacBind.", "No PoCs found on GitHub currently.", "https://drive.google.com/file/d/1dbMwByl40uqMiSv_DOEW8pFjRhGX-j97/view?usp=sharing"], ["2022", "CVE-2022-0620", "The Delete Old Orders WordPress plugin through 0.2 does not sanitize and escape the date parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6"], ["2022", "CVE-2022-2725", "A vulnerability was found in SourceCodester Company Website CMS. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add-blog.php. The manipulation leads to cross site scripting. The attack may be launched remotely. VDB-205838 is the identifier assigned to this vulnerability.", "https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-4229", "A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.", "No PoCs found on GitHub currently.", "https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control"], ["2022", "CVE-2022-4369", "The WP-Lister Lite for Amazon WordPress plugin before 2.4.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high-privilege users such as admin.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3"], ["2022", "CVE-2022-27166", "A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-0760", "The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210"], ["2022", "CVE-2022-2665", "A vulnerability classified as critical was found in SourceCodester Simple E-Learning System. Affected by this vulnerability is an unknown functionality of the file classroom.php. The manipulation of the argument post_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205615.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205615"], ["2022", "CVE-2022-0863", "The WP SVG Icons WordPress plugin through 3.2.3 does not properly validate uploaded custom icon packs, allowing an high privileged user like an admin to upload a zip file containing malicious php code, leading to remote code execution.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983"], ["2022", "CVE-2022-20706", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-41870", "AP Manager in Innovaphone before 13r2 Service Release 17 allows command injection via a modified service ID during app upload.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-44016", "An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '\"ImagesPath\":\"C:\\\\\"' value.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-3509", "A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.", "https://github.com/ARPSyndicate/cvemon https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9", "No PoCs from references."], ["2022", "CVE-2022-22603", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22592", "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2877", "The Titan Anti-spam & Security WordPress plugin before 7.3.1 does not properly checks HTTP headers in order to validate the origin IP address, allowing threat actors to bypass it's block feature by spoofing the headers.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68"], ["2022", "CVE-2022-0972", "Use after free in Extensions in Google Chrome prior to 99.0.4844.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31563", "The whmacmac/vprj repository through 2022-04-06 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20617", "Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3418", "The Import any XML or CSV File to WordPress plugin before 3.6.9 is not properly filtering which file extensions are allowed to be imported on the server, which could allow administrators in multi-site WordPress installations to upload arbitrary files", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d"], ["2022", "CVE-2022-38180", "In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-48110", "** DISPUTED ** CKSource CKEditor 5 35.4.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Full Featured CKEditor5 widget. NOTE: the vendor's position is that this is not a vulnerability. The CKEditor 5 documentation discusses that it is the responsibility of an integrator (who is adding CKEditor 5 functionality to a website) to choose the correct security settings for their use case. Also, safe default values are established (e.g., config.htmlEmbed.showPreviews is false).", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-48281", "processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., \"WRITE of size 307203\") via a crafted TIFF image.", "https://github.com/13579and2468/Wei-fuzz", "https://gitlab.com/libtiff/libtiff/-/issues/488"], ["2022", "CVE-2022-25172", "An information disclosure vulnerability exists in the web interface session cookie functionality of InHand Networks InRouter302 V3.5.4. The session cookie misses the HttpOnly flag, making it accessible via JavaScript and thus allowing an attacker, able to perform an XSS attack, to steal the session cookie.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470"], ["2022", "CVE-2022-4278", "A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /hrm/employeeadd.php. The manipulation of the argument empid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214775.", "No PoCs found on GitHub currently.", "https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli"], ["2022", "CVE-2022-42899", "Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read and stack overflow issues when opening crafted SKP files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View.", "https://github.com/ARPSyndicate/cvemon https://github.com/iamsanjay/CVE-2022-42899 https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/uk0/cve-2022-42889-intercept https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-2774", "A vulnerability was found in SourceCodester Library Management System. It has been declared as critical. This vulnerability affects unknown code of the file librarian/student.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. VDB-206170 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206170"], ["2022", "CVE-2022-28198", "NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-0731", "Improper Access Control (IDOR) in GitHub repository dolibarr/dolibarr prior to 16.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8"], ["2022", "CVE-2022-4338", "An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-3558", "The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6"], ["2022", "CVE-2022-38351", "A vulnerability in Suprema BioStar (aka Bio Star) 2 v2.8.16 allows attackers to escalate privileges to System Administrator via a crafted PUT request to the update profile page.", "No PoCs found on GitHub currently.", "https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/"], ["2022", "CVE-2022-0832", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-0513", "The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the exclusion_reason parameter found in the ~/includes/class-wp-statistics-exclusion.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.4. This requires the \"Record Exclusions\" option to be enabled on the vulnerable site.", "https://github.com/ARPSyndicate/cvemon https://github.com/murchie85/twitterCyberMonitor https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-21619", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-3879", "The Car Dealer (Dealership) and Vehicle sales WordPress Plugin WordPress plugin before 3.05 does not have proper authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber to call it and install and activate arbitrary plugins from wordpress.org", "https://github.com/1-tong/vehicle_cves https://github.com/Vu1nT0tal/Vehicle-Security https://github.com/VulnTotal-Team/Vehicle-Security https://github.com/VulnTotal-Team/vehicle_cves", "https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b"], ["2022", "CVE-2022-31902", "Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Finder::add().", "https://github.com/CDACesec/CVE-2022-31902 https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/CDACesec/CVE-2022-31902"], ["2022", "CVE-2022-41992", "A memory corruption vulnerability exists in the VHD File Format parsing CXSPARSE record functionality of PowerISO PowerISO 8.3. A specially-crafted file can lead to an out-of-bounds write. A victim needs to open a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644"], ["2022", "CVE-2022-31590", "SAP PowerDesigner Proxy - version 16.7, allows an attacker with low privileges and has local access, with the ability to work around system\u2019s root disk access restrictions to Write/Create a program file on system disk root path, which could then be executed with elevated privileges of the application during application start up or reboot, potentially compromising Confidentiality, Integrity and Availability of the system.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29207", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-2884", "A vulnerability in GitLab CE/EE affecting all versions from 11.3.4 prior to 15.1.5, 15.2 to 15.2.3, 15.3 to 15.3 to 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint", "https://github.com/ARPSyndicate/cvemon https://github.com/Kreedman05/nto_4fun_2024 https://github.com/chftm/nto-cs-2024 https://github.com/k0mi-tg/CVE-POC https://github.com/m3ssap0/gitlab_rce_cve-2022-2884 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html https://gitlab.com/gitlab-org/gitlab/-/issues/371098"], ["2022", "CVE-2022-0981", "A flaw was found in Quarkus. The state and potentially associated permissions can leak from one web request to another in RestEasy Reactive. This flaw allows a low-privileged user to perform operations on the database with a different set of privileges than intended.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31741", "A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1767590"], ["2022", "CVE-2022-20435", "There is a Unauthorized service in the system service, may cause the system reboot. Since the component does not have permission check and permission protection, resulting in EoP problem.Product: AndroidVersions: Android SoCAndroid ID: A-242248367", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22530", "The F0743 Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, 105, 106, does not check uploaded or downloaded files. This allows an attacker with basic user rights to inject dangerous content or malicious code which could result in critical information being modified or completely compromise the availability of the application.", "No PoCs found on GitHub currently.", "https://launchpad.support.sap.com/#/notes/3112928"], ["2022", "CVE-2022-29347", "An arbitrary file upload vulnerability in Web@rchiv 1.0 allows attackers to execute arbitrary commands via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/evildrummer/MyOwnCVEs https://github.com/karimhabush/cyberowl", "https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347"], ["2022", "CVE-2022-34024", "Barangay Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the resident module editing function at /bmis/pages/resident/resident.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sorabug/bug_report", "No PoCs from references."], ["2022", "CVE-2022-25350", "All versions of the package puppet-facter are vulnerable to Command Injection via the getFact function due to improper input sanitization.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616"], ["2022", "CVE-2022-48332", "Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_save_keys file_name_len integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/"], ["2022", "CVE-2022-36121", "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the UpdateOfflineHelpData administrative function. Abusing this function will allow any Blue Prism user to change the offline help URL to one of their choice, opening the possibility of spoofing the help page or executing a local file.", "No PoCs found on GitHub currently.", "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise"], ["2022", "CVE-2022-27255", "In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/GhostTroops/TOP https://github.com/H4lo/awesome-IoT-security-article https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/PyterSmithDarkGhost/IoT-CVE202227255 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/hktalent/TOP https://github.com/infobyte/cve-2022-27255 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/stryker-project/CVE-2022-27255-checker https://github.com/tanjiti/sec_profile https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0453", "Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21759", "In power service, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419106; Issue ID: ALPS06419077.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2556", "The Mailchimp for WooCommerce WordPress plugin before 2.7.2 has an AJAX action that allows high privilege users to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0"], ["2022", "CVE-2022-3828", "The Video Thumbnails WordPress plugin through 2.12.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486"], ["2022", "CVE-2022-25241", "In FileCloud before 21.3, the CSV user import functionality is vulnerable to Cross-Site Request Forgery (CSRF).", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html https://herolab.usd.de/security-advisories/"], ["2022", "CVE-2022-0542", "Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e6469ba6-03a2-4b17-8b4e-8932ecd0f7ac"], ["2022", "CVE-2022-31650", "In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.", "No PoCs found on GitHub currently.", "https://sourceforge.net/p/sox/bugs/360/"], ["2022", "CVE-2022-29256", "sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time. This is not part of any runtime code, does not affect Windows users at all, and is unlikely to affect anyone that already cares about the security of their build environment. This problem is fixed in version 0.30.5.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi", "No PoCs from references."], ["2022", "CVE-2022-2995", "Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", "https://github.com/ARPSyndicate/cvemon", "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"], ["2022", "CVE-2022-35088", "SWFTools commit 772e55a2 was discovered to contain a heap buffer-overflow via getGifDelayTime at /home/bupt/Desktop/swftools/src/src/gif2swf.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md"], ["2022", "CVE-2022-0890", "NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276"], ["2022", "CVE-2022-0402", "The Super Forms - Drag & Drop Form Builder WordPress plugin before 6.0.4 does not escape the bob_czy_panstwa_sprawa_zostala_rozwiazana parameter before outputting it back in an attribute via the super_language_switcher AJAX action, leading to a Reflected Cross-Site Scripting. The action is also lacking CSRF, making the attack easier to perform against any user.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/"], ["2022", "CVE-2022-21499", "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/ARPSyndicate/cvemon https://github.com/xairy/unlockdown", "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"], ["2022", "CVE-2022-48363", "In MPD before 0.23.8, as used on Automotive Grade Linux and other platforms, the PipeWire output plugin mishandles a Drain call in certain situations involving truncated files. Eventually there is an assertion failure in libmpdclient because libqtappfw passes in a NULL pointer.", "https://github.com/1-tong/vehicle_cves https://github.com/Vu1nT0tal/Vehicle-Security https://github.com/VulnTotal-Team/Vehicle-Security https://github.com/VulnTotal-Team/vehicle_cves", "No PoCs from references."], ["2022", "CVE-2022-33916", "OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.", "No PoCs found on GitHub currently.", "https://opcfoundation.org"], ["2022", "CVE-2022-25301", "All versions of package jsgui-lang-essentials are vulnerable to Prototype Pollution due to allowing all Object attributes to be altered, including their magical attributes such as proto, constructor and prototype.", "No PoCs found on GitHub currently.", "https://github.com/metabench/jsgui-lang-essentials/issues/1 https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897"], ["2022", "CVE-2022-25090", "Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.", "https://github.com/ARPSyndicate/cvemon https://github.com/ComparedArray/printix-CVE-2022-25090 https://github.com/Enes4xd/Enes4xd https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anquanscan/sec-tools https://github.com/cr0ss2018/cr0ss2018 https://github.com/d3ltacros/d3ltacros https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html https://github.com/ComparedArray/printix-CVE-2022-25090 https://www.exploit-db.com/exploits/50812"], ["2022", "CVE-2022-36170", "MapGIS 10.5 Pro IGServer has hardcoded credentials in the front-end and can lead to escalation of privileges and arbitrary file deletion.", "No PoCs found on GitHub currently.", "https://github.com/prismbreak/vulnerabilities/issues/2"], ["2022", "CVE-2022-31813", "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/Totes5706/TotesHTB https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/kasem545/vulnsearch", "No PoCs from references."], ["2022", "CVE-2022-27195", "Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-41780", "In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.4.0, a directory traversal vulnerability exists in an undisclosed location of the F5OS CLI that allows an attacker to read arbitrary files.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0880", "Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-35098", "SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via GfxICCBasedColorSpace::getDefaultColor(GfxColor*) at /xpdf/GfxState.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35098.md"], ["2022", "CVE-2022-2985", "In music service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-38072", "An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594"], ["2022", "CVE-2022-43996", "The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.", "No PoCs found on GitHub currently.", "https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json"], ["2022", "CVE-2022-20474", "In readLazyValue of Parcel.java, there is a possible loading of arbitrary code into the System Settings app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-240138294", "https://github.com/michalbednarski/LeakValue", "No PoCs from references."], ["2022", "CVE-2022-41893", "TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-41401", "OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure.", "https://github.com/ixSly/CVE-2022-41401 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/ixSly/CVE-2022-41401"], ["2022", "CVE-2022-27185", "A denial of service vulnerability exists in the confctl_set_master_wlan functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to denial of service. An attacker can send packets to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505"], ["2022", "CVE-2022-27214", "A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25080", "TOTOLink A830R V5.9c.4729_B20191112 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A830R/README.md"], ["2022", "CVE-2022-21489", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0783", "The Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba"], ["2022", "CVE-2022-0412", "The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Ostorlab/KEV https://github.com/TcherB31/CVE-2022-0412_Exploit https://github.com/nomi-sec/PoC-in-GitHub", "https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682"], ["2022", "CVE-2022-32429", "An authentication-bypass issue in the component http://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily configure settings within the application, leading to remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/b11y/CVE-2022-32429 https://github.com/k8gege/Ladon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sponkmonk/Ladon_english_update", "http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html https://elifulkerson.com/CVE-2022-32429/"], ["2022", "CVE-2022-21658", "Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/XIDY-Dex/rmall https://github.com/binganao/vulns-2022 https://github.com/flaging/feed https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rustminded/xtask-wasm https://github.com/sagittarius-a/cve-2022-21658 https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xxg1413/rust-security https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946"], ["2022", "CVE-2022-41541", "TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.", "https://github.com/ARPSyndicate/cvemon https://github.com/efchatz/easy-exploits", "https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay"], ["2022", "CVE-2022-36020", "The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-34125", "front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter.", "No PoCs found on GitHub currently.", "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/"], ["2022", "CVE-2022-3838", "The WPUpper Share Buttons WordPress plugin through 3.42 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0"], ["2022", "CVE-2022-29246", "Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. Prior to version 6.1.11, he USBX DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function does not assure that a buffer overflow will not occur during handling of the DFU UPLOAD command. When an attacker issues the `UX_SLAVE_CLASS_DFU_COMMAND_UPLOAD` control transfer request with `wLenght` larger than the buffer size (`UX_SLAVE_REQUEST_CONTROL_MAX_LENGTH`, 256 bytes), depending on the actual implementation of `dfu -> ux_slave_class_dfu_read`, a buffer overflow may occur. In example `ux_slave_class_dfu_read` may read 4096 bytes (or more up to 65k) to a 256 byte buffer ultimately resulting in an overflow. Furthermore in case an attacker has some control over the read flash memory, this may result in execution of arbitrary code and platform compromise. A fix for this issue has been included in USBX release 6.1.11. As a workaround, align request and buffer size to assure that buffer boundaries are respected.", "https://github.com/ARPSyndicate/cvemon https://github.com/szymonh/szymonh", "No PoCs from references."], ["2022", "CVE-2022-38132", "Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router's web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38023", "Netlogon RPC Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2546", "The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key", "https://github.com/0xvinix/CVE-2022-2546 https://github.com/1ndrz/CVE-2022-2546 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58"], ["2022", "CVE-2022-45059", "An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.", "https://github.com/jdewald/shmoocon2024-talk https://github.com/martinvks/CVE-2022-45059-demo", "No PoCs from references."], ["2022", "CVE-2022-0443", "Use After Free in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51"], ["2022", "CVE-2022-36131", "The Better PDF Exporter add-on 10.0.0 for Atlassian Jira is prone to stored XSS via a crafted description to the PDF Templates overview page.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt"], ["2022", "CVE-2022-27094", "Sony PlayMemories Home v6.0 contains an unquoted service path which allows attackers to escalate privileges to the system level.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50817"], ["2022", "CVE-2022-3869", "Code Injection in GitHub repository froxlor/froxlor prior to 0.10.38.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7de20f21-4a9b-445d-ae2b-15ade648900b"], ["2022", "CVE-2022-2406", "The legacy Slack import feature in Mattermost version 6.7.0 and earlier fails to properly limit the sizes of imported files, which allows an authenticated attacker to crash the server by importing large files via the Slack import REST API.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-21609", "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Server). The supported version that is affected is 5.9.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21598", "Vulnerability in the Siebel Core - DB Deployment and Configuration product of Oracle Siebel CRM (component: Repository Utilities). Supported versions that are affected are 22.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel Core - DB Deployment and Configuration. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Siebel Core - DB Deployment and Configuration accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-0692", "Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203"], ["2022", "CVE-2022-0503", "The WordPress Multisite Content Copier/Updater WordPress plugin before 2.1.2 does not sanitise and escape the s parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue in the network dashboard", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a"], ["2022", "CVE-2022-0991", "Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.1.9.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4"], ["2022", "CVE-2022-29217", "PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has to be used. Users should upgrade to v2.4.0 to receive a patch for this issue. As a workaround, always be explicit with the algorithms that are accepted and expected when decoding.", "https://github.com/seal-community/patches", "https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24"], ["2022", "CVE-2022-38163", "A Drag and Drop spoof vulnerability was discovered in F-Secure SAFE Browser for Android and iOS version 19.0 and below. Drag and drop operation by user on address bar could lead to a spoofing of the address bar.", "https://github.com/KirtiRamchandani/KirtiRamchandani", "No PoCs from references."], ["2022", "CVE-2022-31580", "The sanojtharindu/caretakerr-api repository through 2021-05-17 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-27127", "zbzcms v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php/ajax.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-4328", "The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the server", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed"], ["2022", "CVE-2022-22941", "An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.", "No PoCs found on GitHub currently.", "https://github.com/saltstack/salt/releases,"], ["2022", "CVE-2022-25022", "A cross-site scripting (XSS) vulnerability in Htmly v2.8.1 allows attackers to excute arbitrary web scripts HTML via a crafted payload in the content field of a blog post.", "https://github.com/ARPSyndicate/cvemon https://github.com/MoritzHuppert/CVE-2022-25022 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://danpros.com https://youtu.be/acookTqf3Nc"], ["2022", "CVE-2022-0721", "Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb"], ["2022", "CVE-2022-0822", "Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/06971613-b6ab-4b96-8aa6-4982bfcfeb73"], ["2022", "CVE-2022-2927", "Weak Password Requirements in GitHub repository notrinos/notrinoserp prior to 0.7.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7fa956dd-f541-4dcd-987d-ba15caa6a886"], ["2022", "CVE-2022-3548", "A vulnerability was found in SourceCodester Simple Cold Storage Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the component Add New Storage Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-211048.", "No PoCs found on GitHub currently.", "https://github.com/Ramansh123454/POCs/blob/main/POC https://vuldb.com/?id.211048"], ["2022", "CVE-2022-46152", "OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_invoke_command()` and `entry_open_session()`. The commands `OPTEE_MSG_CMD_OPEN_SESSION` and `OPTEE_MSG_CMD_INVOKE_COMMAND` can be executed from the normal world via an OP-TEE SMC. This function is not validating the `num_params` argument, which is only limited to `OPTEE_MSG_MAX_NUM_PARAMS` (127) in the function `get_cmd_buffer()`. Therefore, an attacker in the normal world can craft an SMC call that will cause out-of-bounds reading in `cleanup_shm_refs` and potentially freeing of fake-objects in the function `mobj_put()`. A normal-world attacker with permission to execute SMC instructions may exploit this flaw. Maintainers believe this problem permits local privilege escalation from the normal world to the secure world. Version 3.19.0 contains a fix for this issue. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1"], ["2022", "CVE-2022-22702", "PartKeepr versions up to v1.4.0, in the functionality to upload attachments using a URL when creating a part does not validate that requests can be made to local ports, allowing an authenticated user to carry out SSRF attacks and port enumeration.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/joplin/"], ["2022", "CVE-2022-38201", "An unvalidated redirect vulnerability exists in Esri Portal for ArcGIS Quick Capture Web Designer versions 10.8.1 to 10.9.1. A remote, unauthenticated attacker can potentially induce an unsuspecting authenticated user to access an an attacker controlled domain.", "No PoCs found on GitHub currently.", "https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available"], ["2022", "CVE-2022-3408", "The WP Word Count WordPress plugin through 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330"], ["2022", "CVE-2022-3799", "A vulnerability classified as critical was found in IBAX go-ibax. Affected by this vulnerability is an unknown functionality of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212635.", "No PoCs found on GitHub currently.", "https://github.com/IBAX-io/go-ibax/issues/2060"], ["2022", "CVE-2022-31573", "The chainer/chainerrl-visualizer repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20607", "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sumeetIT/CVE-2022-20607", "No PoCs from references."], ["2022", "CVE-2022-0962", "Stored XSS viva .webma file upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908"], ["2022", "CVE-2022-32819", "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28219", "Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthenticated XXE attack that leads to Remote Code Execution.", "https://github.com/A0RX/Red-Blueteam-party https://github.com/A0RX/Redblueteamparty https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/aeifkz/CVE-2022-28219-Like https://github.com/horizon3ai/CVE-2022-28219 https://github.com/k0mi-tg/CVE-POC https://github.com/kas0n/RedTeam-Articles https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nvn1729/advisories https://github.com/rbowes-r7/manageengine-auditad-cve-2022-28219 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html https://www.horizon3.ai/red-team-blog-cve-2022-28219/ https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html"], ["2022", "CVE-2022-28188", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product receives input or data, but does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5353"], ["2022", "CVE-2022-2764", "A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-42889", "Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.", "https://github.com/0x783kb/Security-operation-book https://github.com/0xmaximus/Apache-Commons-Text-CVE-2022-42889 https://github.com/0xst4n/CVE-2022-42889 https://github.com/2lambda123/og4j-scan https://github.com/34006133/CVE-2022-42889 https://github.com/A0WaQ4/BurpText4ShellScan https://github.com/ARPSyndicate/cvemon https://github.com/Afrouper/MavenDependencyCVE-Scanner https://github.com/Bl0omZ/JAVAExploitStudy https://github.com/BuildScale/log4j.scan https://github.com/Cad3n/SecureCodingDemo https://github.com/ClickCyber/cve-2022-42889 https://github.com/Dima2021/cve-2022-42889-text4shell https://github.com/DimaMend/cve-2022-42889-text4shell https://github.com/Drun1baby/JavaSecurityLearning https://github.com/Gomez0015/text4shell https://github.com/Gotcha-1G/CVE-2022-42889 https://github.com/HKirito/CVE-2022-33980 https://github.com/Hack4rLIFE/CVE-2022-42889 https://github.com/LeoHLee/GeekGame-2nd-Leo_h https://github.com/Martian1337/Martian1337 https://github.com/MendDemo-josh/cve-2022-42889-text4shell https://github.com/Mr-xn/BurpSuite-collections https://github.com/QAInsights/cve-2022-42889-jmeter https://github.com/Qualys/text4scanwin https://github.com/RIP-Network/cve-2022-42889-scanner https://github.com/RSA-Demo/cve-2022-42889-text4shell https://github.com/Ratlesv/Log4j-SCAN https://github.com/RaxoCoding/text4shell https://github.com/ReachabilityOrg/cve-2022-42889-text4shell-docker https://github.com/RjRaju143/THM-CTF-ROOM https://github.com/RjRaju143/java-CTF https://github.com/SeanWrightSec/CVE-2022-42889-PoC https://github.com/SeanWrightSec/Docker-to-the-Security https://github.com/Sic4rio/CVE-2022-42889 https://github.com/Sikako/text4shell-website https://github.com/TheMuntu/TheMuntu https://github.com/Threekiii/Awesome-POC https://github.com/Vamckis/Container-Security https://github.com/Vulnmachines/text4shell-CVE-2022-42889 https://github.com/WFS-Mend/vtrade-common https://github.com/XRSec/AWVS-Update https://github.com/Y4tacker/JavaSec https://github.com/aaronm-sysdig/text4shell-docker https://github.com/adarshpv9746/Text4shell--Automated-exploit---CVE-2022-42889 https://github.com/akshayithape-devops/CVE-2022-42889-POC https://github.com/aneasystone/github-trending https://github.com/bit3/jsass https://github.com/bollwarm/SecToolSet https://github.com/chainguard-dev/text4shell-policy https://github.com/cryxnet/CVE-2022-42889-RCE https://github.com/cryxnet/cryxnet https://github.com/cxzero/CVE-2022-42889-text4shell https://github.com/d4n-sec/d4n-sec.github.io https://github.com/devenes/text4shell-cve-2022-42889 https://github.com/dgor2023/cve-2022-42889-text4shell-docker https://github.com/eunomie/cve-2022-42889-check https://github.com/f0ng/text4shellburpscanner https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/fullhunt/log4j-scan https://github.com/galoget/CVE-2022-42889-Text4Shell-Docker https://github.com/giterlizzi/secdb-feeds https://github.com/gokul-ramesh/text4shell-exploit https://github.com/gustanini/CVE-2022-42889-Text4Shell-POC https://github.com/hakimsa/toolscans-repo https://github.com/haraamzadaa/text4shell-scan-common-text-calls https://github.com/hotblac/text4shell https://github.com/humbss/CVE-2022-42889 https://github.com/husnain-ce/Log4j-Scan https://github.com/iamsanjay/CVE-2022-42899 https://github.com/jar-analyzer/jar-analyzer https://github.com/jayaram-yalla/CVE-2022-42889-POC_TEXT4SHELL https://github.com/jfrog/text4shell-tools https://github.com/joshbnewton31080/cve-2022-42889-text4shell https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/karthikuj/cve-2022-42889-text4shell-docker https://github.com/kcoble/lab-audition https://github.com/kljunowsky/CVE-2022-42889-text4shell https://github.com/korteke/CVE-2022-42889-POC https://github.com/ljklionel/oscp-notes https://github.com/log4jcodes/log4j.scan https://github.com/manas3c/CVE-POC https://github.com/necroteddy/CVE-2022-42889 https://github.com/neerazz/CVE-2022-42889 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/numencyber/Vulnerability_PoC https://github.com/phixion/phixion https://github.com/pwnb0y/Text4shell-exploit https://github.com/py-legend/text4shell-tools https://github.com/rggu2zr/rggu2zr https://github.com/rhitikwadhvana/CVE-2022-42889-Text4Shell-Exploit-POC https://github.com/robkoo/EndpointAnalytics-RemediationScript-Apache-Commons-text https://github.com/ronin-dojo/oscp-notes https://github.com/s3l33/CVE-2022-42889 https://github.com/securekomodo/text4shell-poc https://github.com/securekomodo/text4shell-scan https://github.com/silentsignal/burp-text4shell https://github.com/smileostrich/Text4Shell-Scanner https://github.com/sophxe/suricata-rules https://github.com/standb/CVE-2022-42889 https://github.com/stavrosgns/Text4ShellPayloads https://github.com/sunnyvale-it/CVE-2022-42889-PoC https://github.com/teplyuska/spring-boot-actuator-info-demo https://github.com/teresaweber685/book_list https://github.com/tulhan/commons-text-goat https://github.com/uk0/cve-2022-42889-intercept https://github.com/wangweixuan/pku-geekgame-2nd https://github.com/west-wind/CVE-2022-42889 https://github.com/west-wind/Threat-Hunting-With-Splunk https://github.com/whoforget/CVE-POC https://github.com/xu-xiang/awesome-security-vul-llm https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html"], ["2022", "CVE-2022-0661", "The Ad Injection WordPress plugin through 1.2.0.19 does not properly sanitize the body of the adverts injected into the pages, allowing a high privileged user (Admin+) to inject arbitrary HTML or javascript even with unfiltered_html disallowed, leading to a stored cross-site scripting (XSS) vulnerability. Further it is also possible to inject PHP code, leading to a Remote Code execution (RCE) vulnerability, even if the DISALLOW_FILE_EDIT and DISALLOW_FILE_MOD constants are both set.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd"], ["2022", "CVE-2022-36313", "An issue was discovered in the file-type package before 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-36082", "mangadex-downloader is a command-line tool to download manga from MangaDex. When using `file:` command and `` is a web URL location (http, https), mangadex-downloader between versions 1.3.0 and 1.7.2 will try to open and read a file in local disk for each line of website contents. Version 1.7.2 contains a patch for this issue.", "No PoCs found on GitHub currently.", "https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw"], ["2022", "CVE-2022-4268", "The Plugin Logic WordPress plugin before 1.0.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/plugin-logic_1-0-7/ https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2"], ["2022", "CVE-2022-2675", "Using off-the-shelf commodity hardware, the Unitree Go 1 robotics platform version H0.1.7 and H0.1.9 (using firmware version 0.1.35) can be powered down by an attacker within normal RF range without authentication. Other versions may be affected, such as the A1.", "No PoCs found on GitHub currently.", "https://fccid.io/2A5PE-YUSHU001/Users-Manual/User-Manual-5810729"], ["2022", "CVE-2022-42998", "D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack overflow via the srcip parameter at /goform/form2IPQoSTcAdd.", "https://github.com/ARPSyndicate/cvemon https://github.com/hunzi0/Vullnfo", "https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-28099", "Poultry Farm Management System v1.0 was discovered to contain a SQL injection vulnerability via the Item parameter at /farm/store.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/IbrahimEkimIsik/CVE-2022-28099 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0 https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip"], ["2022", "CVE-2022-0770", "The Translate WordPress with GTranslate WordPress plugin before 2.9.9 does not have CSRF check in some files, and write debug data such as user's cookies in a publicly accessible file if a specific parameter is used when requesting them. Combining those two issues, an attacker could gain access to a logged in admin cookies by making them open a malicious link or page", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d"], ["2022", "CVE-2022-36202", "Doctor's Appointment System1.0 is vulnerable to Incorrect Access Control via edoc/patient/settings.php. The settings.php is affected by Broken Access Control (IDOR) via id= parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/aznull/CVEs", "No PoCs from references."], ["2022", "CVE-2022-36193", "SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries.", "https://github.com/ARPSyndicate/cvemon https://github.com/G37SYS73M/CVE-2022-36193 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md"], ["2022", "CVE-2022-41763", "An issue was discovered in NOKIA AMS 9.7.05. Remote Code Execution exists via the debugger of the ipAddress variable. A remote user, authenticated to the AMS server, could inject code in the PING function. The privileges of the command executed depend on the user that runs the service.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-4379", "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da"], ["2022", "CVE-2022-48011", "Opencats v0.9.7 was discovered to contain a SQL injection vulnerability via the importID parameter in the Import viewerrors function.", "No PoCs found on GitHub currently.", "https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-sql%20injection%20in%20viewerrors-importID.md"], ["2022", "CVE-2022-25073", "TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841N"], ["2022", "CVE-2022-22582", "A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5, macOS Monterey 12.3. A local user may be able to write arbitrary files.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/poizon-box/CVE-2022-22582 https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-44006", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation or sanitization of upload filenames, an externally reachable, unauthenticated update function permits writing files outside the intended target location. Achieving remote code execution is possible, e.g., by uploading an executable file.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-3688", "The WPQA Builder WordPress plugin before 5.9 does not have CSRF check when following and unfollowing users, which could allow attackers to make logged in users perform such actions via CSRF attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848"], ["2022", "CVE-2022-38310", "Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the list parameter at /goform/SetStaticRouteCfg.", "No PoCs found on GitHub currently.", "https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6"], ["2022", "CVE-2022-46292", "Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Unit Cell Translation section", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666"], ["2022", "CVE-2022-0873", "The Gmedia Photo Gallery WordPress plugin before 1.20.0 does not sanitise and escape the Album's name before outputting it in pages/posts with a media embed, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered-html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e"], ["2022", "CVE-2022-32908", "A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. A user may be able to elevate privileges.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41"], ["2022", "CVE-2022-22753", "A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1732435 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31522", "The NotVinay/karaokey repository through 2019-12-11 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20955", "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4239", "The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c"], ["2022", "CVE-2022-22850", "A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_types.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Sant268/CVE-2022-22850 https://github.com/WhooAmii/POC_to_review https://github.com/binganao/vulns-2022 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-25133", "A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-2735", "A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the \"hacluster\" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.", "https://github.com/ARPSyndicate/cvemon", "https://www.openwall.com/lists/oss-security/2022/09/01/4"], ["2022", "CVE-2022-0630", "Out-of-bounds Read in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32"], ["2022", "CVE-2022-2432", "The Ecwid Ecommerce Shopping Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.10.23. This is due to missing or incorrect nonce validation on the ecwid_update_plugin_params function. This makes it possible for unauthenticated attackers to update plugin options granted they can trick a site administrator into performing an action such as clicking on a link.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0537", "The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the \"ajax_save\" function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367"], ["2022", "CVE-2022-47028", "An issue discovered in Action Launcher for Android v50.5 allows an attacker to cause a denial of service via arbitary data injection to function insert.", "No PoCs found on GitHub currently.", "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md"], ["2022", "CVE-2022-1958", "A vulnerability classified as critical has been found in FileCloud. Affected is an unknown function of the component NTFS Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. Upgrading to version 21.3.5.18513 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-201960.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.201960"], ["2022", "CVE-2022-36045", "NodeBB Forum Software is powered by Node.js and supports either Redis, MongoDB, or a PostgreSQL database. It utilizes web sockets for instant interactions and real-time notifications. `utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the password reset functionality could enable an attacker to correctly calculate the reset code for an account they do not have access to. This vulnerability impacts all installations of NodeBB. The vulnerability allows for an attacker to take over any account without the involvement of the victim, and as such, the remediation should be applied immediately (either via NodeBB upgrade or cherry-pick of the specific changeset. The vulnerability has been patched in version 2.x and 1.19.x. There is no known workaround, but the patch sets listed above will fully patch the vulnerability.", "https://github.com/HakuPiku/CVEs", "No PoCs from references."], ["2022", "CVE-2022-48256", "Technitium DNS Server before 10.0 allows a self-CNAME denial-of-service attack in which a CNAME loop causes an answer to contain hundreds of records.", "https://github.com/dns-differential-fuzzing/dns-differential-fuzzing", "No PoCs from references."], ["2022", "CVE-2022-34140", "A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html"], ["2022", "CVE-2022-29223", "Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack. In versions prior to 6.1.10, an attacker can cause a buffer overflow by providing the Azure RTOS USBX host stack a HUB descriptor with `bNbPorts` set to a value greater than `UX_MAX_TT` which defaults to 8. For a `bNbPorts` value of 255, the implementation of `ux_host_class_hub_descriptor_get` function will modify the contents of `hub` -> `ux_host_class_hub_device` -> `ux_device_hub_tt` array violating the end boundary by 255 - `UX_MAX_TT` items. The USB host stack needs to validate the number of ports reported by the hub, and if the value is larger than UX_MAX_TT, USB stack needs to reject the request. This fix has been included in USBX release 6.1.10.", "https://github.com/ARPSyndicate/cvemon https://github.com/szymonh/szymonh", "No PoCs from references."], ["2022", "CVE-2022-31625", "In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46344", "A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40648", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper validation of user-supplied data, which can result in a write before the start of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17563.", "https://github.com/ARPSyndicate/cvemon https://github.com/bigblackhat/oFx https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-24158", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetIpMacBind. This vulnerability allows attackers to cause a Denial of Service (DoS) via the list parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-24018", "A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the multiWAN binary.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463"], ["2022", "CVE-2022-29363", "Phpok v6.1 was discovered to contain a deserialization vulnerability via the update_f() function in login_control.php. This vulnerability allows attackers to getshell via writing arbitrary files.", "No PoCs found on GitHub currently.", "https://github.com/qinggan/phpok/issues/12"], ["2022", "CVE-2022-20780", "Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an attacker to escape from the guest virtual machine (VM) to the host machine, inject commands that execute at the root level, or leak system data from the host to the VM. For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg"], ["2022", "CVE-2022-1818", "The Multi-page Toolkit WordPress plugin through 2.6 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping as well", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d"], ["2022", "CVE-2022-27271", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the component python-lib. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-34000", "libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc.", "No PoCs found on GitHub currently.", "https://github.com/libjxl/libjxl/issues/1477"], ["2022", "CVE-2022-1909", "Cross-site Scripting (XSS) - Stored in GitHub repository causefx/organizr prior to 2.1.2200.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8f83eb8f-51a8-41c0-bc7d-077f48faebdc"], ["2022", "CVE-2022-27360", "SpringBlade v3.2.0 and below was discovered to contain a SQL injection vulnerability via the component customSqlSegment.", "https://github.com/Shelter1234/VulneraLab", "No PoCs from references."], ["2022", "CVE-2022-25265", "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/x0reaxeax/exec-prot-bypass", "https://github.com/x0reaxeax/exec-prot-bypass"], ["2022", "CVE-2022-22897", "A SQL injection vulnerability in the product_all_one_img and image_product parameters of the ApolloTheme AP PageBuilder component through 2.4.4 for PrestaShop allows unauthenticated attackers to exfiltrate database data.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html"], ["2022", "CVE-2022-33872", "An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Telnet login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-48196", "Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94.", "No PoCs found on GitHub currently.", "https://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug/"], ["2022", "CVE-2022-30518", "ChatBot Application with a Suggestion Feature 1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /simple_chat_bot/admin/responses/view_response.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html"], ["2022", "CVE-2022-37378", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor 11.1.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the optimization of JavaScript functions. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16867.", "https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-24298", "All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.", "https://github.com/claroty/opcua-exploit-framework", "https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720"], ["2022", "CVE-2022-29272", "In Nagios XI through 5.8.5, an open redirect vulnerability exists in the login function that could lead to spoofing.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/sT0wn-nl/CVEs", "https://github.com/4LPH4-NL/CVEs https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi"], ["2022", "CVE-2022-31674", "VMware vRealize Operations contains an information disclosure vulnerability. A low-privileged malicious actor with network access can access log files that lead to information disclosure.", "https://github.com/ARPSyndicate/cvemon https://github.com/sourceincite/DashOverride https://github.com/trhacknon/DashOverride", "No PoCs from references."], ["2022", "CVE-2022-29332", "D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the \"../../../../\" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.", "No PoCs found on GitHub currently.", "https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf"], ["2022", "CVE-2022-22545", "A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-20440", "In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242259918", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2523", "Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f"], ["2022", "CVE-2022-0426", "The Product Feed PRO for WooCommerce WordPress plugin before 11.2.3 does not escape the rowCount parameter before outputting it back in an attribute via the woosea_categories_dropdown AJAX action (available to any authenticated user), leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a"], ["2022", "CVE-2022-1849", "Session Fixation in GitHub repository filegator/filegator prior to 7.8.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/881f8f36-d5c8-470d-8261-f109e6d5db4b"], ["2022", "CVE-2022-33932", "Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.2, contain an unprotected primary channel vulnerability. An unauthenticated network malicious attacker may potentially exploit this vulnerability, leading to a denial of filesystem services.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en"], ["2022", "CVE-2022-29110", "Microsoft Excel Remote Code Execution Vulnerability", "https://github.com/2lambda123/CVE-mitre https://github.com/ARPSyndicate/cvemon https://github.com/nu11secur1ty/CVE-mitre", "No PoCs from references."], ["2022", "CVE-2022-1568", "The Team Members WordPress plugin before 5.1.1 does not escape some of its Team settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc"], ["2022", "CVE-2022-31516", "The Harveyzyh/Python repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0907", "Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/392"], ["2022", "CVE-2022-2490", "A vulnerability classified as critical has been found in SourceCodester Simple E-Learning System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument classCode with the input 1'||(SELECT 0x74666264 WHERE 5610=5610 AND (SELECT 7504 FROM(SELECT COUNT(*),CONCAT(0x7171627a71,(SELECT (ELT(7504=7504,1))),0x71717a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php"], ["2022", "CVE-2022-39108", "In Music service, there is a missing permission check. This could lead to elevation of privilege in Music service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-39299", "Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround.", "https://github.com/doyensec/CVE-2022-39299_PoC_Generator https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/seal-community/cli https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html"], ["2022", "CVE-2022-0604", "Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0595", "The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.3 allows SVG files to be uploaded by default via the dnd_codedropz_upload AJAX action, which could lead to Stored Cross-Site Scripting issue", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de"], ["2022", "CVE-2022-27002", "Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the ddns function via the ddns_name, ddns_pwd, h_ddns\u3001ddns_host parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-48165", "An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 M30H4.V5030.210121 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-25296", "The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623"], ["2022", "CVE-2022-20821", "A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/santosomar/kev_checker", "No PoCs from references."], ["2022", "CVE-2022-41757", "An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to obtain write access to read-only memory, or obtain access to already freed memory. This affects Valhall r29p0 through r38p1 before r38p2, and r39p0 before r40p0.", "https://github.com/yanglingxi1993/yanglingxi1993.github.io", "No PoCs from references."], ["2022", "CVE-2022-25047", "The password reset token in CWP v0.9.8.1126 is generated using known or predictable values.", "No PoCs found on GitHub currently.", "https://github.com/Immersive-Labs-Sec/CentOS-WebPanel"], ["2022", "CVE-2022-0847", "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "https://github.com/0day404/vulnerability-poc https://github.com/0xIronGoat/dirty-pipe https://github.com/0xStrygwyr/OSCP-Guide https://github.com/0xTen/pwn-gym https://github.com/0xZipp0/OSCP https://github.com/0xeremus/dirty-pipe-poc https://github.com/0xr1l3s/CVE-2022-0847 https://github.com/0xsmirk/vehicle-kernel-exploit https://github.com/0xsyr0/OSCP https://github.com/20142995/sectool https://github.com/2xYuan/CVE-2022-0847 https://github.com/4O4errorrr/TP_be_root https://github.com/4bhishek0/CVE-2022-0847-Poc https://github.com/4luc4rdr5290/CVE-2022-0847 https://github.com/ARPSyndicate/cvemon https://github.com/Abhi-1712/ejpt-roadmap https://github.com/Al1ex/CVE-2022-0847 https://github.com/Al1ex/LinuxEelvation https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits https://github.com/AnastasiaLomova/PR1 https://github.com/AnastasiaLomova/PR1.1 https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit https://github.com/ArrestX/--POC https://github.com/Awrrays/Pentest-Tips https://github.com/AyoubNajim/cve-2022-0847dirtypipe-exploit https://github.com/BlessedRebuS/OSCP-Pentesting-Cheatsheet https://github.com/BlizzardEternity/CVE-2022-0847 https://github.com/BlizzardEternity/DirtyPipe-Android https://github.com/BlizzardEternity/dirtypipez-exploit https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/CYB3RK1D/CVE-2022-0847-POC https://github.com/Ch4nc3n/PublicExploitation https://github.com/CharonDefalt/linux-exploit https://github.com/DanaEpp/pwncat_dirtypipe https://github.com/DanielShmu/OSCP-Cheat-Sheet https://github.com/DataDog/dirtypipe-container-breakout-poc https://github.com/DataFox/CVE-2022-0847 https://github.com/DevataDev/PiracyTools https://github.com/DylanBarbe/dirty-pipe-clone-4-root https://github.com/DylanBarbe/hj https://github.com/EGI-Federation/SVG-advisories https://github.com/EagleTube/CVE-2022-0847 https://github.com/FeFi7/attacking_embedded_linux https://github.com/FedericoGaribay/Tarea-exploit https://github.com/Getshell/LinuxTQ https://github.com/GhostTroops/TOP https://github.com/GibzB/THM-Captured-Rooms https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe- https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits https://github.com/Ha0-Y/LinuxKernelExploits https://github.com/Ha0-Y/kernel-exploit-cve https://github.com/HadessCS/Awesome-Privilege-Escalation https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation https://github.com/Ignitetechnologies/Linux-Privilege-Escalation https://github.com/JERRY123S/all-poc https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups https://github.com/JlSakuya/CVE-2022-0847-container-escape https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/KayCHENvip/vulnerability-poc https://github.com/Kiosec/Linux-Exploitation https://github.com/LP-H4cmilo/CVE-2022-0847_DirtyPipe_Exploits https://github.com/LudovicPatho/CVE-2022-0847 https://github.com/LudovicPatho/CVE-2022-0847_dirty-pipe https://github.com/Ly0nt4r/OSCP https://github.com/MCANMCAN/TheDirtyPipeExploit https://github.com/ManciSee/M6__Insecure_Authorization https://github.com/Meowmycks/OSCPprep-Cute https://github.com/Meowmycks/OSCPprep-Sar https://github.com/Meowmycks/OSCPprep-hackme1 https://github.com/Metarget/metarget https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/MrP1xel/CVE-2022-0847-dirty-pipe-kernel-checker https://github.com/Mustafa1986/CVE-2022-0847-DirtyPipe-Exploit https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Nekoox/dirty-pipe https://github.com/NetKingJ/awesome-android-security https://github.com/NxPnch/Linux-Privesc https://github.com/OlegBr04/Traitor https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Patocoh/Research-Dirty-Pipe https://github.com/PenTestical/linpwn https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker https://github.com/Qwertozavr/PR1_3 https://github.com/Qwertozavr/PR1_3.2 https://github.com/Qwertozavr/PR1_TRPP https://github.com/RACHO-PRG/Linux_Escalada_Privilegios https://github.com/SYRTI/POC_to_review https://github.com/Shadowven/Vulnerability_Reproduction https://github.com/Shotokhan/cve_2022_0847_shellcode https://github.com/SirElmard/ethical_hacking https://github.com/SnailDev/github-hot-hub https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/T4t4ru/CVE-2022-0847 https://github.com/Tanq16/link-hub https://github.com/Threekiii/Awesome-POC https://github.com/Trickhish/automated_privilege_escalation https://github.com/Turzum/ps-lab-cve-2022-0847 https://github.com/Udyz/CVE-2022-0847 https://github.com/UgoDasseleer/write-up-Intermediate-Nmap https://github.com/V0WKeep3r/CVE-2022-0847-DirtyPipe-Exploit https://github.com/VISHALSB85/ejpt-roadmap https://github.com/VinuKalana/DirtyPipe-CVE-2022-0847 https://github.com/WhooAmii/POC_to_review https://github.com/XiaozaYa/CVE-Recording https://github.com/XmasSnowISBACK/CVE-2022-0847-DirtyPipe-Exploits https://github.com/ZWDeJun/ZWDeJun https://github.com/Zen-ctrl/Rutgers_Cyber_Range https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground https://github.com/ahrixia/CVE_2022_0847 https://github.com/airbus-cert/dirtypipe-ebpf_detection https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs https://github.com/al4xs/CVE-2022-0847-Dirty-Pipe https://github.com/antx-code/CVE-2022-0847 https://github.com/arttnba3/CVE-2022-0847 https://github.com/aruncs31s/Ethical-h4ckers.github.io https://github.com/aruncs31s/ethical-hacking https://github.com/atksh/Dirty-Pipe-sudo-poc https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits https://github.com/ayushx007/CVE-2022-0847-dirty-pipe-checker https://github.com/b4dboy17/Dirty-Pipe-Oneshot https://github.com/babyshen/CVE-2022-0847 https://github.com/badboy-sft/Dirty-Pipe-Oneshot https://github.com/badboycxcc/script https://github.com/basharkey/CVE-2022-0847-dirty-pipe-checker https://github.com/bbaranoff/CVE-2022-0847 https://github.com/beruangsalju/LocalPrivelegeEscalation https://github.com/beruangsalju/LocalPrivilegeEscalation https://github.com/binganao/vulns-2022 https://github.com/bohr777/cve-2022-0847dirtypipe-exploit https://github.com/boy-hack/zsxq https://github.com/brant-ruan/poc-demo https://github.com/breachnix/dirty-pipe-poc https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/c0ntempt/CVE-2022-0847 https://github.com/carlcedin/moe-demo https://github.com/carlosevieira/Dirty-Pipe https://github.com/chenaotian/CVE-2022-0185 https://github.com/chenaotian/CVE-2022-0847 https://github.com/cont3mpt/CVE-2022-0847 https://github.com/cookiengineer/groot https://github.com/crac-learning/CVE-analysis-reports https://github.com/crowsec-edtech/Dirty-Pipe https://github.com/crusoe112/DirtyPipePython https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/d-rn/vulBox https://github.com/d4n-sec/d4n-sec.github.io https://github.com/dadhee/CVE-2022-0847_DirtyPipeExploit https://github.com/decrypthing/CVE_2022_0847 https://github.com/drapl0n/dirtypipe https://github.com/e-hakson/OSCP https://github.com/edr1412/Dirty-Pipe https://github.com/edsonjt81/CVE-2022-0847-DirtyPipe- https://github.com/edsonjt81/CVE-2022-0847-Linux https://github.com/edsonjt81/Linux-Privilege-Escalation https://github.com/eduquintanilha/CVE-2022-0847-DirtyPipe-Exploits https://github.com/eljosep/OSCP-Guide https://github.com/emmaneugene/CS443-project https://github.com/eremus-dev/Dirty-Pipe-sudo-poc https://github.com/eric-glb/dirtypipe https://github.com/febinrev/dirtypipez-exploit https://github.com/felixfu59/kernel-hack https://github.com/flux10n/CVE-2022-0847-DirtyPipe-Exploits https://github.com/giterlizzi/secdb-feeds https://github.com/githublihaha/DirtyPIPE-CVE-2022-0847 https://github.com/greenhandatsjtu/CVE-2022-0847-Container-Escape https://github.com/gyaansastra/CVE-2022-0847 https://github.com/h0pe-ay/Vulnerability-Reproduction https://github.com/h4ckm310n/CVE-2022-0847-eBPF https://github.com/h4ckm310n/Container-Vulnerability-Exploit https://github.com/hegusung/netscan https://github.com/hheeyywweellccoommee/CVE-2022-0847-gfobj https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/hoanbi1812000/hoanbi1812000 https://github.com/hugefiver/mystars https://github.com/hugs42/infosec https://github.com/hxlxmjxbbxs/TheDirtyPipeExploit https://github.com/iandrade87br/OSCP https://github.com/icontempt/CVE-2022-0847 https://github.com/ih3na/debian11-dirty_pipe-patcher https://github.com/imfiver/CVE-2022-0847 https://github.com/iohubos/iohubos https://github.com/iridium-soda/container-escape-exploits https://github.com/irwx777/CVE-2022-0847 https://github.com/isaiahsimeone/COMP3320-VAPT https://github.com/jamesbrunet/dirtypipe-writeup https://github.com/jbmihoub/all-poc https://github.com/joeymeech/CVE-2022-0847-Exploit-Implementation https://github.com/jonathanbest7/cve-2022-0847 https://github.com/jpts/CVE-2022-0847-DirtyPipe-Container-Breakout https://github.com/jxpsx/CVE-2022-0847-DirtyPipe-Exploits https://github.com/k0mi-tg/CVE-POC https://github.com/kaosagnt/ansible-everyday https://github.com/karimhabush/cyberowl https://github.com/kdn111/linux-kernel-exploitation https://github.com/kgwanjala/oscp-cheatsheet https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups https://github.com/knd06/linux-kernel-exploitation https://github.com/knqyf263/CVE-2022-0847 https://github.com/kun-g/Scraping-Github-trending https://github.com/kwxk/Rutgers_Cyber_Range https://github.com/leoambrus/CheckersNomisec https://github.com/letsr00t/CVE-2022-0847 https://github.com/lewiswu1209/sif https://github.com/liamg/liamg https://github.com/liamg/traitor https://github.com/lions2012/Penetration_Testing_POC https://github.com/logit507/logit507 https://github.com/logm1lo/CVE-2022-0847_DirtyPipe_Exploits https://github.com/lonnyzhang423/github-hot-hub https://github.com/lucksec/CVE-2022-0847 https://github.com/makoto56/penetration-suite-toolkit https://github.com/manas3c/CVE-POC https://github.com/marksowell/my-stars https://github.com/marksowell/starred https://github.com/marksowell/stars https://github.com/merlinepedra/TRAITOR https://github.com/merlinepedra25/TRAITOR https://github.com/mhanief/dirtypipe https://github.com/michaelklaan/CVE-2022-0847-Dirty-Pipe https://github.com/mrchucu1/CVE-2022-0847-Docker https://github.com/murchie85/twitterCyberMonitor https://github.com/mutur4/CVE-2022-0847 https://github.com/n3rada/DirtyPipe https://github.com/nanaao/Dirtypipe-exploit https://github.com/nanaao/dirtyPipe-automaticRoot https://github.com/ndk191/linux-kernel-exploitation https://github.com/nidhi7598/linux-4.19.72_lib_CVE-2022-0847 https://github.com/nitishbadole/oscp-note-3 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/notl0cal/dpipe https://github.com/notmariekondo/notmariekondo https://github.com/nu1l-ptr/CVE-2022-0847-Poc https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits https://github.com/oscpname/OSCP_cheat https://github.com/parkjunmin/CTI-Search-Criminalip-Search-Tool https://github.com/pashayogi/DirtyPipe https://github.com/pen4uin/awesome-cloud-native-security https://github.com/pen4uin/cloud-native-security https://github.com/pentestblogin/pentestblog-CVE-2022-0847 https://github.com/peterspbr/dirty-pipe-otw https://github.com/phuonguno98/CVE-2022-0847-DirtyPipe-Exploits https://github.com/pipiscrew/timeline https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847 https://github.com/polygraphene/DirtyPipe-Android https://github.com/promise2k/OSCP https://github.com/puckiestyle/CVE-2022-0847 https://github.com/qqdagustian/CVE_2022_0847 https://github.com/qwert419/linux- https://github.com/r1is/CVE-2022-0847 https://github.com/rahul1406/cve-2022-0847dirtypipe-exploit https://github.com/raohemanth/cybersec-dirty-pipe-vulnerability https://github.com/realbatuhan/dirtypipetester https://github.com/revanmalang/OSCP https://github.com/rexpository/linux-privilege-escalation https://github.com/s3mPr1linux/CVE_2022_0847 https://github.com/sa-infinity8888/Dirty-Pipe-CVE-2022-0847 https://github.com/sarutobi12/sarutobi12 https://github.com/scopion/dirty-pipe https://github.com/si1ent-le/CVE-2022-0847 https://github.com/siberiah0h/CVE-CNVD-HUB https://github.com/siegfrkn/CSCI5403_CVE20220847_Detection https://github.com/smile-e3/vehicle-kernel-exploit https://github.com/solomon12354/CVE-2022-0847-Dirty_Pipe_virus https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus https://github.com/soosmile/POC https://github.com/source-xu/docker-vuls https://github.com/ssr-111/linux-kernel-exploitation https://github.com/stefanoleggio/dirty-pipe-cola https://github.com/stfnw/Debugging_Dirty_Pipe_CVE-2022-0847 https://github.com/taielab/awesome-hacking-lists https://github.com/talent-x90c/cve_list https://github.com/tanjiti/sec_profile https://github.com/teamssix/container-escape-check https://github.com/terabitSec/dirtyPipe-automaticRoot https://github.com/theo-goetzinger/TP_be_root https://github.com/thesakibrahman/THM-Free-Room https://github.com/tiann/DirtyPipeRoot https://github.com/tmoneypenny/CVE-2022-0847 https://github.com/trhacknon/CVE-2022-0847-DirtyPipe-Exploit https://github.com/trhacknon/Pocingit https://github.com/trhacknon/dirtypipez-exploit https://github.com/tstromberg/ioc-bench https://github.com/tstromberg/ttp-bench https://github.com/tufanturhan/CVE-2022-0847-L-nux-PrivEsc https://github.com/txuswashere/OSCP https://github.com/uhub/awesome-c https://github.com/ukmihiran/Rubber_Ducky_Payloads https://github.com/veritas501/pipe-primitive https://github.com/versatilexec/CVE_2022_0847 https://github.com/vknc/vknc.github.io https://github.com/weeka10/-hktalent-TOP https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation- https://github.com/whoforget/CVE-POC https://github.com/wpressly/exploitations https://github.com/x90hack/vulnerabilty_lab https://github.com/xairy/linux-kernel-exploitation https://github.com/xhref/OSCP https://github.com/xnderLAN/CVE-2022-0847 https://github.com/xndpxs/CVE-2022-0847 https://github.com/xsudoxx/OSCP https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape https://github.com/youwizard/CVE-POC https://github.com/z3dc0ps/awesome-linux-exploits https://github.com/zecool/cve https://github.com/zzcentury/PublicExploitation", "http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html https://dirtypipe.cm4all.com/"], ["2022", "CVE-2022-41854", "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.", "https://github.com/ARPSyndicate/cvemon https://github.com/DrC0okie/HEIG_SLH_Labo1 https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/bw0101/bee004 https://github.com/danielps99/startquarkus https://github.com/fernandoreb/dependency-check-springboot https://github.com/java-sec/SnakeYaml-vuls https://github.com/scordero1234/java_sec_demo-main https://github.com/sr-monika/sprint-rest https://github.com/srchen1987/springcloud-distributed-transaction", "No PoCs from references."], ["2022", "CVE-2022-0956", "Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2"], ["2022", "CVE-2022-2853", "Heap buffer overflow in Downloads in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html"], ["2022", "CVE-2022-38235", "XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::getChar() at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-29141", "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1539", "The Exports and Reports WordPress plugin before 0.9.2 does not sanitize and validate data when generating the CSV to export, which could lead to a CSV injection, by the use of Microsoft Excel DDE function, or to leak data via maliciously injected hyperlinks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523"], ["2022", "CVE-2022-41945", "super-xray is a vulnerability scanner (xray) GUI launcher. In version 0.1-beta, the URL is not filtered and directly spliced \u200b\u200binto the command, resulting in a possible RCE vulnerability. Users should upgrade to super-xray 0.2-beta.", "No PoCs found on GitHub currently.", "https://github.com/4ra1n/super-xray/releases/tag/0.2-beta"], ["2022", "CVE-2022-31547", "The noamezekiel/sphere repository through 2020-05-31 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-36327", "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could allow an attacker to write files to locations with certain critical filesystem types leading to remote code execution was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires an authentication bypass issue to be triggered before this can be exploited.\u00a0This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191; My Cloud OS 5: before 5.26.202.", "https://github.com/sanchar21/Journal-Final21", "No PoCs from references."], ["2022", "CVE-2022-22835", "An issue was discovered in OverIT Geocall before version 8.0. An authenticated user who has the Test Trasformazione XSL functionality enabled can exploit a XXE vulnerability to read arbitrary files from the filesystem.", "No PoCs found on GitHub currently.", "https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/"], ["2022", "CVE-2022-2750", "A vulnerability, which was classified as critical, was found in SourceCodester Company Website CMS. Affected is an unknown function of the file /dashboard/add-service.php of the component Add Service Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. VDB-206022 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206022"], ["2022", "CVE-2022-39388", "Istio is an open platform to connect, manage, and secure microservices. In versions on the 1.15.x branch prior to 1.15.3, a user can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane. Version 1.15.3 contains a patch for this issue. There are no known workarounds.", "https://github.com/zhaohuabing/cve-agent", "No PoCs from references."], ["2022", "CVE-2022-2610", "Insufficient policy enforcement in Background Fetch in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2581", "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b"], ["2022", "CVE-2022-0715", "A CWE-287: Improper Authentication vulnerability exists that could cause an attacker to arbitrarily change the behavior of the UPS when a key is leaked and used to upload malicious firmware. Affected Product: APC Smart-UPS Family: SMT Series (SMT Series ID=18: UPS 09.8 and prior / SMT Series ID=1040: UPS 01.2 and prior / SMT Series ID=1031: UPS 03.1 and prior), SMC Series (SMC Series ID=1005: UPS 14.1 and prior / SMC Series ID=1007: UPS 11.0 and prior / SMC Series ID=1041: UPS 01.1 and prior), SCL Series (SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior), SMX Series (SMX Series ID=20: UPS 10.2 and prior / SMX Series ID=23: UPS 07.0 and prior), SRT Series (SRT Series ID=1010/1019/1025: UPS 08.3 and prior / SRT Series ID=1024: UPS 01.0 and prior / SRT Series ID=1020: UPS 10.4 and prior / SRT Series ID=1021: UPS 12.2 and prior / SRT Series ID=1001/1013: UPS 05.1 and prior / SRT Series ID=1002/1014: UPSa05.2 and prior), APC SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02"], ["2022", "CVE-2022-36267", "In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Unauthenticated remote command injection vulnerability. The ping functionality can be called without user authentication when crafting a malicious http request by injecting code in one of the parameters allowing for remote code execution. This vulnerability is exploited via the binary file /home/www/cgi-bin/diagnostics.cgi that accepts unauthenticated requests and unsanitized data. As a result, a malicious actor can craft a specific request and interact remotely with the device.", "https://github.com/0xNslabs/CVE-2022-36267-PoC https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html"], ["2022", "CVE-2022-41497", "ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the pkg_url parameter at /manager/index.php.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md"], ["2022", "CVE-2022-43603", "A denial of service vulnerability exists in the ZfileOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657"], ["2022", "CVE-2022-43592", "An information disclosure vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651"], ["2022", "CVE-2022-25016", "Home Owners Collection Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /student_attendance/index.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/lohyt/web-shell-via-file-upload-in-hocms", "No PoCs from references."], ["2022", "CVE-2022-46166", "Spring boot admins is an open source administrative user interface for management of spring boot applications. All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are affected. Users are advised to upgrade to the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 to resolve this issue. Users unable to upgrade may disable any notifier or disable write access (POST request) on `/env` actuator endpoint.", "https://github.com/ARPSyndicate/cvemon https://github.com/DickDock/CVE-2022-46166 https://github.com/luelueking/Java-CVE-Lists https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-31796", "libjpeg 1.63 has a heap-based buffer over-read in HierarchicalBitmapRequester::FetchRegion in hierarchicalbitmaprequester.cpp because the MCU size can be different between allocation and use.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/71"], ["2022", "CVE-2022-2913", "The Login No Captcha reCAPTCHA WordPress plugin before 1.7 doesn't check the proper IP address allowing attackers to spoof IP addresses on the allow list and bypass the need for captcha on the login screen.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1"], ["2022", "CVE-2022-23988", "The WS Form LITE and Pro WordPress plugins before 1.8.176 do not sanitise and escape submitted form data, allowing unauthenticated attacker to submit XSS payloads which will get executed when a privileged user will view the related submission", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/simonepetruzzi/WebSecurityProject", "https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6"], ["2022", "CVE-2022-31209", "An issue was discovered in Infiray IRAY-A8Z3 1.0.957. The firmware contains a potential buffer overflow by calling strcpy() without checking the string length beforehand.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/"], ["2022", "CVE-2022-31198", "OpenZeppelin Contracts is a library for secure smart contract development. This issue concerns instances of Governor that use the module `GovernorVotesQuorumFraction`, a mechanism that determines quorum requirements as a percentage of the voting token's total supply. In affected instances, when a proposal is passed to lower the quorum requirements, past proposals may become executable if they had been defeated only due to lack of quorum, and the number of votes it received meets the new quorum requirement. Analysis of instances on chain found only one proposal that met this condition, and we are actively monitoring for new occurrences of this particular issue. This issue has been patched in v4.7.2. Users are advised to upgrade. Users unable to upgrade should consider avoiding lowering quorum requirements if a past proposal was defeated for lack of quorum.", "https://github.com/ARPSyndicate/cvemon https://github.com/OpenZeppelin/governor-quorum-bot", "No PoCs from references."], ["2022", "CVE-2022-24574", "GPAC 1.0.1 is affected by a NULL pointer dereference in gf_dump_vrml_field.isra ().", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c/"], ["2022", "CVE-2022-37705", "A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),", "https://github.com/MaherAzzouzi/CVE-2022-37705 https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/MaherAzzouzi/CVE-2022-37705"], ["2022", "CVE-2022-30165", "Windows Kerberos Elevation of Privilege Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html"], ["2022", "CVE-2022-37806", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the page parameter in the function fromDhcpListClient.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4"], ["2022", "CVE-2022-21211", "This affects all versions of package posix. When invoking the toString method, it will fallback to 0x0 value, as the value of toString is not invokable (not a function), and then it will crash with type-check.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-POSIX-2400719"], ["2022", "CVE-2022-32060", "An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/CVE-2022-32060 https://github.com/bypazs/GrimTheRipper https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea"], ["2022", "CVE-2022-23314", "MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-23085", "A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption.On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.", "https://github.com/NaInSec/CVE-LIST https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-45501", "Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/wifiSSIDset.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md"], ["2022", "CVE-2022-45690", "A stack overflow in the org.json.JSONTokener.nextValue::JSONTokener.java component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.", "No PoCs found on GitHub currently.", "https://github.com/stleary/JSON-java/issues/654"], ["2022", "CVE-2022-4512", "The Better Font Awesome WordPress plugin before 2.0.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6"], ["2022", "CVE-2022-4683", "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef"], ["2022", "CVE-2022-25618", "Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in wpDataTables (WordPress plugin) versions <= 2.1.27", "https://github.com/ARPSyndicate/cvemon https://github.com/daffainfo/CVE", "No PoCs from references."], ["2022", "CVE-2022-36469", "H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetAPWifiorLedInfoById.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md"], ["2022", "CVE-2022-25758", "All versions of package scss-tokenizer are vulnerable to Regular Expression Denial of Service (ReDoS) via the loadAnnotation() function, due to the usage of insecure regex.", "https://github.com/seal-community/patches", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782 https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884"], ["2022", "CVE-2022-21351", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28423", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&action=delete.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-42221", "Netgear R6220 v1.1.0.114_1.0.1 suffers from Incorrect Access Control, resulting in a command injection vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/Cj775995/CVE_Report/tree/main/Netgear/R6220"], ["2022", "CVE-2022-24434", "This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes.", "https://github.com/sebcoles/waf_rule_testing_example", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865 https://snyk.io/vuln/SNYK-JS-DICER-2311764"], ["2022", "CVE-2022-26531", "Multiple improper input validation flaws were identified in some CLI commands of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to cause a buffer overflow or a system crash via a crafted payload.", "https://github.com/0xdea/advisories https://github.com/0xdea/exploits https://github.com/ARPSyndicate/cvemon https://github.com/hnsecurity/vulns", "http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html"], ["2022", "CVE-2022-1337", "The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-22138", "All versions of package fast-string-search are vulnerable to Denial of Service (DoS) when computations are incorrect for non-string inputs. One can cause the V8 to attempt reading from non-permitted locations and cause a segmentation fault due to the violation.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367"], ["2022", "CVE-2022-3232", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.5.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c"], ["2022", "CVE-2022-42330", "Guests can cause Xenstore crash via soft reset When a guest issues a \"Soft Reset\" (e.g. for performing a kexec) the libxl based Xen toolstack will normally perform a XS_RELEASE Xenstore operation. Due to a bug in xenstored this can result in a crash of xenstored. Any other use of XS_RELEASE will have the same impact.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26420", "An OS command injection vulnerability exists in the console infactory_port functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499"], ["2022", "CVE-2022-40235", "\"IBM InfoSphere Information Server 11.7 could allow a user to cause a denial of service by removing the ability to run jobs due to improper input validation. IBM X-Force ID: 235725.\"", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22029", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/fortra/CVE-2022-30136 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mchoudhary15/CVE-2022-22029-NFS-Server- https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3323", "An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-32"], ["2022", "CVE-2022-4543", "A flaw named \"EntryBleed\" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ha0-Y/LinuxKernelExploits https://github.com/Ha0-Y/kernel-exploit-cve https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation https://github.com/bcoles/kasld https://github.com/i386x/pubdocs https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/murchie85/twitterCyberMonitor https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/sunichi/cve-2022-4543-wrapper https://github.com/xairy/linux-kernel-exploitation", "https://www.willsroot.io/2022/12/entrybleed.html"], ["2022", "CVE-2022-35952", "TensorFlow is an open source platform for machine learning. The `UnbatchGradOp` function takes an argument `id` that is assumed to be a scalar. A nonscalar `id` can trigger a `CHECK` failure and crash the program. It also requires its argument `batch_index` to contain three times the number of elements as indicated in its `batch_index.dim_size(0)`. An incorrect `batch_index` can trigger a `CHECK` failure and crash the program. We have patched the issue in GitHub commit 5f945fc6409a3c1e90d6970c9292f805f6e6ddf2. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-32031", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function fromSetRouteStatic.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic"], ["2022", "CVE-2022-23345", "BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control.", "No PoCs found on GitHub currently.", "https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345"], ["2022", "CVE-2022-21300", "Vulnerability in the PeopleSoft Enterprise CS SA Integration Pack product of Oracle PeopleSoft (component: Snapshot Integration). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise CS SA Integration Pack. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS SA Integration Pack accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32171", "In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user\u2019s credentials.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32171"], ["2022", "CVE-2022-45781", "Buffer Overflow vulnerability in Tenda AX1803 v1.0.0.1_2994 and earlier allows attackers to run arbitrary code via /goform/SetOnlineDevName.", "No PoCs found on GitHub currently.", "https://www.cnblogs.com/FALL3N/p/16813932.html"], ["2022", "CVE-2022-4403", "A vulnerability classified as critical was found in SourceCodester Canteen Management System. This vulnerability affects unknown code of the file ajax_represent.php. The manipulation of the argument customer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215272.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.215272"], ["2022", "CVE-2022-4792", "The News & Blog Designer Pack WordPress plugin before 3.3 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da"], ["2022", "CVE-2022-25498", "CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.", "No PoCs found on GitHub currently.", "https://github.com/CuppaCMS/CuppaCMS/issues/29"], ["2022", "CVE-2022-41019", "Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn l2tp advanced name WORD dns (yes|no) mtu <128-16384> mru <128-16384> auth (on|off) password (WORD|null)' command template.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613"], ["2022", "CVE-2022-39805", "Due to lack of proper memory management, when a victim opens a manipulated Computer Graphics Metafile (.cgm, CgmTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-21122", "The package metacalc before 0.0.2 are vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-METACALC-2826197"], ["2022", "CVE-2022-0228", "The Popup Builder WordPress plugin before 4.0.7 does not validate and properly escape the orderby and order parameters before using them in a SQL statement in the admin dashboard, which could allow high privilege users to perform SQL injection", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9"], ["2022", "CVE-2022-32353", "Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/manage_field_order.php?id=.", "No PoCs found on GitHub currently.", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-1.md"], ["2022", "CVE-2022-4621", "Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are vulnerable to CSRFs that can be exploited to allow an attacker to perform changes with administrator level privileges.", "No PoCs found on GitHub currently.", "https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04"], ["2022", "CVE-2022-3041", "Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24647", "Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.", "No PoCs found on GitHub currently.", "https://github.com/CuppaCMS/CuppaCMS/issues/23"], ["2022", "CVE-2022-35533", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-hidden-parameters-command-injection-in-qoscgi"], ["2022", "CVE-2022-37436", "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/karimhabush/cyberowl https://github.com/kasem545/vulnsearch https://github.com/xonoxitron/cpe2cve", "No PoCs from references."], ["2022", "CVE-2022-24707", "Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker prior to 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible to craft POST requests with malicious SQL for Time Tracker database. This issue has been resolved in in version 1.20.0.5642. Users unable to upgrade are advised to add their own checks to input.", "https://github.com/ARPSyndicate/cvemon https://github.com/Altelus1/CVE-2022-24707 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/indevi0us/indevi0us https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html"], ["2022", "CVE-2022-42283", "NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can cause a buffer overflow and cause a denial of service or gain code execution.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-1395", "The Easy FAQ with Expanding Text WordPress plugin through 3.2.8.3.1 does not sanitise and escape its settings, allowing high privilege users to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80"], ["2022", "CVE-2022-3290", "Improper Handling of Length Parameter Inconsistency in GitHub repository ikus060/rdiffweb prior to 2.4.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5"], ["2022", "CVE-2022-4761", "The Post Views Count WordPress plugin through 3.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb"], ["2022", "CVE-2022-30316", "Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0054, there is a Honeywell Experion PKS Safety Manager unauthenticated firmware update issue. The affected components are characterized as: Firmware update functionality. The potential impact is: Firmware manipulation. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 communication FTA serial interface and Enea POLO bootloader for firmware management purposes. An engineering workstation running the Safety Builder software communicates via serial or serial-over-ethernet link with the DCOM-232/485 interface. Firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. Firmware images are unsigned. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize hardcoded credentials (see FSCT-2022-0052) for the POLO bootloader to control the boot process and push malicious firmware images to the controller allowing for firmware manipulation, remote code execution and denial of service impacts. A mitigating factor is that in order for a firmware update to be initiated, the Safety Manager has to be rebooted which is typically done by means of physical controls on the Safety Manager itself. As such, an attacker would have to either lay dormant until a legitimate reboot occurs or possibly attempt to force a reboot through a secondary vulnerability.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-0368", "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/43 https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9"], ["2022", "CVE-2022-28710", "An information disclosure vulnerability exists in the chunkFile functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550"], ["2022", "CVE-2022-48518", "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-4670", "The PDF.js Viewer WordPress plugin before 2.1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548"], ["2022", "CVE-2022-0279", "The AnyComment WordPress plugin before 0.2.18 is affected by a race condition when liking/disliking a comment/reply, which could allow any authenticated user to quickly raise their rating or lower the rating of other users", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865"], ["2022", "CVE-2022-28601", "A Two-Factor Authentication (2FA) bypass vulnerability in \"Simple 2FA Plugin for Moodle\" by LMS Doctor allows remote attackers to overwrite the phone number used for confirmation via the profile.php file. Therefore, allowing them to bypass the phone verification mechanism.", "https://github.com/ARPSyndicate/cvemon https://github.com/FlaviuPopescu/CVE-2022-28601 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/FlaviuPopescu/CVE-2022-28601"], ["2022", "CVE-2022-28590", "A Remote Code Execution (RCE) vulnerability exists in Pixelimity 1.0 via admin/admin-ajax.php?action=install_theme.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/jcarabantes/CVE-2022-28590 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/CVE-2022-28590 https://github.com/trhacknon/Pocingit https://github.com/tuando243/tuando243 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-45663", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md"], ["2022", "CVE-2022-24587", "A stored cross-site scripting (XSS) vulnerability in the component core/admin/medias.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE", "No PoCs from references."], ["2022", "CVE-2022-42003", "In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.", "https://github.com/ARPSyndicate/cvemon https://github.com/CycloneDX/sbom-utility https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/aws/aws-msk-iam-auth https://github.com/fernandoreb/dependency-check-springboot https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/jeremybrooks/jinx https://github.com/mosaic-hgw/WildFly https://github.com/scordero1234/java_sec_demo-main https://github.com/seal-community/patches https://github.com/sr-monika/sprint-rest https://github.com/viesti/timbre-json-appender", "No PoCs from references."], ["2022", "CVE-2022-40106", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the set_local_time function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-40297", "** DISPUTED ** UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password. NOTE: a third party states \"The described attack cannot be executed as demonstrated.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc"], ["2022", "CVE-2022-26482", "An issue was discovered in Poly EagleEye Director II before 2.2.2.1. os.system command injection can be achieved by an admin.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/"], ["2022", "CVE-2022-1115", "A heap-buffer-overflow flaw was found in ImageMagick\u2019s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.", "No PoCs found on GitHub currently.", "https://github.com/ImageMagick/ImageMagick/issues/4974"], ["2022", "CVE-2022-1284", "heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7"], ["2022", "CVE-2022-1055", "A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5"], ["2022", "CVE-2022-4833", "The YourChannel: Everything you want in a YouTube plugin WordPress plugin before 1.2.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c"], ["2022", "CVE-2022-3150", "The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privileged users such as admin", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec"], ["2022", "CVE-2022-24756", "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When Bareos Director >= 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, a failed PAM authentication will leak a small amount of memory. An attacker that is able to use the PAM Console (i.e. by knowing the shared secret or via the WebUI) can flood the Director with failing login attempts which will eventually lead to an out-of-memory condition in which the Director will not work anymore. Bareos Director versions 21.1.0, 20.0.6 and 19.2.12 contain a Bugfix for this problem. Users who are unable to upgrade may disable PAM authentication as a workaround.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/"], ["2022", "CVE-2022-47925", "The validate JSON endpoint of the Secvisogram csaf-validator-service in versions < 0.1.0 processes tests with unexpected names. This insufficient input validation of requests by an unauthenticated remote user might lead to a partial DoS of the service. Only the request of the attacker is affected by this vulnerability.", "No PoCs found on GitHub currently.", "https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json"], ["2022", "CVE-2022-26653", "Zoho ManageEngine Remote Access Plus before 10.1.2137.15 allows guest users to view domain details (such as the username and GUID of an administrator).", "https://github.com/ARPSyndicate/cvemon https://github.com/k0pak4/k0pak4", "https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777"], ["2022", "CVE-2022-26950", "Archer 6.x through 6.9 P2 (6.9.0.2) is affected by an open redirect vulnerability. A remote unprivileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred.", "No PoCs found on GitHub currently.", "https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497"], ["2022", "CVE-2022-0339", "Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/499688c4-6ac4-4047-a868-7922c3eab369"], ["2022", "CVE-2022-32242", "When a user opens manipulated Radiance Picture (.hdr, hdr.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4730", "A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.216744"], ["2022", "CVE-2022-29829", "Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C and Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf"], ["2022", "CVE-2022-34449", "PowerPath Management Appliance with versions 3.3 & 3.2* contains a Hardcoded Cryptographic Keys vulnerability. Authenticated admin users can exploit the issue that leads to view and modifying sensitive information stored in the application.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/000205404"], ["2022", "CVE-2022-21334", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30040", "Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability lies in rootfs_ In / goform / setsystimecfg of / bin / tdhttpd in ubif file system, attackers can access http://ip/goform/SetSysTimeCfg, and by setting the ntpserve parameter, the stack buffer overflow can be caused to achieve the effect of router denial of service.", "https://github.com/ARPSyndicate/cvemon https://github.com/Le1a/CVE-2022-30040 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/Le1a/CVE-2022-30040 https://github.com/Le1a/Tenda-AX1803-Denial-of-service"], ["2022", "CVE-2022-39831", "An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This issue is different from CVE-2018-20230.", "No PoCs found on GitHub currently.", "https://savannah.gnu.org/bugs/?62977"], ["2022", "CVE-2022-3257", "Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-1212", "Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe"], ["2022", "CVE-2022-3317", "Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-28994", "Small HTTP Server version 3.06 suffers from a remote buffer overflow vulnerability via long GET request.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html"], ["2022", "CVE-2022-42095", "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/CVE-2022-42095 https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc"], ["2022", "CVE-2022-35665", "Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 17.012.30249 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21274", "Vulnerability in the Oracle Sourcing product of Oracle E-Business Suite (component: Intelligence, RFx Creation). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Sourcing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Sourcing accessible data as well as unauthorized access to critical data or complete access to all Oracle Sourcing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32394", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/inmates/view_inmate.php:3", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md"], ["2022", "CVE-2022-28506", "There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RGB() in gif2rgb.c:298:45.", "https://github.com/tacetool/TACE", "https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png https://github.com/verf1sh/Poc/blob/master/giflib_poc https://sourceforge.net/p/giflib/bugs/159/"], ["2022", "CVE-2022-4577", "The Easy Testimonials WordPress plugin before 3.9.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6"], ["2022", "CVE-2022-27778", "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.", "https://github.com/fokypoky/places-list", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-26997", "Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the upnp function via the upnp_ttl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-21365", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32114", "** DISPUTED ** An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library \"Create (upload)\" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bypazs/CVE-2022-32114 https://github.com/bypazs/GrimTheRipper https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14 https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33 https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e"], ["2022", "CVE-2022-35877", "Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` configuration parameter, as used within the `testWifiAP` XCMD handler", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581"], ["2022", "CVE-2022-28786", "Improper buffer size check logic in aviextractor library prior to SMR May-2022 Release 1 allows out of bounds read leading to possible temporary denial of service. The patch adds buffer size check logic.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-28417", "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_phase.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-4466", "The WordPress Infinite Scroll WordPress plugin before 5.6.0.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2"], ["2022", "CVE-2022-27669", "An unauthenticated user can use functions of XML Data Archiving Service of SAP NetWeaver Application Server for Java - version 7.50, to which access should be restricted. This may result in an escalation of privileges.", "https://github.com/karimhabush/cyberowl", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1092", "The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61"], ["2022", "CVE-2022-1303", "The Slide Anything WordPress plugin before 2.3.44 does not sanitize and escape sliders' description, which could allow high privilege users such as editor and above to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1"], ["2022", "CVE-2022-20009", "In various functions of the USB gadget subsystem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213172319References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub https://github.com/szymonh/android-gadget https://github.com/szymonh/szymonh", "No PoCs from references."], ["2022", "CVE-2022-3197", "Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24400", "A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-26505", "A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 1.3.1 allows a remote web server to exfiltrate media files.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-37731", "ftcms 2.1 poster.PHP has a XSS vulnerability. The attacker inserts malicious JavaScript code into the web page, causing the user / administrator to trigger malicious code when accessing.", "No PoCs found on GitHub currently.", "https://github.com/whiex/webvue2/blob/gh-pages/ftcmsxss.md"], ["2022", "CVE-2022-26445", "In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420088; Issue ID: GN20220420088.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-40250", "An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: SmmSmbiosElog SHA256: 3a8acb4f9bddccb19ec3b22b22ad97963711550f76b27b606461cd5073a93b59 Module GUID: 8e61fd6b-7a8b-404f-b83f-aa90a47cabdf This issue affects: AMI Aptio 5.x. This issue affects: AMI Aptio 5.x.", "No PoCs found on GitHub currently.", "https://www.binarly.io/advisories/BRLY-2022-016"], ["2022", "CVE-2022-1243", "CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7"], ["2022", "CVE-2022-43039", "GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_meta_restore_items_ref at /isomedia/meta.c.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2281"], ["2022", "CVE-2022-29938", "In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameter payment_id in interface\\billing\\new_payment.php via interface\\billing\\payment_master.inc.php leads to SQL injection.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth_r"], ["2022", "CVE-2022-21225", "Improper neutralization in the Intel(R) Data Center Manager software before version 4.1 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrTuxracer/advisories https://github.com/k0imet/pyfetch", "http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html http://seclists.org/fulldisclosure/2022/Dec/1"], ["2022", "CVE-2022-32054", "Tenda AC10 US_AC10V1.0RTL_V15.03.06.26_multi_TD01 was discovered to contain a remote code execution (RCE) vulnerability via the lanIp parameter.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-23320", "XMPie uStore 12.3.7244.0 allows for administrators to generate reports based on raw SQL queries. Since the application ships with default administrative credentials, an attacker may authenticate into the application and exfiltrate sensitive information from the database.", "No PoCs found on GitHub currently.", "https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/"], ["2022", "CVE-2022-45535", "AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the edit parameter at \\admin\\categories.php. This vulnerability allows attackers to access database information.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/update_categories_sql_injection/update_categories_sql_injection.md https://rdyx0.github.io/2018/09/06/AeroCMS-v0.0.1-SQLi%20update_categories_sql_injection/"], ["2022", "CVE-2022-35416", "H3C SSL VPN through 2022-07-10 allows wnm/login/login.json svpnlang cookie XSS.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/attacker4930/tricky https://github.com/bughunter0xff/recon-scanner https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/r00tali/trickest https://github.com/safe3s/CVE-2022-35416 https://github.com/tehmasta/deliciously_malicious https://github.com/trhacknon/Pocingit https://github.com/trickest/recon-and-vulnerability-scanner-template https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28876", "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aeheur.dll component can crash the scanning engine. The exploit can be triggered remotely by an attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-40072", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, function: setSmartPowerManagement.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7"], ["2022", "CVE-2022-1061", "Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7"], ["2022", "CVE-2022-4807", "Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954"], ["2022", "CVE-2022-4704", "The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_import_templates_kit' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to import preset site configuration templates including images and settings.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37981", "Windows Event Logging Service Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21396", "Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Operations Monitor, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Operations Monitor accessible data as well as unauthorized read access to a subset of Oracle Communications Operations Monitor accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47583", "Terminal character injection in Mintty before 3.6.3 allows code execution via unescaped output to the terminal.", "No PoCs found on GitHub currently.", "https://dgl.cx/2023/09/ansi-terminal-security#mintty"], ["2022", "CVE-2022-39401", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-2208", "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1"], ["2022", "CVE-2022-2199", "The main MiCODUS MV720 GPS tracker web server has a reflected cross-site scripting vulnerability that could allow an attacker to gain control by tricking a user into making a request.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45717", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the usbPartitionName parameter in the formSetUSBPartitionUmount function. This vulnerability is exploited via a crafted GET request.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/By3Y6DRrj"], ["2022", "CVE-2022-35884", "Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `ssid_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585"], ["2022", "CVE-2022-32276", "** DISPUTED ** Grafana 8.4.3 allows unauthenticated access via (for example) a /dashboard/snapshot/*?orgId=0 URI. NOTE: the vendor considers this a UI bug, not a vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/BrotherOfJhonny/grafana https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/kh4sh3i/Grafana-CVE https://github.com/lions2012/Penetration_Testing_POC https://github.com/vin01/bogus-cves https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/BrotherOfJhonny/grafana/blob/main/README.md"], ["2022", "CVE-2022-23102", "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html http://seclists.org/fulldisclosure/2022/Feb/20"], ["2022", "CVE-2022-21147", "An out of bounds read vulnerability exists in the malware scan functionality of ESTsoft Alyac 2.5.7.7. A specially-crafted PE file can trigger this vulnerability to cause denial of service and termination of malware scan. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452"], ["2022", "CVE-2022-45657", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the fromSetIpMacBind function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md"], ["2022", "CVE-2022-23042", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24921", "regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/jonathanscheibel/PyNmap https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-4644", "Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0"], ["2022", "CVE-2022-3024", "The Simple Bitcoin Faucets WordPress plugin through 1.7.0 does not have any authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscribers to call it and add/delete/edit Bonds. Furthermore, due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc"], ["2022", "CVE-2022-26727", "This issue was addressed with improved entitlements. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4. A malicious application may be able to modify protected parts of the file system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1030", "Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system.", "https://github.com/ARPSyndicate/cvemon https://github.com/mrdominguez/parallel-ssh-scp", "No PoCs from references."], ["2022", "CVE-2022-4856", "A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs https://vuldb.com/?id.217021"], ["2022", "CVE-2022-3135", "The SEO Smart Links WordPress plugin through 3.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01"], ["2022", "CVE-2022-42126", "The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17593"], ["2022", "CVE-2022-47940", "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.", "https://github.com/helgerod/ksmb-check", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18"], ["2022", "CVE-2022-40023", "Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.", "https://github.com/doudoudedi/hackEmbedded", "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/"], ["2022", "CVE-2022-2259", "In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4584", "A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.216170"], ["2022", "CVE-2022-4615", "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b"], ["2022", "CVE-2022-21287", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30262", "The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-28664", "A memory corruption vulnerability exists in the httpd unescape functionality of FreshTomato 2022.1. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.The `freshtomato-mips` has a vulnerable URL-decoding feature that can lead to memory corruption.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509"], ["2022", "CVE-2022-35507", "A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3.", "No PoCs found on GitHub currently.", "https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/"], ["2022", "CVE-2022-42066", "Online Examination System version 1.0 suffers from a cross site scripting vulnerability via index.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-27888", "Foundry Issues service versions 2.244.0 to 2.249.0 was found to be logging in a manner that captured sensitive information (session tokens). This issue was fixed in 2.249.1.", "No PoCs found on GitHub currently.", "https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md"], ["2022", "CVE-2022-1170", "In the Noo JobMonster WordPress theme before 4.5.2.9 JobMonster there is a XSS vulnerability as the input for the search form is provided through unsanitized GET requests.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc"], ["2022", "CVE-2022-3075", "Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/karimhabush/cyberowl https://github.com/wh1ant/vulnjs", "No PoCs from references."], ["2022", "CVE-2022-34968", "An issue in the fetch_step function in Percona Server for MySQL v8.0.28-19 allows attackers to cause a Denial of Service (DoS) via a SQL query.", "No PoCs found on GitHub currently.", "https://jira.percona.com/browse/PS-8294"], ["2022", "CVE-2022-3274", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.7.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f"], ["2022", "CVE-2022-29709", "CommuniLink Internet Limited CLink Office v2.0 was discovered to contain multiple SQL injection vulnerabilities via the username and password parameters.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html"], ["2022", "CVE-2022-37603", "A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.", "https://github.com/ARPSyndicate/cvemon https://github.com/TomasiDeveloping/ExpensesTracker https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-35706", "Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42267", "NVIDIA GPU Display Driver for Windows contains a vulnerability where a regular user can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-45895", "Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure).", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-39812", "Italtel NetMatch-S CI 5.2.0-20211008 allows Absolute Path Traversal under NMSCI-WebGui/SaveFileUploader. An unauthenticated user can upload files to an arbitrary path. An attacker can change the uploadDir parameter in a POST request (not possible using the GUI) to an arbitrary directory. Because the application does not check in which directory a file will be uploaded, an attacker can perform a variety of attacks that can result in unauthorized access to the server.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-2118", "The 404s WordPress plugin before 3.5.1 does not sanitise and escape its fields, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c"], ["2022", "CVE-2022-2289", "Use After Free in GitHub repository vim/vim prior to 9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64"], ["2022", "CVE-2022-23183", "Missing authorization vulnerability in Advanced Custom Fields versions prior to 5.12.1 and Advanced Custom Fields Pro versions prior to 5.12.1 allows a remote authenticated attacker to view the information on the database without the access permission.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21317", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47502", "Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.Links can be activated by clicks, or by automatic document events.The execution of such links must be subject to user approval.In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.", "https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/tin-z/Stuff_and_POCs", "https://www.openoffice.org/security/cves/CVE-2022-47502.html"], ["2022", "CVE-2022-4785", "The Video Sidebar Widgets WordPress plugin through 6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99"], ["2022", "CVE-2022-4414", "Cross-site Scripting (XSS) - DOM in GitHub repository nuxt/framework prior to v3.0.0-rc.13.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/131a41e5-c936-4c3f-84fc-e0e1f0e090b5"], ["2022", "CVE-2022-44928", "D-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44928"], ["2022", "CVE-2022-2058", "Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/428"], ["2022", "CVE-2022-28525", "ED01-CMS v20180505 was discovered to contain an arbitrary file upload vulnerability via /admin/users.php?source=edit_user&id=1.", "https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-32026", "Car Rental Management System v1.0 is vulnerable to SQL Injection via /car-rental-management-system/admin/manage_booking.php?id=.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-23352", "An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS).", "No PoCs found on GitHub currently.", "https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352"], ["2022", "CVE-2022-30123", "A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.", "https://github.com/neo9/fluentd", "No PoCs from references."], ["2022", "CVE-2022-37840", "In TOTOLINK A860R V4.1.2cu.5182_B20201027, the main function in downloadfile.cgi has a buffer overflow vulnerability.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md"], ["2022", "CVE-2022-21257", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-40222", "An OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638"], ["2022", "CVE-2022-39952", "A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.", "https://github.com/1f3lse/taiE https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Chocapikk/CVE-2022-39952 https://github.com/GhostTroops/TOP https://github.com/H4lo/awesome-IoT-security-article https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Threekiii/CVE https://github.com/XRSec/AWVS-Update https://github.com/aneasystone/github-trending https://github.com/dkstar11q/CVE-2022-39952-better https://github.com/hackingyseguridad/nmap https://github.com/hktalent/TOP https://github.com/horizon3ai/CVE-2022-39952 https://github.com/karimhabush/cyberowl https://github.com/lions2012/Penetration_Testing_POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/shiyeshu/CVE-2022-39952_webshell https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-3334", "The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9"], ["2022", "CVE-2022-27858", "CSV Injection vulnerability in Activity Log Team Activity Log <= 2.8.3 on WordPress.", "https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-1231", "XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web based projects (like the Confluence plugin, etc. see https://plantuml.com/de/running).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604"], ["2022", "CVE-2022-26526", "Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24423", "Dell iDRAC8 versions prior to 2.83.83.83 contain a denial of service vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to cause resource exhaustion in the webserver, resulting in a denial of service condition.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/iDRAC-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-42236", "A Stored XSS issue in Merchandise Online Store v.1.0 allows to injection of Arbitrary JavaScript in edit account form.", "https://github.com/ARPSyndicate/cvemon https://github.com/draco1725/vloggers", "https://github.com/draco1725/vloggers/blob/main/poc"], ["2022", "CVE-2022-1320", "The Sliderby10Web WordPress plugin before 1.2.52 does not properly sanitize and escape some of its settings, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87"], ["2022", "CVE-2022-4445", "The FL3R FeelBox WordPress plugin through 8.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8"], ["2022", "CVE-2022-28434", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=siteoptions&social=edit&sid=2.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-2149", "The Very Simple Breadcrumb WordPress plugin through 1.0 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13"], ["2022", "CVE-2022-32137", "In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required.", "https://github.com/ARPSyndicate/cvemon https://github.com/ic3sw0rd/Codesys_V2_Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-21346", "Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-2398", "The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672"], ["2022", "CVE-2022-45516", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/NatStaticSetting.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md"], ["2022", "CVE-2022-35914", "/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.", "https://github.com/0day404/vulnerability-poc https://github.com/0xBallpoint/LOAD https://github.com/0xGabe/CVE-2022-35914 https://github.com/20142995/Goby https://github.com/6E6L6F/CVE-2022-35914 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Feals-404/GLPIAnarchy https://github.com/Gabriel-Lima232/CVE-2022-35914 https://github.com/Henry4E36/POCS https://github.com/JD2344/SecGen_Exploits https://github.com/Johnermac/CVE-2022-35914 https://github.com/KayCHENvip/vulnerability-poc https://github.com/Loginsoft-LLC/Linux-Exploit-Detection https://github.com/Loginsoft-Research/Linux-Exploit-Detection https://github.com/Lzer0Kx01/CVE-2022-35914 https://github.com/Miraitowa70/POC-Notes https://github.com/Orange-Cyberdefense/CVE-repository https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/StarCrossPortal/scalpel https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/allendemoura/CVE-2022-35914 https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/cobbbex/RedTeam https://github.com/cosad3s/CVE-2022-35914-poc https://github.com/d4n-sec/d4n-sec.github.io https://github.com/dravenww/curated-article https://github.com/franckferman/GLPI-htmLawed-CVE-2022_35914-PoC https://github.com/hktalent/Scan4all_Pro https://github.com/k0mi-tg/CVE-POC https://github.com/lolminerxmrig/Capricornus https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soapffz/myown-nuclei-poc https://github.com/whoforget/CVE-POC https://github.com/xiaobaiakai/CVE-2022-35914 https://github.com/youcans896768/APIV_Tool https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html"], ["2022", "CVE-2022-23092", "The implementation of lib9p's handling of RWALK messages was missing a bounds check needed when unpacking the message contents. The missing check means that the receipt of a specially crafted message will cause lib9p to overwrite unrelated memory.The bug can be triggered by a malicious bhyve guest kernel to overwrite memory in the bhyve(8) process. This could potentially lead to user-mode code execution on the host, subject to bhyve's Capsicum sandbox.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-23303", "The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skulkarni-mv/hostapd_mirror https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-37811", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the startIp parameter in the function formSetPPTPServer.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17"], ["2022", "CVE-2022-4694", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a4d865c2-1a2b-4e3a-aaae-915b0dfc3f22"], ["2022", "CVE-2022-4505", "Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.2.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92"], ["2022", "CVE-2022-29618", "Due to insufficient input validation, SAP NetWeaver Development Infrastructure (Design Time Repository) - versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to inject script into the URL and execute code in the user\u2019s browser. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-47881", "Foxit PDF Reader and PDF Editor 11.2.1.53537 and earlier has an Out-of-Bounds Read vulnerability.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-24563", "In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options\" via the intro_title and intro_image parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/truonghuuphuc/CVE", "No PoCs from references."], ["2022", "CVE-2022-24842", "MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-23121", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/neutrinoguy/awesome-ics-writeups", "No PoCs from references."], ["2022", "CVE-2022-39422", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.38. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).", "https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-47631", "Razer Synapse through 3.7.1209.121307 allows privilege escalation due to an unsafe installation path and improper privilege management. Attackers can place DLLs into %PROGRAMDATA%\\Razer\\Synapse3\\Service\\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if it detects malicious DLLs in this directory, attackers can exploit a race condition and replace a valid DLL (i.e., a copy of a legitimate Razer DLL) with a malicious DLL after the service has already checked the file. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html http://seclists.org/fulldisclosure/2023/Sep/6 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt"], ["2022", "CVE-2022-26947", "Archer 6.x through 6.9 SP3 (6.9.3.0) contains a reflected XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and gets executed by the web browser in the context of the vulnerable web application.", "No PoCs found on GitHub currently.", "https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497"], ["2022", "CVE-2022-43238", "Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/336"], ["2022", "CVE-2022-33139", "A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (All versions), Desigo CC Compact (All versions), SIMATIC WinCC OA V3.16 (All versions in default configuration), SIMATIC WinCC OA V3.17 (All versions in non-default configuration), SIMATIC WinCC OA V3.18 (All versions in non-default configuration). Affected applications use client-side only authentication, when neither server-side authentication (SSA) nor Kerberos authentication is enabled. In this configuration, attackers could impersonate other users or exploit the client-server protocol without being authenticated.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3147", "Mattermost version 7.0.x and earlier fails to sufficiently limit the in-memory sizes of concurrently uploaded JPEG images, which allows authenticated users to cause resource exhaustion on specific system configurations, resulting in server-side Denial of Service.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-4824", "The WP Blog and Widgets WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0"], ["2022", "CVE-2022-1042", "In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-20348", "In updateState of LocationServicesWifiScanningPreferenceController.java, there is a possible admin restriction bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228315529", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42154", "An arbitrary file upload vulnerability in the component /apiadmin/upload/attach of 74cmsSE v3.13.0 allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "No PoCs from references."], ["2022", "CVE-2022-26495", "In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://lists.debian.org/nbd/2022/01/msg00037.html"], ["2022", "CVE-2022-47872", "A Server-Side Request Forgery (SSRF) in maccms10 v2021.1000.2000 allows attackers to force the application to make arbitrary requests via a crafted payload injected into the Name parameter under the Interface address module.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cedric1314/CVE-2022-47872 https://github.com/Live-Hack-CVE/CVE-2022-47872 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-40111", "In TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 in the shadow.sample file, root is hardcoded in the firmware.", "https://github.com/1759134370/iot", "No PoCs from references."], ["2022", "CVE-2022-45977", "Tenda AX12 V22.03.01.21_CN was found to have a command injection vulnerability via /goform/setMacFilterCfg function.", "No PoCs found on GitHub currently.", "https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3"], ["2022", "CVE-2022-28915", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a command injection vulnerability via the admuser and admpass parameters in /goform/setSysAdm.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/1 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-24590", "A stored cross-site scripting (XSS) vulnerability in the Add Link function of BackdropCMS v1.21.1 allows attackers to execute arbitrary web scripts or HTML.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE", "No PoCs from references."], ["2022", "CVE-2022-4964", "Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set.", "No PoCs found on GitHub currently.", "https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/"], ["2022", "CVE-2022-4667", "The RSS Aggregator by Feedzy WordPress plugin before 4.1.1 does not validate and escape some of its block options before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d"], ["2022", "CVE-2022-34619", "A stored cross-site scripting (XSS) vulnerability in Mealie v0.5.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Shopping Lists item names text field.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/"], ["2022", "CVE-2022-23061", "In Shopizer versions 2.0 to 2.17.0 a regular admin can permanently delete a superadmin (although this cannot happen according to the documentation) via Insecure Direct Object Reference (IDOR) vulnerability.", "https://github.com/karimhabush/cyberowl", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23061"], ["2022", "CVE-2022-45674", "Tenda AC6V1.0 V15.03.05.19 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot.", "https://github.com/ARPSyndicate/cvemon https://github.com/iceyjchen/VulnerabilityProjectRecords", "https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md"], ["2022", "CVE-2022-21164", "The package node-lmdb before 0.9.7 are vulnerable to Denial of Service (DoS) when defining a non-invokable ToString value, which will cause a crash during type check.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723"], ["2022", "CVE-2022-4776", "The CC Child Pages WordPress plugin before 1.43 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a"], ["2022", "CVE-2022-34708", "Windows Kernel Information Disclosure Vulnerability", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html"], ["2022", "CVE-2022-32195", "Open edX platform before 2022-06-06 allows XSS via the \"next\" parameter in the logout URL.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-47660", "GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2357"], ["2022", "CVE-2022-26916", "Windows Fax Compose Form Remote Code Execution Vulnerability", "https://github.com/VulnerabilityResearchCentre/patch-diffing-in-the-dark", "No PoCs from references."], ["2022", "CVE-2022-24481", "Windows Common Log File System Driver Elevation of Privilege Vulnerability", "https://github.com/ReAbout/web-sec https://github.com/fr4nkxixi/CVE-2022-24481-POC https://github.com/izj007/wechat https://github.com/nomi-sec/PoC-in-GitHub https://github.com/robotMD5/CVE-2022-24481-POC https://github.com/whoami13apt/files2", "No PoCs from references."], ["2022", "CVE-2022-3287", "When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.", "https://github.com/chnzzh/Redfish-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-1382", "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1"], ["2022", "CVE-2022-1013", "The Personal Dictionary WordPress plugin before 1.3.4 fails to properly sanitize user supplied POST data before it is being interpolated in an SQL statement and then executed, leading to a blind SQL injection vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d"], ["2022", "CVE-2022-33028", "LibreDWG v0.12.4.4608 was discovered to contain a heap buffer overflow via the function dwg_add_object at decode.c.", "No PoCs found on GitHub currently.", "https://github.com/LibreDWG/libredwg/issues/489"], ["2022", "CVE-2022-1153", "The LayerSlider WordPress plugin before 7.1.2 does not sanitise and escape Project's slug before outputting it back in various place, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4"], ["2022", "CVE-2022-26755", "This issue was addressed with improved environment sanitization. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to break out of its sandbox.", "https://github.com/0x3c3e/pocs", "No PoCs from references."], ["2022", "CVE-2022-40140", "An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/BC-SECURITY/Moriarty https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ZephrFish/NotProxyShellScanner https://github.com/cipher387/awesome-ip-search-engines https://github.com/ipsBruno/CVE-2022-40140-SCANNER https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mr-r3b00t/NotProxyShellHunter https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28944", "Certain EMCO Software products are affected by: CWE-494: Download of Code Without Integrity Check. This affects MSI Package Builder for Windows 9.1.4 and Remote Installer for Windows 6.0.13 and Ping Monitor for Windows 8.0.18 and Remote Shutdown for Windows 7.2.2 and WakeOnLan 2.0.8 and Network Inventory for Windows 5.8.22 and Network Software Scanner for Windows 2.0.8 and UnLock IT for Windows 6.1.1. The impact is: execute arbitrary code (remote). The component is: Updater. The attack vector is: To exploit this vulnerability, a user must trigger an update of an affected installation of EMCO Software. \u00b6\u00b6 Multiple products from EMCO Software are affected by a remote code execution vulnerability during the update process.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/gerr-re/cve-2022-28944 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/gerr-re/cve-2022-28944/blob/main/cve-2022-28944_public-advisory.pdf"], ["2022", "CVE-2022-42045", "Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.", "https://github.com/ARPSyndicate/cvemon https://github.com/ReCryptLLC/CVE-2022-42045 https://github.com/gmh5225/awesome-game-security https://github.com/hfiref0x/KDU https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanaroam/kaditaroam https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/ReCryptLLC/CVE-2022-42045/tree/main"], ["2022", "CVE-2022-45926", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint notify.localizeEmailTemplate allows a low-privilege user to evaluate webreports.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html http://seclists.org/fulldisclosure/2023/Jan/14 https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/"], ["2022", "CVE-2022-35524", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi"], ["2022", "CVE-2022-30241", "The jquery.json-viewer library through 1.4.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.", "https://github.com/trailofbits/publications", "No PoCs from references."], ["2022", "CVE-2022-4636", "Black Box KVM Firmware version 3.4.31307 on models ACR1000A-R-R2, ACR1000A-T-R2, ACR1002A-T, ACR1002A-R, and ACR1020A-T is vulnerable to path traversal, which may allow an attacker to steal user credentials and other sensitive information through local file inclusion.", "No PoCs found on GitHub currently.", "https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01"], ["2022", "CVE-2022-34648", "Authenticated (author+) Stored Cross-Site Scripting (XSS) vulnerability in dmitrylitvinov Uploading SVG, WEBP and ICO files plugin <= 1.0.1 at WordPress.", "https://github.com/Universe1122/Universe1122", "No PoCs from references."], ["2022", "CVE-2022-48659", "In the Linux kernel, the following vulnerability has been resolved:mm/slub: fix to return errno if kmalloc() failsIn create_unique_id(), kmalloc(, GFP_KERNEL) can fail due toout-of-memory, if it fails, return errno correctly rather thantriggering panic via BUG_ON();kernel BUG at mm/slub.c:5893!Internal error: Oops - BUG: 0 [#1] PREEMPT SMPCall trace: sysfs_slab_add+0x258/0x260 mm/slub.c:5973 __kmem_cache_create+0x60/0x118 mm/slub.c:4899 create_cache mm/slab_common.c:229 [inline] kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335 kmem_cache_create+0x1c/0x28 mm/slab_common.c:390 f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline] f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808 f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149 mount_bdev+0x1b8/0x210 fs/super.c:1400 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512 legacy_get_tree+0x30/0x74 fs/fs_context.c:610 vfs_get_tree+0x40/0x140 fs/super.c:1530 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040 path_mount+0x358/0x914 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-45522", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeClientFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md"], ["2022", "CVE-2022-32043", "Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formSetAccessCodeInfo.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo"], ["2022", "CVE-2022-23337", "DedeCMS v5.7.87 was discovered to contain a SQL injection vulnerability in article_coonepage_rule.php via the ids parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/W01fh4cker/Serein", "No PoCs from references."], ["2022", "CVE-2022-35623", "In Nordic nRF5 SDK for Mesh 5.0, a heap overflow vulnerability can be triggered by sending a series of segmented control packets and access packets with the same SeqAuth", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-38789", "An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.", "https://github.com/ARPSyndicate/cvemon https://github.com/Live-Hack-CVE/CVE-2022-38789 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/ProxyStaffy/Airties-CVE-2022-38789 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-3211", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.6.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7"], ["2022", "CVE-2022-25878", "The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi https://github.com/dellalibera/dellalibera https://github.com/seal-community/patches", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507 https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248"], ["2022", "CVE-2022-1085", "A vulnerability was found in CLTPHP up to 6.0. It has been declared as problematic. Affected by this vulnerability is the POST Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.194857"], ["2022", "CVE-2022-40307", "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", "https://github.com/ARPSyndicate/cvemon https://github.com/SettRaziel/bsi_cert_bot", "No PoCs from references."], ["2022", "CVE-2022-24786", "PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.", "https://github.com/Icyrockton/MegaVul", "No PoCs from references."], ["2022", "CVE-2022-23277", "Microsoft Exchange Server Remote Code Execution Vulnerability", "https://github.com/7BitsTeam/CVE-2022-23277 https://github.com/ARPSyndicate/cvemon https://github.com/FDlucifer/Proxy-Attackchain https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet https://github.com/hktalent/bug-bounty https://github.com/hktalent/ysoserial.net https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/puckiestyle/ysoserial.net https://github.com/pwntester/ysoserial.net https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html"], ["2022", "CVE-2022-26980", "Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO.", "https://github.com/ARPSyndicate/cvemon https://github.com/RNPG/CVEs", "https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca"], ["2022", "CVE-2022-21372", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4471", "The YARPP WordPress plugin before 5.30.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b"], ["2022", "CVE-2022-28680", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16821.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-23366", "HMS v1.0 was discovered to contain a SQL injection vulnerability via patientlogin.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/cr0ss2018/cr0ss2018 https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/ezelnur6327/ezelnur6327 https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits https://github.com/superlink996/chunqiuyunjingbachang", "http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366"], ["2022", "CVE-2022-30286", "pyscriptjs (aka PyScript Demonstrator) in PyScript through 2022-05-04 allows a remote user to read Python source code.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html https://cyber-guy.gitbook.io/cyber-guy/pocs/pyscript-file-read https://www.exploit-db.com/exploits/50918"], ["2022", "CVE-2022-21263", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Fault Management Architecture). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data as well as unauthorized read access to a subset of Oracle Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0169", "The Photo Gallery by 10Web WordPress plugin before 1.6.0 does not validate and escape the bwg_tag_id_bwg_thumbnails_0 parameter before using it in a SQL statement via the bwg_frontend_data AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c"], ["2022", "CVE-2022-48599", "A SQL injection vulnerability exists in the \u201creporter events type\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48599/"], ["2022", "CVE-2022-3300", "The Form Maker by 10Web WordPress plugin before 1.15.6 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9"], ["2022", "CVE-2022-38698", "In messaging service, there is a missing permission check. This could lead to elevation of privilege in contacts service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-1194", "The Mobile Events Manager WordPress plugin before 1.4.8 does not properly escape the Enquiry source field when exporting events, or the Paid for field when exporting transactions as CSV, leading to a CSV injection vulnerability.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594"], ["2022", "CVE-2022-1345", "Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/781b5c2a-bc98-41a0-a276-ea12399e5a25"], ["2022", "CVE-2022-21323", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26761", "A memory corruption issue was addressed with improved memory handling. This issue is fixed in Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-37415", "The Uniwill SparkIO.sys driver 1.0 is vulnerable to a stack-based buffer overflow via IOCTL 0x40002008.", "No PoCs found on GitHub currently.", "https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0"], ["2022", "CVE-2022-28970", "Tenda AX1806 v1.0.0.1 was discovered to contain a heap overflow via the mac parameter in the function GetParentControlInfo. This vulnerability allows attackers to cause a Denial of Service (DoS).", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md"], ["2022", "CVE-2022-42071", "Online Birth Certificate Management System version 1.0 suffers from a Cross Site Scripting (XSS) Vulnerability.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-4901", "Multiple stored XSS vulnerabilities in Sophos Connect versions older than 2.2.90 allow Javascript code to run in the local UI via a malicious VPN configuration that must be manually loaded by the victim.", "https://github.com/scopas1293/SophosConnectUpgradeScript", "No PoCs from references."], ["2022", "CVE-2022-3062", "The Simple File List WordPress plugin before 4.4.12 does not escape parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a"], ["2022", "CVE-2022-46478", "The RPC interface in datax-web v1.0.0 and v2.0.0 to v2.1.2 contains no permission checks by default which allows attackers to execute arbitrary commands via crafted Hessian serialized data.", "https://github.com/ARPSyndicate/cvemon https://github.com/aboutbo/aboutbo", "https://github.com/WeiYe-Jing/datax-web/issues/587"], ["2022", "CVE-2022-1167", "There are unauthenticated reflected Cross-Site Scripting (XSS) vulnerabilities in CareerUp Careerup WordPress theme before 2.3.1, via the filter parameters.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170"], ["2022", "CVE-2022-36779", "PROSCEND - PROSCEND / ADVICE .Ltd - G/5G Industrial Cellular Router (with GPS)4 Unauthenticated OS Command Injection Proscend M330-w / M33-W5 / M350-5G / M350-W5G / M350-6 / M350-W6 / M301-G / M301-GW ADVICE ICR 111WG / https://www.proscend.com/en/category/industrial-Cellular-Router/industrial-Cellular-Router.html https://cdn.shopify.com/s/files/1/0036/9413/3297/files/ADVICE_Industrial_4G_LTE_Cellular_Router_ICR111WG.pdf?v=1620814301", "https://github.com/rootDR/CVE-2022-36779", "No PoCs from references."], ["2022", "CVE-2022-41189", "Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41218", "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "https://github.com/ARPSyndicate/cvemon https://github.com/SYRTI/POC_to_review https://github.com/Tobey123/CVE-2022-41218 https://github.com/V4bel/CVE-2022-41218 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://www.openwall.com/lists/oss-security/2022/09/23/4 http://www.openwall.com/lists/oss-security/2022/09/24/1"], ["2022", "CVE-2022-4602", "A vulnerability was found in Shoplazza LifeStyle 1.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/api/theme-edit/ of the component Review Flow Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216197 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Dec/11"], ["2022", "CVE-2022-23004", "When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities"], ["2022", "CVE-2022-28673", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16641.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-47714", "Last Yard 22.09.8-1 does not enforce HSTS headers", "https://github.com/l00neyhacker/CVE-2022-47714", "No PoCs from references."], ["2022", "CVE-2022-21290", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30275", "The Motorola MOSCAD Toolbox software through 2022-05-02 relies on a cleartext password. It utilizes an MDLC driver to communicate with MOSCAD/ACE RTUs for engineering purposes. Access to these communications is protected by a password stored in cleartext in the wmdlcdrv.ini driver configuration file. In addition, this password is used for access control to MOSCAD/STS projects protected with the Legacy Password feature. In this case, an insecure CRC of the password is present in the project file: this CRC is validated against the password in the driver configuration file.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-32230", "Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.", "https://github.com/ARPSyndicate/cvemon https://github.com/jercle/azgo https://github.com/phrara/FGV50", "https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/"], ["2022", "CVE-2022-28733", "Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/ozun215/shim-review https://github.com/puzzleos/uefi-shim_review https://github.com/rhboot/shim-review https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-47654", "GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2350"], ["2022", "CVE-2022-30335", "Bonanza Wealth Management System (BWM) 7.3.2 allows SQL injection via the login form. Users who supply the application with a SQL injection payload in the User Name textbox could collect all passwords in encrypted format from the Microsoft SQL Server component.", "No PoCs found on GitHub currently.", "https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008"], ["2022", "CVE-2022-36639", "A stored cross-site scripting (XSS) vulnerability in /client.php of Garage Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.", "No PoCs found on GitHub currently.", "https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/"], ["2022", "CVE-2022-41358", "A stored cross-site scripting (XSS) vulnerability in Garage Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the categoriesName parameter in createCategories.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/thecasual/CVE-2022-41358 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html https://cxsecurity.com/issue/WLB-2022100037 https://github.com/thecasual/CVE-2022-41358 https://vulmon.com/vulnerabilitydetails?qid=CVE-2022-41358"], ["2022", "CVE-2022-38828", "TOTOLINK T6 V4.1.5cu.709_B20210518 is vulnerable to command injection via cstecgi.cgi", "https://github.com/ARPSyndicate/cvemon https://github.com/whiter6666/CVE", "https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md"], ["2022", "CVE-2022-25448", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the day parameter in the openSchedWifi function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/2"], ["2022", "CVE-2022-3122", "A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file medicine_details.php. The manipulation of the argument medicine leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207854 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md https://vuldb.com/?id.207854"], ["2022", "CVE-2022-4841", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/fa46b3ef-c621-443a-be3a-0a83fb78ba62"], ["2022", "CVE-2022-1027", "The Page Restriction WordPress (WP) WordPress plugin before 1.2.7 allows bad actors with administrator privileges to the settings page to inject Javascript code to its settings leading to stored Cross-Site Scripting that will only affect administrator users.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3"], ["2022", "CVE-2022-46538", "Tenda F1203 V2.0.1.6 was discovered to contain a command injection vulnerability via the mac parameter at /goform/WriteFacMac.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md"], ["2022", "CVE-2022-42131", "Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17377"], ["2022", "CVE-2022-24724", "cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html"], ["2022", "CVE-2022-3033", "If a Thunderbird user replied to a crafted HTML email containing a meta tag, with the meta tag having the http-equiv=\"refresh\" attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26730", "A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/xsscx/Commodity-Injection-Signatures https://github.com/xsscx/DemoIccMAX https://github.com/xsscx/macos-research https://github.com/xsscx/windows", "No PoCs from references."], ["2022", "CVE-2022-28921", "A Cross-Site Request Forgery (CSRF) vulnerability discovered in BlogEngine.Net v3.3.8.0 allows unauthenticated attackers to read arbitrary files on the hosting web server.", "No PoCs found on GitHub currently.", "https://www.0xlanks.me/blog/cve-2022-28921-advisory/"], ["2022", "CVE-2022-23055", "In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23055"], ["2022", "CVE-2022-45640", "Tenda Tenda AC6V1.0 V15.03.05.19 is affected by buffer overflow. Causes a denial of service (local).", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md https://vulncheck.com/blog/xiongmai-iot-exploitation"], ["2022", "CVE-2022-47745", "ZenTao 16.4 to 18.0.beta1 is vulnerable to SQL injection. After logging in with any user, you can complete SQL injection by constructing a special request and sending it to function importNotice.", "https://github.com/ARPSyndicate/cvemon https://github.com/l3s10n/ZenTaoPMS_SqlInjection", "No PoCs from references."], ["2022", "CVE-2022-26833", "An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerability.", "https://github.com/ARPSyndicate/cvemon", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513"], ["2022", "CVE-2022-4653", "The Greenshift WordPress plugin before 4.8.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578"], ["2022", "CVE-2022-36668", "Garage Management System 1.0 is vulnerable to Stored Cross Site Scripting (XSS) on several parameters. The vulnerabilities exist during creating or editing the parts under parameters. Using the XSS payload, the Stored XSS triggered and can be used for further attack vector.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md"], ["2022", "CVE-2022-4482", "The Carousel, Slider, Gallery by WP Carousel WordPress plugin before 2.5.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a"], ["2022", "CVE-2022-23284", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/clearbluejar/cve-markdown-charts", "No PoCs from references."], ["2022", "CVE-2022-21381", "Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: WebUI). Supported versions that are affected are 8.4 and 9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Session Border Controller. While the vulnerability is in Oracle Enterprise Session Border Controller, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Session Border Controller accessible data as well as unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-42160", "D-Link COVR 1200,1202,1203 v1.08 was discovered to contain a command injection vulnerability via the system_time_timezone parameter at function SetNTPServerSettings.", "No PoCs found on GitHub currently.", "https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-35401", "An authentication bypass vulnerability exists in the get_IFTTTTtoken.cgi functionality of Asus RT-AX82U 3.0.0.4.386_49674-ge182230. A specially-crafted HTTP request can lead to full administrative access to the device. An attacker would need to send a series of HTTP requests to exploit this vulnerability.", "https://github.com/karimhabush/cyberowl", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586"], ["2022", "CVE-2022-24775", "guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.", "https://github.com/carbonetes/jacked-jenkins", "No PoCs from references."], ["2022", "CVE-2022-4810", "Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e"], ["2022", "CVE-2022-3173", "Improper Authentication in GitHub repository snipe/snipe-it prior to 6.0.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6d8ffcc6-c6e3-4385-8ead-bdbbbacf79e9"], ["2022", "CVE-2022-46569", "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the Key parameter in the SetWLanRadioSecurity module.", "No PoCs found on GitHub currently.", "https://hackmd.io/@0dayResearch/SetWLanRadioSecurity https://hackmd.io/@0dayResearch/r1R6sWRUs https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-2883", "In affected versions of Octopus Deploy it is possible to upload a zipbomb file as a task which results in Denial of Service", "https://github.com/AduraK2/Shiro_Weblogic_Tool", "No PoCs from references."], ["2022", "CVE-2022-0986", "Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/57635c78-303f-412f-b75a-623df9fa9edd"], ["2022", "CVE-2022-31597", "Within SAP S/4HANA - versions S4CORE 101, 102, 103, 104, 105, 106, SAPSCORE 127, the application business partner extension for Spain/Slovakia does not perform necessary authorization checks for a low privileged authenticated user over the network, resulting in escalation of privileges leading to low impact on confidentiality and integrity of the data.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-31606", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43890", "IBM Security Verify Privilege On-Premises 11.5 could disclose sensitive information through an HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 240453.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-44262", "ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE).", "https://github.com/Whoopsunix/whoopsunix.github.io", "https://github.com/ff4j/ff4j/issues/624"], ["2022", "CVE-2022-27083", "Tenda M3 1.10 V1.0.0.12(4856) was discovered to contain a command injection vulnerability via the component /cgi-bin/uploadAccessCodePic.", "No PoCs found on GitHub currently.", "https://github.com/GD008/vuln/blob/main/tenda_M3_uploadAccessCodePic/M3_uploadAccessCodePic.md"], ["2022", "CVE-2022-41696", "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0514", "Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/af08000d-9f4a-4743-865d-5d5cdaf7fb27"], ["2022", "CVE-2022-0685", "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782"], ["2022", "CVE-2022-39189", "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17"], ["2022", "CVE-2022-2411", "The Auto More Tag WordPress plugin through 4.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon https://github.com/ExpLangcn/FuYao-Go", "https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294"], ["2022", "CVE-2022-0454", "Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2551", "The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551 https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0"], ["2022", "CVE-2022-48335", "Widevine Trusted Application (TA) 5.0.0 through 7.1.1 has a PRDiagVerifyProvisioning integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/"], ["2022", "CVE-2022-31845", "A vulnerability in live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md"], ["2022", "CVE-2022-36126", "An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x before 8.1.17. The ScriptInvoke function allows remote attackers to execute arbitrary code by supplying a Python script.", "https://github.com/ARPSyndicate/cvemon https://github.com/sourceincite/randy", "https://github.com/sourceincite/randy https://srcincite.io/advisories/src-2022-0014/"], ["2022", "CVE-2022-20432", "There is an missing authorization issue in the system service. Since the component does not have permission check and permission protection,, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221899", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22537", "When a user opens a manipulated Tagged Image File Format (.tiff, 2d.x3d)) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29340", "GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2163"], ["2022", "CVE-2022-1629", "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee"], ["2022", "CVE-2022-31657", "VMware Workspace ONE Access and Identity Manager contain a URL injection vulnerability. A malicious actor with network access may be able to redirect an authenticated user to an arbitrary domain.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-39249", "Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-48364", "The undo_mark_statuses_as_sensitive method in app/services/approve_appeal_service.rb in Mastodon 3.5.x before 3.5.3 does not use the server's representative account, resulting in moderator identity disclosure when a moderator approves the appeal of a user whose status update was marked as sensitive.", "https://github.com/40826d/advisories https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-25306", "The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the browser parameter found in the ~/includes/class-wp-statistics-visitor.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88"], ["2022", "CVE-2022-31814", "pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Chocapikk/CVE-2022-31814 https://github.com/EvergreenCartoons/SenselessViolence https://github.com/Knownasjohnn/RCE https://github.com/Madliife0/CVE-2022-31814 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/TheUnknownSoul/CVE-2022-31814 https://github.com/WhooAmii/POC_to_review https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 https://github.com/dkstar11q/CVE-2022-31814 https://github.com/drcayber/RCE https://github.com/h00die-gr3y/Metasploit https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/"], ["2022", "CVE-2022-27192", "The Reporting module in Aseco Lietuva document management system DVS Avilys before 3.5.58 allows unauthorized file download. An unauthenticated attacker can impersonate an administrator by reading administrative files.", "No PoCs found on GitHub currently.", "https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md"], ["2022", "CVE-2022-40879", "kkFileView v4.1.0 is vulnerable to Cross Site Scripting (XSS) via the parameter 'errorMsg.'", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://github.com/kekingcn/kkFileView/issues/389"], ["2022", "CVE-2022-0405", "Improper Access Control in GitHub repository janeczku/calibre-web prior to 0.6.16.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/370538f6-5312-4c15-9fc0-b4c36ac236fe"], ["2022", "CVE-2022-2691", "A vulnerability, which was classified as problematic, has been found in SourceCodester Wedding Hall Booking System. Affected by this issue is some unknown functionality of the file /whbs/?page=manage_account of the component Profile Page. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-205814 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205814"], ["2022", "CVE-2022-39098", "In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2992", "A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/FrameVul https://github.com/CsEnox/CVE-2022-2992 https://github.com/Malwareman007/CVE-2022-2992 https://github.com/NinVoido/nto2024-p7d-writeups https://github.com/SYRTI/POC_to_review https://github.com/SnailDev/github-hot-hub https://github.com/WhooAmii/POC_to_review https://github.com/aneasystone/github-trending https://github.com/hktalent/bug-bounty https://github.com/k0mi-tg/CVE-POC https://github.com/lonnyzhang423/github-hot-hub https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/redwaysecurity/CVEs https://github.com/regret1537/Cs-cev https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html"], ["2022", "CVE-2022-23909", "There is an unquoted service path in Sherpa Connector Service (SherpaConnectorService.exe) 2020.2.20328.2050. This might allow a local user to escalate privileges by creating a \"C:\\Program Files\\Sherpa Software\\Sherpa.exe\" file.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/netsectuna/CVE-2022-23909 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html"], ["2022", "CVE-2022-0897", "A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious, unprivileged user to exploit this issue via libvirt's API virConnectNumOfNWFilters to crash the network filter management daemon (libvirtd/virtnwfilterd).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1769", "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c"], ["2022", "CVE-2022-41884", "TensorFlow is an open source platform for machine learning. If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. We have patched the issue in GitHub commit 2b56169c16e375c521a3bc8ea658811cc0793784. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636"], ["2022", "CVE-2022-44373", "A stack overflow vulnerability exists in TrendNet Wireless AC Easy-Upgrader TEW-820AP (Version v1.0R, firmware version 1.01.B01) which may result in remote code execution.", "No PoCs found on GitHub currently.", "https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md"], ["2022", "CVE-2022-38065", "A privilege escalation vulnerability exists in the oslo.privsep functionality of OpenStack git master 05194e7618 and prior. Overly permissive functionality within tools leveraging this library within a container can lead increased privileges.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599"], ["2022", "CVE-2022-29080", "The npm-dependency-versions package through 0.3.0 for Node.js allows command injection if an attacker is able to call dependencyVersions with a JSON object in which pkgs is a key, and there are shell metacharacters in a value.", "No PoCs found on GitHub currently.", "https://github.com/barneycarroll/npm-dependency-versions/issues/6"], ["2022", "CVE-2022-0627", "The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4"], ["2022", "CVE-2022-23428", "An improper boundary check in eden_runtime hal service prior to SMR Feb-2022 Release 1 allows arbitrary memory write and code execution.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-24248", "RiteCMS version 3.1.0 and below suffers from an arbitrary file deletion via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker might leverage the capability of arbitrary file deletion to circumvent certain web server security mechanisms such as deleting .htaccess file that would deactivate those security constraints.", "No PoCs found on GitHub currently.", "https://en.0day.today/exploit/description/37177 https://www.exploit-db.com/exploits/50615"], ["2022", "CVE-2022-2821", "Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069"], ["2022", "CVE-2022-0924", "Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/278"], ["2022", "CVE-2022-31535", "The freefood89/Fishtank repository through 2015-06-24 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22744", "The constructed curl command from the \"Copy as curl\" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt. *This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1737252"], ["2022", "CVE-2022-20701", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-20490", "In multiple functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703505", "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20490 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-46285", "A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.", "https://github.com/0xdea/advisories https://github.com/1g-v/DevSec_Docker_lab https://github.com/L-ivan7/-.-DevSec_Docker https://github.com/hnsecurity/vulns https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-38096", "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "https://github.com/goblimey/learn-unix", "https://bugzilla.openanolis.cn/show_bug.cgi?id=2073"], ["2022", "CVE-2022-38307", "LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function LIEF::MachO::SegmentCommand::file_offset() at /MachO/SegmentCommand.cpp.", "No PoCs found on GitHub currently.", "https://github.com/lief-project/LIEF/issues/764"], ["2022", "CVE-2022-44380", "Snipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets.", "No PoCs found on GitHub currently.", "https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/"], ["2022", "CVE-2022-43972", "A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A null pointer dereference in the soap_action function within the upnp binary can be triggered by an unauthenticated attacker via a malicious POST request invoking the AddPortMapping action.", "No PoCs found on GitHub currently.", "https://youtu.be/73-1lhvJPNg https://youtu.be/RfWVYCUBNZ0 https://youtu.be/TeWAmZaKQ_w"], ["2022", "CVE-2022-22604", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0864", "The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.22.9 does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872"], ["2022", "CVE-2022-30719", "Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.", "https://github.com/ARPSyndicate/cvemon", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-0767", "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "https://github.com/416e6e61/My-CVEs https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e"], ["2022", "CVE-2022-25064", "TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE) vulnerability via the function oal_wan6_setIpAddr.", "https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/FrameVul https://github.com/Mr-xn/CVE-2022-25064 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/exploitwritter/CVE-2022-25064 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-34310", "IBM CICS TX Standard and Advanced 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229441.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-48006", "An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php.", "No PoCs found on GitHub currently.", "https://github.com/taogogo/taocms/issues/35"], ["2022", "CVE-2022-1899", "Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04"], ["2022", "CVE-2022-36215", "DedeBIZ v6 was discovered to contain a remote code execution vulnerability in sys_info.php.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md"], ["2022", "CVE-2022-30608", "\"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a \"user that the website trusts. IBM X-Force ID: 227295.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0676", "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/wtdcode/wtdcode", "https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485"], ["2022", "CVE-2022-23479", "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade.", "https://github.com/ARPSyndicate/cvemon https://github.com/bacon-tomato-spaghetti/XRDP-LPE https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-1988", "Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c"], ["2022", "CVE-2022-36095", "XWiki Platform is a generic wiki platform. Prior to versions 13.10.5 and 14.3, it is possible to perform a Cross-Site Request Forgery (CSRF) attack for adding or removing tags on XWiki pages. The problem has been patched in XWiki 13.10.5 and 14.3. As a workaround, one may locally modify the `documentTags.vm` template in one's filesystem, to apply the changes exposed there.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31564", "The woduq1414/munhak-moa repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726 https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0"], ["2022", "CVE-2022-41966", "XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.", "https://github.com/111ddea/Xstream_cve-2022-41966 https://github.com/Threekiii/CVE https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/muneebaashiq/MBProjects https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-44291", "webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in phasesets.php.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/webtareas/issues/1"], ["2022", "CVE-2022-29162", "runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.", "https://github.com/ARPSyndicate/cvemon https://github.com/Desfirit/sdl_2 https://github.com/JtMotoX/docker-trivy https://github.com/Sergei12123/sdl", "No PoCs from references."], ["2022", "CVE-2022-22715", "Named Pipe File System Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24188", "The /device/signin end-point for the Ourphoto App version 1.4.1 discloses clear-text password information for functionality within the picture frame devices. The deviceVideoCallPassword and mqttPassword are returned in clear-text. The lack of sessions management and presence of insecure direct object references allows to return password information for other end-users devices. Many of the picture frame devices offer video calling, and it is likely this information can be used to abuse that functionality.", "No PoCs found on GitHub currently.", "https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html"], ["2022", "CVE-2022-37068", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateMacCloneFinal.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14"], ["2022", "CVE-2022-24359", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15702.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-2930", "Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477"], ["2022", "CVE-2022-37128", "In D-Link DIR-816 A2_v1.10CNB04.img the network can be initialized without authentication via /goform/wizard_end.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-29022", "A buffer overflow vulnerability exists in the razeraccessory driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities"], ["2022", "CVE-2022-22655", "An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4. An app may be able to leak sensitive user information.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-22956", "VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/sourceincite/hekate", "http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html"], ["2022", "CVE-2022-0736", "Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2633", "The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file downloads and blind server-side request forgery via the 'dl' parameter found in the ~/public/video.php file in versions up to, and including 2.6.0. This makes it possible for unauthenticated users to download sensitive files hosted on the affected server and forge requests to the server.", "https://github.com/0day404/vulnerability-poc https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io", "No PoCs from references."], ["2022", "CVE-2022-23539", "Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you\u2019ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.", "https://github.com/ARPSyndicate/cvemon https://github.com/zvigrinberg/exhort-service-readiness-experiment", "https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3"], ["2022", "CVE-2022-0431", "The Insights from Google PageSpeed WordPress plugin before 4.0.4 does not sanitise and escape various parameters before outputting them back in attributes in the plugin's settings dashboard, leading to Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca"], ["2022", "CVE-2022-42948", "Cobalt Strike 4.7.1 fails to properly escape HTML tags when they are displayed on Swing components. By injecting crafted HTML code, it is possible to remotely execute code in the Cobalt Strike UI.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://www.cobaltstrike.com/blog/"], ["2022", "CVE-2022-34046", "An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html"], ["2022", "CVE-2022-25332", "The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK).", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://tetraburst.com/"], ["2022", "CVE-2022-36143", "SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via __interceptor_strlen.part at /sanitizer_common/sanitizer_common_interceptors.inc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/62"], ["2022", "CVE-2022-29325", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the addurlfilter parameter in /goform/websURLFilter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/8 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-32898", "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/ox1111/CVE-2022-32898", "No PoCs from references."], ["2022", "CVE-2022-21978", "Microsoft Exchange Server Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46093", "Hospital Management System v1.0 is vulnerable to SQL Injection. Attackers can gain administrator privileges without the need for a password.", "No PoCs found on GitHub currently.", "https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Hospital-Management-System/Hospital-Management-System.md"], ["2022", "CVE-2022-31663", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a reflected cross-site scripting (XSS) vulnerability. Due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user's window.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-3489", "The WP Hide WordPress plugin through 0.0.2 does not have authorisation and CSRF checks in place when updating the custom_wpadmin_slug settings, allowing unauthenticated attackers to update it with a crafted request", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505"], ["2022", "CVE-2022-29265", "Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - EvaluateXPath - EvaluateXQuery - ValidateXml Apache NiFi flow configurations that include these Processors are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services.", "https://github.com/karimhabush/cyberowl https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-43467", "An out-of-bounds write vulnerability exists in the PQS format coord_file functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671"], ["2022", "CVE-2022-4178", "Use after free in Mojo in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-27377", "MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0571", "Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a5039485-6e48-4313-98ad-915506c19ae8"], ["2022", "CVE-2022-42808", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. A remote user may be able to cause kernel code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/diego-acc/NVD-Scratching https://github.com/diegosanzmartin/NVD-Scratching", "No PoCs from references."], ["2022", "CVE-2022-28109", "Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.", "No PoCs found on GitHub currently.", "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/"], ["2022", "CVE-2022-4069", "Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5"], ["2022", "CVE-2022-22991", "A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-48090", "Tramyardg hotel-mgmt-system version 2022.4 is vulnerable to SQL Injection via /app/dao/CustomerDAO.php.", "https://github.com/youyou-pm10/MyCVEs", "https://github.com/tramyardg/hotel-mgmt-system/issues/21"], ["2022", "CVE-2022-41473", "RPCMS v3.0.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Search function.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "https://github.com/ralap-z/rpcms/issues/1"], ["2022", "CVE-2022-0460", "Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28018", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\schedule_edit.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-2565", "The Simple Payment Donations & Subscriptions WordPress plugin before 4.2.1 does not sanitise and escape user input given in its forms, which could allow unauthenticated attackers to perform Cross-Site Scripting attacks against admins", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83"], ["2022", "CVE-2022-42919", "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.", "https://github.com/NathanielAPawluk/sec-buddy", "No PoCs from references."], ["2022", "CVE-2022-3609", "The GetYourGuide Ticketing WordPress plugin before 1.0.4 does not sanitise and escape some parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e"], ["2022", "CVE-2022-3598", "LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.", "https://github.com/ARPSyndicate/cvemon https://github.com/maxim12z/ECommerce https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/435"], ["2022", "CVE-2022-44316", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the LexGetStringConstant function in lex.c when called from LexScanGetToken.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-0520", "Use After Free in NPM radare2.js prior to 5.6.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ce13c371-e5ef-4993-97f3-3d33dcd943a6"], ["2022", "CVE-2022-42859", "Multiple issues were addressed by removing the vulnerable code. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, watchOS 9.2. An app may be able to bypass Privacy preferences.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/23"], ["2022", "CVE-2022-2425", "The WP DS Blog Map WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d"], ["2022", "CVE-2022-25223", "Money Transfer Management System Version 1.0 allows an authenticated user to inject SQL queries in 'mtms/admin/?page=transaction/view_details' via the 'id' parameter.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/jagger/"], ["2022", "CVE-2022-38362", "Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.", "https://github.com/ARPSyndicate/cvemon https://github.com/happyhacking-k/happyhacking-k", "No PoCs from references."], ["2022", "CVE-2022-22661", "A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-35019", "Advancecomp v2.3 was discovered to contain a segmentation fault.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md"], ["2022", "CVE-2022-0493", "The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a flaw in the search, allowing a pattern to be provided, which will be used to output the relevant matches from the matching file, all content of the file can be disclosed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed"], ["2022", "CVE-2022-0702", "The Petfinder Listings WordPress plugin through 1.0.18 does not escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9"], ["2022", "CVE-2022-2596", "Inefficient Regular Expression Complexity in GitHub repository node-fetch/node-fetch prior to 3.2.10.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "https://huntr.dev/bounties/a7e6a136-0a4b-46c4-ad20-802f1dd60bf7"], ["2022", "CVE-2022-48063", "GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function load_separate_debug_files at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29924"], ["2022", "CVE-2022-25390", "DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php.", "No PoCs found on GitHub currently.", "https://www.adminxe.com/3276.html"], ["2022", "CVE-2022-33987", "The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidrgfoss/davidrgfoss https://github.com/davidrgfoss/davidrgfoss-web https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-27295", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formAdvanceSetup. This vulnerability allows attackers to cause a Denial of Service (DoS) via the webpage parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-27104", "An Unauthenticated time-based blind SQL injection vulnerability exists in Forma LMS prior to v.1.4.3.", "No PoCs found on GitHub currently.", "https://www.swascan.com/security-advisory-forma-lms/"], ["2022", "CVE-2022-48123", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the servername parameter in the setting/delStaticDhcpRules function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/15"], ["2022", "CVE-2022-22822", "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/fokypoky/places-list https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36330", "A buffer overflow vulnerability was discovered on firmware version validation that could lead to an unauthenticated remote code execution\u00a0in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi devices. An attacker would require exploitation of another vulnerability to raise their privileges in order to exploit this buffer overflow vulnerability.This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191"], ["2022", "CVE-2022-27044", "libsixel 1.8.6 is affected by Buffer Overflow in libsixel/src/quant.c:876.", "https://github.com/ARPSyndicate/cvemon https://github.com/a4865g/Cheng-fuzz", "https://github.com/saitoha/libsixel/issues/156"], ["2022", "CVE-2022-21548", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0642", "The JivoChat Live Chat WordPress plugin before 1.3.5.4 does not properly check CSRF tokens on POST requests to the plugins admin page, and does not sanitise some parameters, leading to a stored Cross-Site Scripting vulnerability where an attacker can trick a logged in administrator to inject arbitrary javascript.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425"], ["2022", "CVE-2022-2747", "A vulnerability was found in SourceCodester Simple Online Book Store and classified as critical. This issue affects some unknown processing of the file book.php. The manipulation of the argument book_isbn leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-206015.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206015"], ["2022", "CVE-2022-2844", "A vulnerability classified as problematic has been found in MotoPress Timetable and Event Schedule up to 1.4.06. This affects an unknown part of the file /wp/?cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&calid=1&month_index=1&method=adddetails&id=2 of the component Calendar Handler. The manipulation of the argument Subject/Location/Description leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-206487.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0941", "Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc"], ["2022", "CVE-2022-31550", "The olmax99/pyathenastack repository through 2019-11-08 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41952", "Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast). This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled. Version 1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview. Upgrade to 1.53.0 to fully resolve the issue. As a workaround, turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file.", "No PoCs found on GitHub currently.", "https://github.com/matrix-org/synapse/pull/11936"], ["2022", "CVE-2022-38222", "There is a use-after-free issue in JBIG2Stream::close() located in JBIG2Stream.cc in Xpdf 4.04. It can be triggered by sending a crafted PDF file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320"], ["2022", "CVE-2022-29156", "drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12"], ["2022", "CVE-2022-22721", "If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/PierreChrd/py-projet-tut https://github.com/Totes5706/TotesHTB https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/kasem545/vulnsearch", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-35048", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0b2c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md"], ["2022", "CVE-2022-0850", "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"], ["2022", "CVE-2022-26239", "The default privileges for the running service Normand License Manager in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows unprivileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.", "No PoCs found on GitHub currently.", "https://pastebin.com/1QEHrj01"], ["2022", "CVE-2022-41843", "An issue was discovered in Xpdf 4.04. There is a crash in convertToType0 in fofi/FoFiType1C.cc, a different vulnerability than CVE-2022-38928.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344 https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421"], ["2022", "CVE-2022-29047", "Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38333", "Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request.", "https://github.com/ARPSyndicate/cvemon https://github.com/yikesoftware/yikesoftware", "No PoCs from references."], ["2022", "CVE-2022-21459", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0753", "Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.9.", "https://github.com/ARPSyndicate/cvemon https://github.com/jaapmarcus/drone-test", "https://huntr.dev/bounties/8ce4b776-1c53-45ec-bc5f-783077e2d324"], ["2022", "CVE-2022-2656", "A vulnerability classified as critical has been found in SourceCodester Multi Language Hotel Management Software. Affected is an unknown function. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205596.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205596"], ["2022", "CVE-2022-21519", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0582", "Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0613", "Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083"], ["2022", "CVE-2022-2487", "A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md https://vuldb.com/?id.204538"], ["2022", "CVE-2022-45198", "Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-32768", "Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's streams.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536"], ["2022", "CVE-2022-33896", "A buffer underflow vulnerability exists in the way Hword of Hancom Office 2020 version 11.0.0.5357 parses XML-based office files. A specially-crafted malformed file can cause memory corruption by using memory before buffer start, which can lead to code execution. A victim would need to access a malicious file to trigger this vulnerability.", "https://github.com/Live-Hack-CVE/CVE-2022-33896", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574"], ["2022", "CVE-2022-36361", "A vulnerability has been identified in LOGO! 12/24RCE (All versions), LOGO! 12/24RCEo (All versions), LOGO! 230RCE (All versions), LOGO! 230RCEo (All versions), LOGO! 24CE (All versions), LOGO! 24CEo (All versions), LOGO! 24RCE (All versions), LOGO! 24RCEo (All versions), SIPLUS LOGO! 12/24RCE (All versions), SIPLUS LOGO! 12/24RCEo (All versions), SIPLUS LOGO! 230RCE (All versions), SIPLUS LOGO! 230RCEo (All versions), SIPLUS LOGO! 24CE (All versions), SIPLUS LOGO! 24CEo (All versions), SIPLUS LOGO! 24RCE (All versions), SIPLUS LOGO! 24RCEo (All versions). Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, get control over the instruction counter and run custom code.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-31501", "The ChaoticOnyx/OnyxForum repository before 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/iAvoe/iAvoe", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-31690", "Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.", "https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/klopfdreh/klopfdreh", "No PoCs from references."], ["2022", "CVE-2022-41903", "Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.", "https://github.com/9069332997/session-1-full-stack https://github.com/ARPSyndicate/cvemon https://github.com/Jitu-Ranjan/cve-41903 https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/juhp/rpmostree-update https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sondermc/git-cveissues https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-29296", "A reflected cross-site scripting (XSS) vulnerability in the login portal of Avantune Genialcloud ProJ - 10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt"], ["2022", "CVE-2022-35299", "SAP SQL Anywhere - version 17.0, and SAP IQ - version 16.1, allows an attacker to leverage logical errors in memory management to cause a memory corruption, such as Stack-based buffer overflow.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-35108", "SWFTools commit 772e55a2 was discovered to contain a segmentation violation via DCTStream::getChar() at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/matthiaskramm/swftools/issues/184"], ["2022", "CVE-2022-31983", "Online Fire Reporting System v1.0 is vulnerable to SQL Injection via /ofrs/admin/?page=requests/manage_request&id=.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mel1huc4r/CVE-2022-31983 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27005", "Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the setWanCfg function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/kuznyJan1972/CVE-2022-25075-RCE https://github.com/kuznyJan1972/CVE-2022-25075-rce-POC https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-20966", "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
Cisco has not yet released software updates that address this vulnerability.", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/"], ["2022", "CVE-2022-43484", "TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability.The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.", "No PoCs found on GitHub currently.", "http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html https://osdn.net/projects/terasoluna/wiki/cve-2022-43484"], ["2022", "CVE-2022-32778", "An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerability is for the pass cookie, which contains the hashed password and can be leaked via JavaScript.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542"], ["2022", "CVE-2022-45188", "Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-2706", "A vulnerability classified as critical has been found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected is an unknown function of the file /pages/class_sched.php. The manipulation of the argument class with the input '||(SELECT 0x684d6b6c WHERE 5993=5993 AND (SELECT 2096 FROM(SELECT COUNT(*),CONCAT(0x717a786b71,(SELECT (ELT(2096=2096,1))),0x717a626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||' leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-205830 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205830"], ["2022", "CVE-2022-0603", "Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0592", "The MapSVG WordPress plugin before 6.2.20 does not validate and escape a parameter via a REST endpoint before using it in a SQL statement, leading to a SQL Injection exploitable by unauthenticated users.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b"], ["2022", "CVE-2022-21698", "client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21509", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2805", "A flaw was found in ovirt-engine, which leads to the logging of plaintext passwords in the log file when using otapi-style. This flaw allows an attacker with sufficient privileges to read the log file, leading to confidentiality loss.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22760", "When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1740985 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-29117", ".NET and Visual Studio Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31680", "The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.", "No PoCs found on GitHub currently.", "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587"], ["2022", "CVE-2022-31511", "The AFDudley/equanimity repository through 2014-04-23 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22620", "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bb33bb/dkjiayu.github.io https://github.com/dkjiayu/dkjiayu.github.io https://github.com/k0mi-tg/CVE-POC https://github.com/kmeps4/CVE-2022-22620 https://github.com/kmeps4/PSFree https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/springsec/CVE-2022-22620 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-41853", "Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by updating to 2.7.1 or by setting the system property \"hsqldb.method_class_names\" to classes which are allowed to be called. For example, System.setProperty(\"hsqldb.method_class_names\", \"abc\") or Java argument -Dhsqldb.method_class_names=\"abc\" can be used. From version 2.7.1 all classes by default are not accessible except those in java.lang.Math and need to be manually enabled.", "https://github.com/ARPSyndicate/cvemon https://github.com/OndraZizka/csv-cruncher https://github.com/mbadanoiu/CVE-2022-41853 https://github.com/mbadanoiu/MAL-001 https://github.com/srchen1987/springcloud-distributed-transaction https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-0840", "The Easy Social Icons WordPress plugin before 3.2.1 does not properly escape the image_file field when adding a new social icon, allowing high privileged users to inject arbitrary javascript even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df"], ["2022", "CVE-2022-2945", "The WordPress Infinite Scroll \u2013 Ajax Load More plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.5.3 via the 'type' parameter found in the alm_get_layout() function. This makes it possible for authenticated attackers, with administrative permissions, to read the contents of arbitrary files on the server, which can contain sensitive information.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9"], ["2022", "CVE-2022-35058", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b05ce.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md"], ["2022", "CVE-2022-2646", "A vulnerability, which was classified as problematic, was found in SourceCodester Online Admission System. Affected is an unknown function of the file index.php. The manipulation of the argument eid with the input 8 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205572.", "https://github.com/ARPSyndicate/cvemon https://github.com/badboycxcc/Student-Admission-Xss https://github.com/badboycxcc/badboycxcc", "No PoCs from references."], ["2022", "CVE-2022-0743", "Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293"], ["2022", "CVE-2022-21449", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/AkashHamal0x01/learn250 https://github.com/AlexanderZinoni/CVE-2022-21449 https://github.com/AstralQuanta/CustomJWT https://github.com/CompassSecurity/jwt-attacker https://github.com/CompassSecurity/jwt-scanner https://github.com/Damok82/SignChecker https://github.com/DanielFreitassc/JWT_JAVA https://github.com/DataDog/security-labs-pocs https://github.com/DolphFlynn/jwt-editor https://github.com/EGI-Federation/SVG-advisories https://github.com/Monu1991-svg/Java https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Namkin-bhujiya/JWT-ATTACK https://github.com/PyterSmithDarkGhost/CVE-2022-21449-I2P-TLS-POC https://github.com/SYRTI/POC_to_review https://github.com/Skipper7718/CVE-2022-21449-showcase https://github.com/WhooAmii/POC_to_review https://github.com/adidaspaul/adidaspaul https://github.com/auth0/java-jwt https://github.com/d0ge/proof-of-concept-labs https://github.com/davwwwx/CVE-2022-21449 https://github.com/dravenww/curated-article https://github.com/fundaergn/CVE-2022-21449 https://github.com/hamidreza-ka/jwt-authentication https://github.com/igurel/cryptography-101 https://github.com/jamietanna/jamietanna https://github.com/jfrog/jfrog-CVE-2022-21449 https://github.com/jmiettinen/CVE-2022-21449-vuln-test https://github.com/k0mi-tg/CVE-POC https://github.com/khalednassar/CVE-2022-21449-TLS-PoC https://github.com/leoambrus/CheckersNomisec https://github.com/manas3c/CVE-POC https://github.com/marschall/psychic-signatures https://github.com/murchie85/twitterCyberMonitor https://github.com/nomi-sec/PoC-in-GitHub https://github.com/notkmhn/CVE-2022-21449-TLS-PoC https://github.com/pipiscrew/timeline https://github.com/righel/yara-rules https://github.com/tanjiti/sec_profile https://github.com/thack1/CVE-2022-21449 https://github.com/trganda/starrlist https://github.com/trhacknon/Pocingit https://github.com/whichjdk/whichjdk.com https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-20826", "A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality.
This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust.", "https://github.com/socsecresearch/SoC_Vulnerability_Benchmarks", "No PoCs from references."], ["2022", "CVE-2022-27145", "GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a stack-overflow vulnerability in function gf_isom_get_sample_for_movie_time of mp4box.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2108"], ["2022", "CVE-2022-36231", "pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses backticks instead of Open3.", "https://github.com/affix/CVE-2022-36231 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/affix/CVE-2022-36231"], ["2022", "CVE-2022-21558", "Vulnerability in the Oracle Crystal Ball product of Oracle Construction and Engineering (component: Installation). Supported versions that are affected are 11.1.2.0.000-11.1.2.4.900. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Crystal Ball executes to compromise Oracle Crystal Ball. While the vulnerability is in Oracle Crystal Ball, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Crystal Ball. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).", "https://github.com/ARPSyndicate/cvemon https://github.com/RonnieSalomonsen/My-CVEs", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-36320", "Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-22832", "An issue was discovered in Servisnet Tessa 0.0.2. Authorization data is available via an unauthenticated /data-service/users/ request.", "https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/Enes4xd/aleyleiftaradogruu https://github.com/Enes4xd/ezelnur6327 https://github.com/Enes4xd/kirik_kalpli_olan_sayfa https://github.com/Enes4xd/salih_.6644 https://github.com/Enes4xd/salihalkan4466 https://github.com/aleyleiftaradogruu/aleyleiftaradogruu https://github.com/cayserkiller/cayserkiller https://github.com/cr0ss2018/cr0ss2018 https://github.com/crossresmii/cayserkiller https://github.com/crossresmii/crossresmii https://github.com/crossresmii/salihalkan4466 https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/ezelnur6327 https://github.com/xr4aleyna/Enes4xd https://github.com/xr4aleyna/aleyleiftaradogruu https://github.com/xr4aleyna/crossresmii https://github.com/xr4aleyna/xr4aleyna", "http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html https://www.exploit-db.com/exploits/50712 https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html"], ["2022", "CVE-2022-31540", "The kumardeepak/hin-eng-preprocessing repository through 2019-07-16 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0951", "File Upload Restriction Bypass leading to Stored XSS Vulnerability in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932"], ["2022", "CVE-2022-26278", "Tenda AC9 v15.03.2.21_cn was discovered to contain a stack overflow via the time parameter in the PowerSaveSet function.", "No PoCs found on GitHub currently.", "https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9"], ["2022", "CVE-2022-0811", "A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.", "https://github.com/43622283/awesome-cloud-native-security https://github.com/ARPSyndicate/cvemon https://github.com/Metarget/awesome-cloud-native-security https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground https://github.com/h4ckm310n/Container-Vulnerability-Exploit https://github.com/iridium-soda/container-escape-exploits https://github.com/k0mi-tg/CVE-POC https://github.com/kajogo777/kubernetes-misconfigured https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rewanthtammana/container-and-kubernetes-security-workshop https://github.com/soosmile/POC https://github.com/spiarh/webhook-cve-2022-0811 https://github.com/trhacknon/Pocingit https://github.com/turbra/ocp-cr8escape https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-35009", "PNGDec commit 8abf6be was discovered to contain a memory allocation problem via asan_malloc_linux.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-29006", "Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Directory Management System v1.0 allows attackers to bypass authentication.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-29006 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.exploit-db.com/exploits/50370"], ["2022", "CVE-2022-29397", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_004196c8.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules"], ["2022", "CVE-2022-46161", "pdfmake is an open source client/server side PDF printing in pure JavaScript. In versions up to and including 0.2.5 pdfmake contains an unsafe evaluation of user controlled input. Users of pdfmake are thus subject to arbitrary code execution in the context of the process running the pdfmake code. There are no known fixes for this issue. Users are advised to restrict access to trusted user input.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/"], ["2022", "CVE-2022-31400", "A cross-site scripting (XSS) vulnerability in /staff/setup/email-addresses of Helpdeskz v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email name field.", "No PoCs found on GitHub currently.", "https://youtu.be/uqO6hluHDB4"], ["2022", "CVE-2022-27114", "There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.", "No PoCs found on GitHub currently.", "https://github.com/michaelrsweet/htmldoc/issues/471"], ["2022", "CVE-2022-43604", "An out-of-bounds write vulnerability exists in the GetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out-of-bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661"], ["2022", "CVE-2022-43595", "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .fits files.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"], ["2022", "CVE-2022-22972", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.", "https://github.com/20142995/sectool https://github.com/43622283/cloud-security-guides https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Awrrays/FrameVul https://github.com/Dghpi9/CVE-2022-22972 https://github.com/GRQForCloud/cloud-security-guides https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Schira4396/VcenterKiller https://github.com/W01fh4cker/VcenterKit https://github.com/WhooAmii/POC_to_review https://github.com/YDCloudSecurity/cloud-security-guides https://github.com/bengisugun/CVE-2022-22972- https://github.com/djytmdj/Tool_Summary https://github.com/goldenscale/GS_GithubMirror https://github.com/hktalent/Scan4all_Pro https://github.com/horizon3ai/CVE-2022-22972 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/taielab/awesome-hacking-lists https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2586", "It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.", "https://github.com/ARPSyndicate/cvemon https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/Trickhish/automated_privilege_escalation https://github.com/WhooAmii/POC_to_review https://github.com/aels/CVE-2022-2586-LPE https://github.com/felixfu59/kernel-hack https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/greek0x0/2022-LPE-UAF https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/konoha279/2022-LPE-UAF https://github.com/lockedbyte/lockedbyte https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pirenga/2022-LPE-UAF https://github.com/sniper404ghostxploit/CVE-2022-2586 https://github.com/ssr-111/linux-kernel-exploitation https://github.com/substing/internal_ctf https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://ubuntu.com/security/notices/USN-5560-2 https://ubuntu.com/security/notices/USN-5562-1 https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://www.openwall.com/lists/oss-security/2022/08/09/5"], ["2022", "CVE-2022-0712", "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466"], ["2022", "CVE-2022-21789", "In audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/docfate111/CVE-2022-21789 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-21418", "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-21939", "Sensitive Cookie Without 'HttpOnly' Flag vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29224", "Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can \u201chold\u201d (prevent removal) upstream hosts obtained via service discovery until configured active health checking fails. If an attacker controls an upstream host and also controls service discovery of that host (via DNS, the EDS API, etc.), an attacker can crash Envoy by forcing removal of the host from service discovery, and then failing the gRPC health check request. This will crash Envoy via a null pointer dereference. Users are advised to upgrade to resolve this vulnerability. Users unable to upgrade may disable gRPC health checking and/or replace it with a different health checking type as a mitigation.", "https://github.com/ARPSyndicate/cvemon https://github.com/ssst0n3/docker_archive", "https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49"], ["2022", "CVE-2022-48251", "** DISPUTED ** The AES instructions on the ARMv8 platform do not have an algorithm that is \"intrinsically resistant\" to side-channel attacks. NOTE: the vendor reportedly offers the position \"while power side channel attacks ... are possible, they are not directly caused by or related to the Arm architecture.\"", "No PoCs found on GitHub currently.", "https://eshard.com/posts/sca-attacks-on-armv8"], ["2022", "CVE-2022-4139", "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0imet/pyfetch", "No PoCs from references."], ["2022", "CVE-2022-42849", "An access issue existed with privileged API calls. This issue was addressed with additional restrictions. This issue is fixed in iOS 16.2 and iPadOS 16.2, tvOS 16.2, watchOS 9.2. A user may be able to elevate privileges.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-0530", "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/ByteHackr/unzip_poc https://github.com/maxim12z/ECommerce https://github.com/nanaao/unzip_poc", "https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://github.com/ByteHackr/unzip_poc"], ["2022", "CVE-2022-2575", "The WBW Currency Switcher for WooCommerce WordPress plugin before 1.6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365"], ["2022", "CVE-2022-28008", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\attendance_delete.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-0470", "Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31861", "Cross site Scripting (XSS) in ThingsBoard IoT Platform through 3.3.4.1 via a crafted value being sent to the audit logs.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/09/cve-2022-31861.html"], ["2022", "CVE-2022-27276", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_10F2C. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-48311", "**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/swzhouu/CVE-2022-48311 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/swzhouu/CVE-2022-48311"], ["2022", "CVE-2022-34007", "EQS Integrity Line Professional through 2022-07-01 allows a stored XSS via a crafted whistleblower entry.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html"], ["2022", "CVE-2022-25373", "Zoho ManageEngine SupportCenter Plus before 11020 allows Stored XSS in the request history.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0pak4/k0pak4", "https://raxis.com/blog/cve-2022-25373"], ["2022", "CVE-2022-3619", "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44097", "Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.", "No PoCs found on GitHub currently.", "https://github.com/upasvi/CVE-/issues/2"], ["2022", "CVE-2022-21879", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0561", "Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.", "No PoCs found on GitHub currently.", "https://gitlab.com/libtiff/libtiff/-/issues/362"], ["2022", "CVE-2022-22890", "There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/nu1r/yak-module-Nu", "https://github.com/jerryscript-project/jerryscript/issues/4847"], ["2022", "CVE-2022-25262", "In JetBrains Hub before 2022.1.14434, SAML request takeover was possible.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anquanscan/sec-tools https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/yuriisanin/CVE-2022-25262 https://github.com/yuriisanin/whoami https://github.com/yuriisanin/yuriisanin https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-36153", "tifig v0.2.2 was discovered to contain a segmentation violation via std::vector >::size() const at /bits/stl_vector.h.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-31830", "Kity Minder v1.3.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the init function at ImageCapture.class.php.", "No PoCs found on GitHub currently.", "https://github.com/fex-team/kityminder/issues/345"], ["2022", "CVE-2022-25322", "ZEROF Web Server 2.0 allows /HandleEvent SQL Injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/Stalrus/research https://github.com/landigv/research https://github.com/landigvt/research", "No PoCs from references."], ["2022", "CVE-2022-0421", "The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9"], ["2022", "CVE-2022-22542", "S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee Business Partners, to an actor that is not explicitly authorized to have access to that information, which could compromise Confidentiality.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-37138", "Loan Management System 1.0 is vulnerable to SQL Injection at the login page, which allows unauthorized users to login as Administrator after injecting username form.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md"], ["2022", "CVE-2022-0825", "The Amelia WordPress plugin before 1.0.49 does not have proper authorisation when managing appointments, allowing any customer to update other's booking status, as well as retrieve sensitive information about the bookings, such as the full name and phone number of the person who booked it.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e"], ["2022", "CVE-2022-23529", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none.", "https://github.com/ARPSyndicate/cvemon https://github.com/aalex954/CVE-2022-23529-Exploration https://github.com/bollwarm/SecToolSet https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/govindasamyarun/jwt-secret-poisoning https://github.com/hackintoanetwork/CVE-2022-23529-PoC https://github.com/imexz/ft_transcendence https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mgillam/CveSandboxes https://github.com/nomi-sec/PoC-in-GitHub https://github.com/teresaweber685/book_list https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3"], ["2022", "CVE-2022-2623", "Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0726", "Missing Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/8928ab08-7fcb-475e-8da7-18e8412c1ac3"], ["2022", "CVE-2022-36254", "Multiple persistent cross-site scripting (XSS) vulnerabilities in index.php in tramyardg Hotel Management System 1.0 allow remote attackers to inject arbitrary web script or HTML via multiple parameters such as \"fullname\".", "No PoCs found on GitHub currently.", "https://gist.github.com/ziyishen97/c464b459df73c4cef241e7ec774b7cf6"], ["2022", "CVE-2022-22946", "In spring cloud gateway versions prior to 3.1.1+ , applications that are configured to enable HTTP2 and no key store or trusted certificates are set will be configured to use an insecure TrustManager. This makes the gateway able to connect to remote services with invalid or custom certificates.", "https://github.com/ARPSyndicate/cvemon https://github.com/wjl110/Spring_CVE_2022_22947", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-36314", "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-1998", "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d"], ["2022", "CVE-2022-25165", "An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.", "https://github.com/ARPSyndicate/cvemon https://github.com/CyberSecurityUP/Cloud-Security-Attacks https://github.com/H4cksploit/CVEs-master https://github.com/Jaikumar3/Cloud-Security-Attacks https://github.com/Mehedi-Babu/security_attacks_cloud https://github.com/RhinoSecurityLabs/CVEs https://github.com/SummitRoute/csp_security_mistakes https://github.com/atesemre/awesome-aws-security https://github.com/blaise442/awesome-aws-security https://github.com/jassics/awesome-aws-security https://github.com/merlinepedra/RHINOECURITY-CVEs https://github.com/merlinepedra25/RHINOSECURITY-CVEs https://github.com/thomasps7356/awesome-aws-security https://github.com/zlw9991/netflix-password-sharing-with-vpn-risks", "https://github.com/RhinoSecurityLabs/CVEs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/"], ["2022", "CVE-2022-22806", "A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause an unauthenticated connection to the UPS when a malformed connection is sent. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02"], ["2022", "CVE-2022-48107", "D-Link DIR_878_FW1.30B08 was discovered to contain a command injection vulnerability via the component /setnetworksettings/IPAddress. This vulnerability allows attackers to escalate privileges to root via a crafted payload.", "No PoCs found on GitHub currently.", "https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-2763", "The WP Socializer WordPress plugin before 7.3 does not sanitise and escape some of its Icons settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5"], ["2022", "CVE-2022-0666", "CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55"], ["2022", "CVE-2022-47379", "An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.", "https://github.com/microsoft/CoDe16", "No PoCs from references."], ["2022", "CVE-2022-30618", "An authenticated user with access to the Strapi admin panel can view private and sensitive data, such as email and password reset tokens, for API users if content types accessible to the authenticated user contain relationships to API users (from:users-permissions). There are many scenarios in which such details from API users can leak in the JSON response within the admin panel, either through a direct or indirect relationship. Access to this information enables a user to compromise these users\u2019 accounts if the password reset API endpoints have been enabled. In a worst-case scenario, a low-privileged user could get access to a high-privileged API account, and could read and modify any data as well as block access to both the admin panel and API by revoking privileges for all other users.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-37078", "TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the lang parameter at /setting/setLanguageCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6"], ["2022", "CVE-2022-0965", "Stored XSS viva .ofd file upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347"], ["2022", "CVE-2022-2860", "Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to bypass cookie prefix restrictions via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/browser-vr https://github.com/Haxatron/browser-vulnerability-research https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-24198", "** DISPUTED ** iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. NOTE: Vendor does not view this as a vulnerability and has not found it to be exploitable.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "https://github.com/itext/itext7/pull/78 https://github.com/itext/itext7/pull/78#issuecomment-1089287808"], ["2022", "CVE-2022-41976", "An privilege escalation issue was discovered in Scada-LTS 2.7.1.1 build 2948559113 allows remote attackers, authenticated in the application as a low-privileged user to change role (e.g., to administrator) by updating their user profile.", "No PoCs found on GitHub currently.", "https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html"], ["2022", "CVE-2022-31574", "The deepaliupadhyay/RealEstate repository through 2018-11-30 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0874", "The WP Social Buttons WordPress plugin through 2.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810"], ["2022", "CVE-2022-40799", "Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rtfmkiesel/CVE-2022-40799", "No PoCs from references."], ["2022", "CVE-2022-22585", "An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, macOS Monterey 12.2, macOS Big Sur 11.6.3. An application may be able to access a user's files.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22614", "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, Security Update 2022-003 Catalina, watchOS 8.5, macOS Monterey 12.3. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44001", "An issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-29063", "The Solr plugin of Apache OFBiz is configured by default to automatically make a RMI request on localhost, port 1099. In version 18.12.05 and earlier, by hosting a malicious RMI server on localhost, an attacker may exploit this behavior, at server start-up or on a server restart, in order to run arbitrary code. Upgrade to at least 18.12.06 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12646.", "https://github.com/karimhabush/cyberowl https://github.com/mbadanoiu/CVE-2022-29063", "No PoCs from references."], ["2022", "CVE-2022-46295", "Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666"], ["2022", "CVE-2022-20711", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-36194", "Centreon 22.04.0 is vulnerable to Cross Site Scripting (XSS) from the function Pollers > Broker Configuration by adding a crafted payload into the name parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/saitamang/POC-DUMP", "http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0"], ["2022", "CVE-2022-1889", "The Newsletter WordPress plugin before 7.4.6 does not escape and sanitise the preheader_text setting, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfilteredhtml is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a"], ["2022", "CVE-2022-25074", "TP-Link TL-WR902AC(US)_V3_191209 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC"], ["2022", "CVE-2022-34300", "In tinyexr 1.0.1, there is a heap-based buffer over-read in tinyexr::DecodePixelData.", "No PoCs found on GitHub currently.", "https://github.com/syoyo/tinyexr/issues/167"], ["2022", "CVE-2022-2672", "A vulnerability was found in SourceCodester Garage Management System. It has been classified as critical. Affected is an unknown function of the file createUser.php. The manipulation of the argument userName/uemail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205656.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205656"], ["2022", "CVE-2022-0777", "Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7"], ["2022", "CVE-2022-30709", "Improper input validation check logic vulnerability in SECRIL prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-2732", "Missing Authorization in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533"], ["2022", "CVE-2022-0637", "open redirect in pollbot (pollbot.services.mozilla.com) in versions before 1.4.6", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1753838 https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2022-0637"], ["2022", "CVE-2022-43721", "An authenticated attacker with update datasets permission could change a dataset link to an untrusted site, users could be redirected to this site when clicking on that specific dataset. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25134", "A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-22754", "If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "https://github.com/ARPSyndicate/cvemon", "https://bugzilla.mozilla.org/show_bug.cgi?id=1750565 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31525", "The SummaLabs/DLS repository through 0.1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20651", "A vulnerability in the logging component of Cisco Adaptive Security Device Manager (ASDM) could allow an authenticated, local attacker to view sensitive information in clear text on an affected system. Cisco ADSM must be deployed in a shared workstation environment for this issue to be exploited. This vulnerability is due to the storage of unencrypted credentials in certain logs. An attacker could exploit this vulnerability by accessing the logs on an affected system. A successful exploit could allow the attacker to view the credentials of other users of the shared device.", "https://github.com/ARPSyndicate/cvemon https://github.com/jbaines-r7/cisco_asa_research", "No PoCs from references."], ["2022", "CVE-2022-2831", "A flaw was found in Blender 3.3.0. An interger overflow in source/blender/blendthumb/src/blendthumb_extract.cc may lead to program crash or memory corruption.", "https://github.com/5angjun/5angjun https://github.com/ARPSyndicate/cvemon", "https://developer.blender.org/T99705"], ["2022", "CVE-2022-39088", "In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-0784", "The Title Experiments Free WordPress plugin before 9.0.1 does not sanitise and escape the id parameter before using it in a SQL statement via the wpex_titles AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs https://github.com/superlink996/chunqiuyunjingbachang", "https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f"], ["2022", "CVE-2022-0415", "Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.", "https://github.com/ARPSyndicate/cvemon https://github.com/bfengj/CTF https://github.com/cokeBeer/go-cves https://github.com/saveworks/saveworks https://github.com/wuhan005/wuhan005", "https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902"], ["2022", "CVE-2022-40869", "Tenda AC15 and AC18 routers V15.03.05.19 contain stack overflow vulnerabilities in the function fromDhcpListClient with a combined parameter \"list*\" (\"%s%d\",\"list\").", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md"], ["2022", "CVE-2022-27182", "On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, and 14.1.x versions prior to 14.1.4.6, when BIG-IP packet filters are enabled and a virtual server is configured with the type set to Reject, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27213", "Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-33901", "Unauthenticated Arbitrary File Read vulnerability in MultiSafepay plugin for WooCommerce plugin <= 4.13.1 at WordPress.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-29301", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-20660. Reason: This candidate is a reservation duplicate of CVE-2021-20660. Notes: All CVE users should reference CVE-2021-20660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-44363", "Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setSnmpInfo.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md"], ["2022", "CVE-2022-22576", "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31707", "vRealize Operations (vROps) contains a privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.", "https://github.com/ARPSyndicate/cvemon https://github.com/thiscodecc/thiscodecc", "No PoCs from references."], ["2022", "CVE-2022-31496", "LibreHealth EHR Base 2.0.0 allows incorrect interface/super/manage_site_files.php access.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-20473", "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173", "https://github.com/ARPSyndicate/cvemon https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1779", "The Auto Delete Posts WordPress plugin through 1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and delete specific posts, categories and attachments at once.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e"], ["2022", "CVE-2022-0887", "The Easy Social Icons WordPress plugin before 3.1.4 does not sanitize the selected_icons attribute to the cnss_widget before using it in an SQL statement, leading to a SQL injection vulnerability.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6"], ["2022", "CVE-2022-23919", "A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability leverages the name field within the protobuf message to cause a buffer overflow.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455"], ["2022", "CVE-2022-2982", "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be"], ["2022", "CVE-2022-31647", "Docker Desktop before 4.6.0 on Windows allows attackers to delete any file through the hyperv/destroy dockerBackendV2 API via a symlink in the DataFolder parameter, a different vulnerability than CVE-2022-26659.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2"], ["2022", "CVE-2022-1639", "Use after free in ANGLE in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf", "No PoCs from references."], ["2022", "CVE-2022-25256", "SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/RobertDra/CVE-2022-25256 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2450", "The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b"], ["2022", "CVE-2022-40929", "** DISPUTED ** XXL-JOB 2.2.0 has a Command execution vulnerability in background tasks. NOTE: this is disputed because the issues/4929 report is about an intended and supported use case (running arbitrary Bash scripts on behalf of users).", "https://github.com/ARPSyndicate/cvemon https://github.com/badboycxcc/badboycxcc https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-36136", "ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input Deposit Comment.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/GrimTheRipper", "https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-deposit-commend-839d2c587d6e"], ["2022", "CVE-2022-34033", "HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.", "No PoCs found on GitHub currently.", "https://github.com/michaelrsweet/htmldoc/issues/425"], ["2022", "CVE-2022-43552", "A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.", "https://github.com/ARPSyndicate/cvemon https://github.com/a23au/awe-base-images https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/fokypoky/places-list https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-39348", "Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0444", "The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin WordPress plugin before 4.3.6 does not have authorisation and CSRF checks when resetting its settings, allowing unauthenticated attackers to reset them, including generating a new backup encryption key.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b"], ["2022", "CVE-2022-20422", "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1728", "Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519"], ["2022", "CVE-2022-43880", "IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-29181", "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Dec/23 https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/"], ["2022", "CVE-2022-31587", "The yuriyouzhou/KG-fashion-chatbot repository through 2018-05-22 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46377", "An out-of-bounds read vulnerability exists in the PORT command parameter extraction functionality of Weston Embedded uC-FTPs v 1.98.00. A specially-crafted set of network packets can lead to denial of service. An attacker can send packets to trigger this vulnerability.This vulnerability occurs when no IP address argument is provided to the `PORT` command.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681"], ["2022", "CVE-2022-41985", "An authentication bypass vulnerability exists in the Authentication functionality of Weston Embedded uC-FTPs v 1.98.00. A specially crafted set of network packets can lead to authentication bypass and denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680"], ["2022", "CVE-2022-0996", "A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.", "https://github.com/ARPSyndicate/cvemon https://github.com/ByteHackr/389-ds-base", "https://github.com/ByteHackr/389-ds-base"], ["2022", "CVE-2022-23808", "An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Gabriel-Lima232/PHPMyAdmin-5.1.1-PoC https://github.com/Ghostasky/ALLStarRepo https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/anquanscan/sec-tools https://github.com/dipakpanchal05/CVE-2022-23808 https://github.com/dipakpanchal456/CVE-2022-23808 https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/hktalent/TOP https://github.com/johe123qwe/github-trending https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2401", "Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-0695", "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/wtdcode/wtdcode", "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea"], ["2022", "CVE-2022-21391", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47615", "Local File Inclusion vulnerability in LearnPress \u2013 WordPress LMS Plugin <= 4.1.7.3.2 versions.", "https://github.com/RandomRobbieBF/CVE-2022-47615", "No PoCs from references."], ["2022", "CVE-2022-39406", "Vulnerability in the PeopleSoft Enterprise Common Components product of Oracle PeopleSoft (component: Approval Framework). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise Common Components. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise Common Components accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise Common Components accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-28772", "By overlong input values an attacker may force overwrite of the internal program stack in SAP Web Dispatcher - versions 7.53, 7.77, 7.81, 7.85, 7.86, or Internet Communication Manager - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, which makes these programs unavailable, leading to denial of service.", "https://github.com/karimhabush/cyberowl", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-45481", "The default configuration of Lazy Mouse does not require a password, allowing remote unauthenticated users to execute arbitrary code with no prior authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "https://github.com/ARPSyndicate/cvemon https://github.com/M507/nmap-vulnerability-scan-scripts", "https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/"], ["2022", "CVE-2022-45710", "IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1XG-5iSo"], ["2022", "CVE-2022-32271", "In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.", "No PoCs found on GitHub currently.", "https://github.com/Edubr2020/RP_DCP_Code_Exec https://youtu.be/AMODp3iTnqY"], ["2022", "CVE-2022-25409", "Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the demail parameter at /admin-panel1.php.", "No PoCs found on GitHub currently.", "https://github.com/kishan0725/Hospital-Management-System/issues/20"], ["2022", "CVE-2022-4492", "The undertow client is not checking the server identity presented by the server certificate in https connections. This is a compulsory step (at least it should be performed by default) in https and in http/2. I would add it to any TLS client protocol.", "https://github.com/ARPSyndicate/cvemon https://github.com/muneebaashiq/MBProjects https://github.com/srchen1987/springcloud-distributed-transaction", "No PoCs from references."], ["2022", "CVE-2022-4800", "Improper Verification of Source of a Communication Channel in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8"], ["2022", "CVE-2022-22269", "Keeping sensitive data in unprotected BluetoothSettingsProvider prior to SMR Jan-2022 Release 1 allows untrusted applications to get a local Bluetooth MAC address.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1"], ["2022", "CVE-2022-35411", "rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.", "https://github.com/ARPSyndicate/cvemon https://github.com/battleofthebots/system-gateway https://github.com/ehtec/rpcpy-exploit https://github.com/fuzzlove/CVE-2022-35411", "http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html https://medium.com/@elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30"], ["2022", "CVE-2022-24765", "Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\\.git\\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\\Users` if the user profile is located in `C:\\Users\\my-user-name`.", "https://github.com/9069332997/session-1-full-stack https://github.com/ARPSyndicate/cvemon https://github.com/JDimproved/JDim https://github.com/bisdn/bisdn-linux https://github.com/davetang/getting_started_with_git https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/hdclark/Ygor https://github.com/makiuchi-d/act-fail-example https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-42170", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formWifiWpsStart.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md"], ["2022", "CVE-2022-40075", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, form_fast_setting_wifi_set.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1"], ["2022", "CVE-2022-26720", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. A malicious application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37454", "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "https://github.com/ARPSyndicate/cvemon https://github.com/GitHubForSnap/matrix-commander-gael https://github.com/NathanielAPawluk/sec-buddy https://github.com/rveglahn-r7/TEST-snyk-sha3-py-vuln", "https://mouha.be/sha-3-buffer-overflow/"], ["2022", "CVE-2022-25549", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetSysToolDDNS. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ddnsEn parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4"], ["2022", "CVE-2022-41259", "SAP SQL Anywhere - version 17.0, allows an authenticated attacker to prevent legitimate users from accessing a SQL Anywhere database server by crashing the server with some queries that use an ARRAY constructor.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-45650", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the firewallEn parameter in the formSetFirewallCfg function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md"], ["2022", "CVE-2022-23045", "PhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the \"Site title\" parameter while updating the site settings. The \"Site title\" setting is injected in several locations which triggers the XSS.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/osbourne/"], ["2022", "CVE-2022-25458", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the cmdinput parameter in the exeCommand function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/13"], ["2022", "CVE-2022-4752", "The Opening Hours WordPress plugin through 2.3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af"], ["2022", "CVE-2022-30325", "An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The default pre-shared key for the Wi-Fi networks is the same for every router except for the last four digits. The device default pre-shared key for both 2.4 GHz and 5 GHz networks can be guessed or brute-forced by an attacker within range of the Wi-Fi network.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/ https://research.nccgroup.com/?research=Technical+advisories"], ["2022", "CVE-2022-24734", "MyBB is a free and open source forum software. In affected versions the Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type `php` with PHP code, executed on on _Change Settings_ pages. This results in a Remote Code Execution (RCE) vulnerability. The vulnerable module requires Admin CP access with the `Can manage settings?` permission. MyBB's Settings module, which allows administrators to add, edit, and delete non-default settings, stores setting data in an options code string ($options_code; mybb_settings.optionscode database column) that identifies the setting type and its options, separated by a new line character (\\n). In MyBB 1.2.0, support for setting type php was added, for which the remaining part of the options code is PHP code executed on Change Settings pages (reserved for plugins and internal use). MyBB 1.8.30 resolves this issue. There are no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/Altelus1/CVE-2022-24734 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/crac-learning/CVE-analysis-reports https://github.com/k0mi-tg/CVE-POC https://github.com/lavclash75/mybb-CVE-2022-24734 https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html"], ["2022", "CVE-2022-42121", "A SQL injection vulnerability in the Layout module in Liferay Portal 7.1.3 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before service pack 3, and 7.4 GA allows remote authenticated attackers to execute arbitrary SQL commands via a crafted payload injected into a page template's 'Name' field.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17414"], ["2022", "CVE-2022-26631", "Automatic Question Paper Generator v1.0 contains a Time-Based Blind SQL injection vulnerability via the id GET parameter.", "https://github.com/5l1v3r1/CVE-2022-26631 https://github.com/ARPSyndicate/cvemon https://github.com/Cyb3rR3ap3r/CVE-2022-26631 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1037", "The EXMAGE WordPress plugin before 1.0.7 does to ensure that images added via URLs are external images, which could lead to a blind SSRF issue by using local URLs", "https://github.com/ARPSyndicate/cvemon https://github.com/iBLISSLabs/Server-Side-Request-Forgery-SSRF-on-EXMAGE---WordPress-Image-Links", "https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957"], ["2022", "CVE-2022-4851", "Improper Handling of Values in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f"], ["2022", "CVE-2022-3132", "The Goolytics WordPress plugin before 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64"], ["2022", "CVE-2022-31298", "A cross-site scripting vulnerability in the ads comment section of Haraj v3.7 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request.", "https://github.com/ARPSyndicate/cvemon https://github.com/ColordStudio/CVE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigzooooz/CVE-2022-31298 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1177", "Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0.", "https://github.com/zn9988/publications", "No PoCs from references."], ["2022", "CVE-2022-3072", "Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/scgajge12/scgajge12.github.io", "https://huntr.dev/bounties/9755ae6a-b08b-40a0-8089-c723b2d9ca52"], ["2022", "CVE-2022-35500", "Amasty Blog 2.10.3 is vulnerable to Cross Site Scripting (XSS) via leave comment functionality.", "https://github.com/afine-com/CVE-2022-35500 https://github.com/afine-com/research https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-28960", "A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire.", "No PoCs found on GitHub currently.", "https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/"], ["2022", "CVE-2022-37794", "In Library Management System 1.0 the /card/in-card.php file id_no parameters are vulnerable to SQL injection.", "No PoCs found on GitHub currently.", "https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md"], ["2022", "CVE-2022-21280", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-24977", "ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.", "No PoCs found on GitHub currently.", "https://r0.haxors.org/posts?id=8"], ["2022", "CVE-2022-4612", "A vulnerability has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as problematic. This vulnerability affects unknown code. The manipulation leads to insufficiently protected credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216274 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"], ["2022", "CVE-2022-41208", "Due to insufficient input validation, SAP Financial Consolidation - version 1010, allows an authenticated attacker with user privileges to alter current user session. On successful exploitation, the attacker can view or modify information, causing a limited impact on confidentiality and integrity of the application.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41199", "Due to lack of proper memory management, when a victim opens a manipulated Open Inventor File (.iv, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1355", "A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.", "https://github.com/ARPSyndicate/cvemon", "https://gitlab.com/libtiff/libtiff/-/issues/400"], ["2022", "CVE-2022-25839", "The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-URLJS-2414030"], ["2022", "CVE-2022-38459", "A stack-based buffer overflow vulnerability exists in the httpd downfile.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608"], ["2022", "CVE-2022-3250", "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23"], ["2022", "CVE-2022-39836", "An issue was discovered in Connected Vehicle Systems Alliance (COVESA) dlt-daemon through 2.18.8. Due to a faulty DLT file parser, a crafted DLT file that crashes the process can be created. This is due to missing validation checks. There is a heap-based buffer over-read of one byte.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ https://seclists.org/fulldisclosure/2022/Sep/24"], ["2022", "CVE-2022-21333", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4570", "The Top 10 WordPress plugin before 3.2.3 does not validate and escape some of its Block attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef"], ["2022", "CVE-2022-48618", "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.1, watchOS 9.2, iOS 16.2 and iPadOS 16.2, tvOS 16.2. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this issue may have been exploited against versions of iOS released before iOS 15.7.1.", "https://github.com/Ostorlab/KEV https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-48589", "A SQL injection vulnerability exists in the \u201creporting job editor\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48589/"], ["2022", "CVE-2022-0179", "snipe-it is vulnerable to Missing Authorization", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/Haxatron", "https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7"], ["2022", "CVE-2022-21273", "Vulnerability in the Oracle Project Costing product of Oracle E-Business Suite (component: Expenses, Currency Override). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Project Costing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Project Costing accessible data as well as unauthorized access to critical data or complete access to all Oracle Project Costing accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32393", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/cells/view_cell.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md"], ["2022", "CVE-2022-28993", "Multi Store Inventory Management System v1.0 allows attackers to perform an account takeover via a crafted POST request.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html"], ["2022", "CVE-2022-42092", "** DISPUTED ** Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via 'themes' that allows attackers to Remote Code Execution. Note: Third parties dispute this and argue that advanced permissions are required.", "No PoCs found on GitHub currently.", "https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c"], ["2022", "CVE-2022-24687", "HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, and 1.11.2 clusters with at least one Ingress Gateway allow a user with service:write to register a specifically-defined service that can cause Consul servers to panic. Fixed in 1.9.15, 1.10.8, and 1.11.3.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24516", "Microsoft Exchange Server Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26782", "Multiple improper input validation vulnerabilities exists in the libnvram.so nvram_import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted file can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.An improper input validation vulnerability exists in the `httpd`'s `user_define_set_item` function. Controlling the `user_define_timeout` nvram variable can lead to remote code execution.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481"], ["2022", "CVE-2022-1215", "A format string vulnerability was found in libinput", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-25979", "Versions of the package jsuites before 5.0.1 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in the Editor() function.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331 https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764"], ["2022", "CVE-2022-38688", "In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-3310", "Insufficient policy enforcement in custom tabs in Google Chrome on Android prior to 106.0.5249.62 allowed an attacker who convinced the user to install an application to bypass same origin policy via a crafted application. (Chromium security severity: Medium)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28882", "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aegen.dll will go into an infinite loop when unpacking PE files. This eventually leads to scanning engine crash. The exploit can be triggered remotely by an attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-24407", "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-40317", "OpenKM 6.3.11 allows stored XSS related to the javascript: substring in an A element.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/izdiwho/CVE-2022-40317 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1095", "The Mihdan: No External Links WordPress plugin before 5.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b"], ["2022", "CVE-2022-1304", "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.", "https://github.com/1g-v/DevSec_Docker_lab https://github.com/ARPSyndicate/cvemon https://github.com/L-ivan7/-.-DevSec_Docker https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/Thaeimos/aws-eks-image https://github.com/carbonetes/jacked-jenkins https://github.com/cdupuis/image-api https://github.com/flexiondotorg/CNCF-02 https://github.com/fokypoky/places-list https://github.com/gp47/xef-scan-ex02 https://github.com/marklogic/marklogic-kubernetes", "No PoCs from references."], ["2022", "CVE-2022-3201", "Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-47577", "** DISPUTED ** An issue was discovered in the endpoint protection agent in Zoho ManageEngine Device Control Plus 10.1.2228.15. Despite configuring complete restrictions on USB pendrives, USB HDD devices, memory cards, USB connections to mobile devices, etc., it is still possible to bypass the USB restrictions by making use of a virtual machine (VM). This allows a file to be exchanged outside the laptop/system. VMs can be created by any user (even without admin rights). The data exfiltration can occur without any record in the audit trail of Windows events on the host machine. NOTE: the vendor's position is \"it's not a vulnerability in our product.\"", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a"], ["2022", "CVE-2022-21362", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26990", "Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the firewall-local log function via the EmailAddress, SmtpServerName, SmtpUsername, and SmtpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_2/2.md"], ["2022", "CVE-2022-23267", ".NET and Visual Studio Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-32282", "An improper password check exists in the login functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. An attacker that owns a users' password hash will be able to use it to directly login into the account, leading to increased privileges.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545"], ["2022", "CVE-2022-45472", "CAE LearningSpace Enterprise (with Intuity License) image 267r patch 639 allows DOM XSS, related to ontouchmove and onpointerup.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nicbrinkley/CVE-2022-45472 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-28781", "Improper input validation in Settings prior to SMR-May-2022 Release 1 allows attackers to launch arbitrary activity with system privilege. The patch adds proper validation logic to check the caller.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-28410", "Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Users.php?f=delete_agent.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md"], ["2022", "CVE-2022-0128", "vim is vulnerable to Out-of-bounds Read", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba"], ["2022", "CVE-2022-47437", "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Branko Borilovic WSB Brands plugin <=\u00a01.1.8 versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/me2nuk/me2nuk", "No PoCs from references."], ["2022", "CVE-2022-21222", "The package css-what before 2.1.3 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of insecure regular expression in the re_attr variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.", "https://github.com/karimhabush/cyberowl", "https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488"], ["2022", "CVE-2022-32053", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the cloneMac parameter in the function FUN_0041621c.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg"], ["2022", "CVE-2022-23327", "A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).", "https://github.com/demining/Solidity-Forcibly-Send-Ether-Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-28550", "Matthias-Wandel/jhead jhead 3.06 is vulnerable to Buffer Overflow via shellescape(), jhead.c, jhead. jhead copies strings to a stack buffer when it detects a &i or &o. However, jhead does not check the boundary of the stack buffer. As a result, there will be a stack buffer overflow problem when multiple `&i` or `&o` are given.", "https://github.com/ARPSyndicate/cvemon https://github.com/Marsman1996/pocs", "No PoCs from references."], ["2022", "CVE-2022-48649", "In the Linux kernel, the following vulnerability has been resolved:mm/slab_common: fix possible double free of kmem_cacheWhen doing slub_debug test, kfence's 'test_memcache_typesafe_by_rcu'kunit test case cause a use-after-free error: BUG: KASAN: use-after-free in kobject_del+0x14/0x30 Read of size 8 at addr ffff888007679090 by task kunit_try_catch/261 CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.0.0-rc5-next-20220916 #17 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace: dump_stack_lvl+0x34/0x48 print_address_description.constprop.0+0x87/0x2a5 print_report+0x103/0x1ed kasan_report+0xb7/0x140 kobject_del+0x14/0x30 kmem_cache_destroy+0x130/0x170 test_exit+0x1a/0x30 kunit_try_run_case+0xad/0xc0 kunit_generic_run_threadfn_adapter+0x26/0x50 kthread+0x17b/0x1b0 The cause is inside kmem_cache_destroy():kmem_cache_destroy acquire lock/mutex shutdown_cache schedule_work(kmem_cache_release) (if RCU flag set) release lock/mutex kmem_cache_release (if RCU flag not set)In some certain timing, the scheduled work could be run beforethe next RCU flag checking, which can then get a wrong valueand lead to double kmem_cache_release().Fix it by caching the RCU flag inside protected area, just like 'refcnt'", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-46858", "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Amin A.Rezapour Product Specifications for Woocommerce plugin <=\u00a00.6.0 versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/me2nuk/me2nuk", "No PoCs from references."], ["2022", "CVE-2022-1244", "heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82"], ["2022", "CVE-2022-26442", "In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420051; Issue ID: GN20220420051.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-35534", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_multi_ssidshtml-command-injection-in-wirelesscgi"], ["2022", "CVE-2022-42055", "Multiple command injection vulnerabilities in GL.iNet GoodCloud IoT Device Management System Version 1.00.220412.00 via the ping and traceroute tools allow attackers to read arbitrary files on the system.", "No PoCs found on GitHub currently.", "https://boschko.ca/glinet-router"], ["2022", "CVE-2022-40150", "Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4626", "The PPWP WordPress plugin before 1.8.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d"], ["2022", "CVE-2022-21125", "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/codexlynx/hardware-attacks-state-of-the-art", "No PoCs from references."], ["2022", "CVE-2022-45635", "An issue discovered in MEGAFEIS, BOFEI DBD+ Application for IOS & Android v1.4.4 allows attacker to gain access to sensitive account information via insecure password policy.", "https://github.com/ARPSyndicate/cvemon https://github.com/WithSecureLabs/megafeis-palm", "https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635"], ["2022", "CVE-2022-32214", "The llhttp parser https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24803", "Asciidoctor-include-ext is Asciidoctor\u2019s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-34718", "Windows TCP/IP Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ascotbe/Kernelhub https://github.com/BC-SECURITY/Moriarty https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SecLabResearchBV/CVE-2022-34718-PoC https://github.com/WhooAmii/POC_to_review https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/numencyber/VulnerabilityPoC https://github.com/numencyber/Vulnerability_PoC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27569", "Heap-based buffer overflow vulnerability in parser_infe function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-20098", "In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06419017.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-1003", "One of the API in Mattermost version 6.3.0 and earlier fails to properly protect the permissions, which allows the system administrators to combine the two distinct privileges/capabilities in a way that allows them to override certain restricted configurations like EnableUploads.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-1392", "The Videos sync PDF WordPress plugin through 1.7.4 does not validate the p parameter before using it in an include statement, which could lead to Local File Inclusion issues", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://packetstormsecurity.com/files/166534/ https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815"], ["2022", "CVE-2022-3106", "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9"], ["2022", "CVE-2022-3297", "Use After Free in GitHub repository vim/vim prior to 9.0.0579.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c"], ["2022", "CVE-2022-4865", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be"], ["2022", "CVE-2022-24491", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/corelight/CVE-2022-24491 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-42284", "NVIDIA BMC stores user passwords in an obfuscated form in a database accessible by the host. This may lead to a credentials exposure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-40010", "Tenda AC6 AC1200 Smart Dual-Band WiFi Router 15.03.06.50_multi was discovered to contain a cross-site scripting (XSS) vulnerability via the deviceId parameter in the Parental Control module.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html"], ["2022", "CVE-2022-1112", "The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505"], ["2022", "CVE-2022-1283", "NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013"], ["2022", "CVE-2022-3017", "Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0"], ["2022", "CVE-2022-24611", "Denial of Service (DoS) in the Z-Wave S0 NonceGet protocol specification in Silicon Labs Z-Wave 500 series allows local attackers to block S0/S2 protected Z-Wave network via crafted S0 NonceGet Z-Wave packages, utilizing included but absent NodeIDs.", "https://github.com/ARPSyndicate/cvemon https://github.com/ITSecLab-HSEL/CVE-2022-24611 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28905", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the devicemac parameter in /setting/setDeviceName.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/1"], ["2022", "CVE-2022-42004", "In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.", "https://github.com/ARPSyndicate/cvemon https://github.com/CycloneDX/sbom-utility https://github.com/VeerMuchandi/s3c-springboot-demo https://github.com/averemee-si/oracdc https://github.com/aws/aws-msk-iam-auth https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9 https://github.com/mosaic-hgw/WildFly https://github.com/scordero1234/java_sec_demo-main https://github.com/seal-community/patches https://github.com/sr-monika/sprint-rest", "No PoCs from references."], ["2022", "CVE-2022-40101", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-26714", "A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26485", "Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mistymntncop/CVE-2022-26485 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-45664", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDget function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md"], ["2022", "CVE-2022-23071", "In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the \u201cImport Recipe\u201d functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23071"], ["2022", "CVE-2022-32094", "Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the loginid parameter at doctorlogin.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-34609", "H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the INTF parameter at /doping.asp.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/9"], ["2022", "CVE-2022-34598", "The udpserver in H3C Magic R100 V200R004 and V100R005 has the 9034 port opened, allowing attackers to execute arbitrary commands.", "https://github.com/ARPSyndicate/cvemon https://github.com/ilovekeer/IOT_Vul https://github.com/wjlin0/poc-doc https://github.com/wy876/POC https://github.com/wy876/wiki https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-4677", "The Leaflet Maps Marker WordPress plugin before 3.12.7 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e"], ["2022", "CVE-2022-32245", "SAP BusinessObjects Business Intelligence Platform (Open Document) - versions 420, 430, allows an unauthenticated attacker to retrieve sensitive information plain text over the network. On successful exploitation, the attacker can view any data available for a business user and put load on the application by an automated attack. Thus, completely compromising confidentiality but causing a limited impact on the availability of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-23131", "In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).", "https://github.com/0day404/vulnerability-poc https://github.com/0tt7/CVE-2022-23131 https://github.com/1mxml/CVE-2022-23131 https://github.com/1mxml/CVE-2022-26138 https://github.com/20142995/Goby https://github.com/20142995/pocsuite3 https://github.com/20142995/sectool https://github.com/2lambda123/zw1tt3r1on-Nuclei-Templates-Collection https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ArrestX/--POC https://github.com/Arrnitage/CVE-2022-23131_exp https://github.com/Awrrays/FrameVul https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Fa1c0n35/zabbix-cve-2022-23131 https://github.com/GhostTroops/TOP https://github.com/HimmelAward/Goby_POC https://github.com/JERRY123S/all-poc https://github.com/KayCHENvip/vulnerability-poc https://github.com/Kazaf6s/CVE-2022-23131 https://github.com/L0ading-x/cve-2022-23131 https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Mr-xn/cve-2022-23131 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix- https://github.com/SYRTI/POC_to_review https://github.com/Shakilll/nulcei-templates-collection https://github.com/Threekiii/Awesome-POC https://github.com/Vulnmachines/Zabbix-CVE-2022-23131 https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/ad-calcium/vuln_script https://github.com/binganao/vulns-2022 https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/cybershadowvps/Nuclei-Templates-Collection https://github.com/d4n-sec/d4n-sec.github.io https://github.com/emadshanab/Nuclei-Templates-Collection https://github.com/getdrive/PoC https://github.com/h0tak88r/nuclei_templates https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/iluaster/getdrive_PoC https://github.com/jbmihoub/all-poc https://github.com/jweny/CVE-2022-23131 https://github.com/jweny/zabbix-saml-bypass-exp https://github.com/k0mi-tg/CVE-POC https://github.com/kh4sh3i/CVE-2022-23131 https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/murchie85/twitterCyberMonitor https://github.com/nirsarkar/Nuclei-Templates-Collection https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pykiller/CVE-2022-23131 https://github.com/r10lab/CVE-2022-23131 https://github.com/random-robbie/cve-2022-23131-exp https://github.com/shavchen/CVE-2022-26138 https://github.com/soosmile/POC https://github.com/tanjiti/sec_profile https://github.com/trganda/CVE-2022-23131 https://github.com/trganda/dockerv https://github.com/trhacknon/CVE-2022-23131 https://github.com/trhacknon/Pocingit https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/wr0x00/cve-2022-23131 https://github.com/xm1k3/cent https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zwjjustdoit/cve-2022-23131", "No PoCs from references."], ["2022", "CVE-2022-24751", "Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1052", "Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.", "https://github.com/ARPSyndicate/cvemon https://github.com/cybercti/maapi", "https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7"], ["2022", "CVE-2022-4834", "The CPT Bootstrap Carousel WordPress plugin through 1.12 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5"], ["2022", "CVE-2022-4515", "A flaw was found in Exuberant Ctags in the way it handles the \"-o\" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.", "https://github.com/ARPSyndicate/cvemon https://github.com/Richard740v432yz764/fork https://github.com/universal-ctags/ctags", "No PoCs from references."], ["2022", "CVE-2022-37801", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the list parameter at the function formSetQosBand.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9"], ["2022", "CVE-2022-21216", "Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21187", "The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.", "https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204"], ["2022", "CVE-2022-23082", "In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.", "https://github.com/ARPSyndicate/cvemon", "https://www.mend.io/vulnerability-database/CVE-2022-23082"], ["2022", "CVE-2022-45506", "Tenda W30E v1.0.1.25(633) was discovered to contain a command injection vulnerability via the fileNameMit parameter at /goform/delFileName.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md"], ["2022", "CVE-2022-2388", "The WP Coder WordPress plugin before 2.5.3 does not have CSRF check in place when deleting code created by the plugin, which could allow attackers to make a logged in admin delete arbitrary ones via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb"], ["2022", "CVE-2022-2019", "A vulnerability classified as critical was found in SourceCodester Prison Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php?f=save of the component New User Creation. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md https://vuldb.com/?id.201367"], ["2022", "CVE-2022-45697", "Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when handling files in the Accounts directory.", "https://github.com/ARPSyndicate/cvemon https://github.com/Wh04m1001/CVE", "https://github.com/Wh04m1001/CVE"], ["2022", "CVE-2022-47891", "All versions of NetMan 204 allow an attacker that knows the MAC and serial number of the device to reset the administrator password via the legitimate recovery function.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-1270", "In GraphicsMagick, a heap buffer overflow was found when parsing MIFF.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29599", "In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.", "https://github.com/emilywang0/CVE_testing_VULN https://github.com/emilywang0/MergeBase_test_vuln https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-29608", "An issue was discovered in ONOS 2.5.1. An intent with a port that is an intermediate point of its path installs an invalid flow rule, causing a network loop.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3235", "Use After Free in GitHub repository vim/vim prior to 9.0.0490.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af"], ["2022", "CVE-2022-24433", "The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.", "https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245 https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199"], ["2022", "CVE-2022-21356", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23253", "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nettitude/CVE-2022-23253-PoC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-35844", "An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to commands of the certificate import feature.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28424", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/posts.php&find=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-21247", "Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Session, Execute Catalog Role privilege with network access via Oracle Net to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Core RDBMS accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32036", "Tenda M3 V1.0.0.12 was discovered to contain multiple stack overflow vulnerabilities via the ssidList, storeName, and trademark parameters in the function formSetStoreWeb.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb"], ["2022", "CVE-2022-23342", "The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase releases 21.1.1.1000 through 21.1.15.1000 are vulnerable to a username enumeration vulnerability. An attacker can obtain valid users based on the response returned for invalid and valid users by sending a POST login request to the /mobilebroker/ServiceToBroker.svc/Json/Connect endpoint. This can lead to user enumeration against the underlying Active Directory integrated systems.", "https://github.com/ARPSyndicate/cvemon https://github.com/InitRoot/CVE-2022-23342 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/InitRoot/CVE-2022-23342"], ["2022", "CVE-2022-2048", "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.", "https://github.com/ARPSyndicate/cvemon https://github.com/m3n0sd0n4ld/uCVE https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-45557", "Cross site scripting (XSS) vulnerability in Hundredrabbits Left 7.1.5 for MacOS allows attackers to execute arbitrary code via file names.", "No PoCs found on GitHub currently.", "https://github.com/hundredrabbits/Left/issues/167"], ["2022", "CVE-2022-4544", "The MashShare WordPress plugin before 3.8.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c"], ["2022", "CVE-2022-44938", "Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.", "No PoCs found on GitHub currently.", "https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/"], ["2022", "CVE-2022-1221", "The Gwyn's Imagemap Selector WordPress plugin through 0.3.3 does not sanitise and escape some parameters before outputting them back in attributes, leading to a Reflected Cross-Site Scripting.", "https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9"], ["2022", "CVE-2022-27848", "Authenticated (admin+ user) Stored Cross-Site Scripting (XSS) in Modern Events Calendar Lite (WordPress plugin) <= 6.5.1", "https://github.com/ARPSyndicate/cvemon https://github.com/daffainfo/CVE https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29659", "Responsive Online Blog v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at single.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt"], ["2022", "CVE-2022-3324", "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.", "https://github.com/denis-jdsouza/wazuh-vulnerability-report-maker", "https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c"], ["2022", "CVE-2022-39802", "SAP Manufacturing Execution - versions 15.1, 15.2, 15.3, allows an attacker to exploit insufficient validation of a file path request parameter. The intended file path can be manipulated to allow arbitrary traversal of directories on the remote server. The file content within each directory can be read which may lead to information disclosure.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/redrays-io/CVE-2022-39802 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-42277", "NVIDIA DGX Station contains a vulnerability in SBIOS in the SmiFlash, where a local user with elevated privileges can read, write and erase flash, which may lead to code execution, escalation of privileges, denial of service, and information disclosure. The scope of impact can extend to other components.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-4896", "Cyber Control, in its 1.650 version, is affected by a vulnerability\u00a0in the generation on the server of pop-up windows with the messages \"PNTMEDIDAS\", \"PEDIR\", \"HAYDISCOA\" or \"SPOOLER\". A complete denial of service can be achieved by sending multiple requests simultaneously on a core.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sapellaniz/CVE-2022-4896", "No PoCs from references."], ["2022", "CVE-2022-4795", "The Galleries by Angie Makes WordPress plugin through 1.67 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639"], ["2022", "CVE-2022-21307", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30073", "WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via /admin/users/save.php.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-23202", "Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must download a malicious DLL file. The attacker has to deliver the DLL on the same folder as the installer which makes it as a high complexity attack vector.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-32176", "In \"Gin-Vue-Admin\", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the \"Compress Upload\" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32176"], ["2022", "CVE-2022-2299", "The Allow SVG Files WordPress plugin through 1.1 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9"], ["2022", "CVE-2022-37773", "An authenticated SQL Injection vulnerability in the statistics page (/statistics/retrieve) of Maarch RM 2.8, via the filter parameter, allows the complete disclosure of all databases.", "https://github.com/frame84/vulns", "No PoCs from references."], ["2022", "CVE-2022-24693", "Baicells Nova436Q and Neutrino 430 devices with firmware through QRTB 2.7.8 have hardcoded credentials that are easily discovered, and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/lukejenkins/CVE-2022-24693 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28987", "Zoho ManageEngine ADSelfService Plus before 6202 allows attackers to perform username enumeration via a crafted POST request to /ServletAPI/accounts/login.", "No PoCs found on GitHub currently.", "https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md"], ["2022", "CVE-2022-42086", "Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function TendaAteMode.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md"], ["2022", "CVE-2022-34988", "Inout Blockchain AltExchanger v1.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/js.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js"], ["2022", "CVE-2022-1201", "NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b"], ["2022", "CVE-2022-2068", "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).", "https://github.com/ARPSyndicate/cvemon https://github.com/backloop-biz/CVE_checks https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/jntass/TASSL-1.1.1 https://github.com/mawinkler/c1-cs-scan-result https://github.com/tianocore-docs/ThirdPartySecurityAdvisories", "No PoCs from references."], ["2022", "CVE-2022-24990", "TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending \"User-Agent: TNAS\" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response.", "https://github.com/0day404/vulnerability-poc https://github.com/0xf4n9x/CVE-2022-24990 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ArrestX/--POC https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP- https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/VVeakee/CVE-2022-24990-POC https://github.com/WhooAmii/POC_to_review https://github.com/antx-code/CVE-2022-24990 https://github.com/d4n-sec/d4n-sec.github.io https://github.com/h00die-gr3y/Metasploit https://github.com/jsongmax/terraMaster-CVE-2022-24990 https://github.com/k0mi-tg/CVE-POC https://github.com/lishang520/CVE-2022-24990 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html"], ["2022", "CVE-2022-32387", "In Kentico before 13.0.66, attackers can achieve Denial of Service via a crafted request to the GetResource handler.", "No PoCs found on GitHub currently.", "https://devnet.kentico.com/download/hotfixes"], ["2022", "CVE-2022-35975", "The GitOps Tools Extension for VSCode can make it easier to manage Flux objects. A specially crafted Flux object may allow for remote code execution in the machine running the extension, in the context of the user that is running VSCode. Users using the VSCode extension to manage clusters that are shared amongst other users are affected by this issue. The only safe mitigation is to update to the latest version of the extension.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21267", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Pipeline Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Communications Billing and Revenue Management executes to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Billing and Revenue Management accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30113", "Electronic mall system 1.0_build20200203 is affected vulnerable to SQL Injection.", "https://github.com/lemonlove7/lemonlove7", "No PoCs from references."], ["2022", "CVE-2022-2128", "Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ec40ec76-c7db-4384-a33b-024f3dd21d75"], ["2022", "CVE-2022-23222", "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.", "https://github.com/0day404/vulnerability-poc https://github.com/0xsmirk/vehicle-kernel-exploit https://github.com/ARPSyndicate/cvemon https://github.com/Al1ex/LinuxEelvation https://github.com/ArrestX/--POC https://github.com/Awrrays/Pentest-Tips https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Ch4nc3n/PublicExploitation https://github.com/FridayOrtiz/CVE-2022-23222 https://github.com/GhostTroops/TOP https://github.com/JERRY123S/all-poc https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/KayCHENvip/vulnerability-poc https://github.com/LeoMarche/ProjetSecu https://github.com/Metarget/metarget https://github.com/Miraitowa70/POC-Notes https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/PenteraIO/CVE-2022-23222-POC https://github.com/PyterSmithDarkGhost/EXPLOITCVE-2022-23222 https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/cookiengineer/groot https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/d4n-sec/d4n-sec.github.io https://github.com/hardenedvault/ved https://github.com/hktalent/TOP https://github.com/intel/linux-kernel-dcp https://github.com/isabella232/linux-kernel-dcp https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/kenplusplus/linux-kernel-dcp https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/makoto56/penetration-suite-toolkit https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sapphire1896/xnu-linux https://github.com/smile-e3/vehicle-kernel-exploit https://github.com/ssr-111/linux-kernel-exploitation https://github.com/taielab/awesome-hacking-lists https://github.com/tr3ee/CVE-2022-23222 https://github.com/trhacknon/Pocingit https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/wxrdnx/bpf_exploit_template https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zzcentury/PublicExploitation", "No PoCs from references."], ["2022", "CVE-2022-30053", "In Toll Tax Management System 1.0, the id parameter appears to be vulnerable to SQL injection attacks.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System"], ["2022", "CVE-2022-21327", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47532", "FileRun 20220519 allows SQL Injection via the \"dir\" parameter in a /?module=users§ion=cpanel&page=list request.", "No PoCs found on GitHub currently.", "https://herolab.usd.de/security-advisories/usd-2022-0064/"], ["2022", "CVE-2022-24442", "JetBrains YouTrack before 2021.4.40426 was vulnerable to SSTI (Server-Side Template Injection) via FreeMarker templates.", "https://github.com/mbadanoiu/CVE-2022-24442", "No PoCs from references."], ["2022", "CVE-2022-39822", "In NOKIA NFM-T R19.9, a SQL Injection vulnerability occurs in /cgi-bin/R19.9/easy1350.pl of the VM Manager WebUI via the id or host HTTP GET parameter. An authenticated attacker is required for exploitation.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42257", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure, data tampering or denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-3355", "Cross-site Scripting (XSS) - Stored in GitHub repository inventree/inventree prior to 0.8.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6"], ["2022", "CVE-2022-27839", "Improper authentication vulnerability in SecretMode in Samsung Internet prior to version 16.2.1 allows attackers to access bookmark tab without proper credentials.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1250", "The LifterLMS PayPal WordPress plugin before 1.4.0 does not sanitise and escape some parameters from the payment confirmation page before outputting them back in the page, leading to a Reflected Cross-Site Scripting issue", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718"], ["2022", "CVE-2022-45526", "SQL Injection vulnerability in Future-Depth Institutional Management Website (IMS) 1.0, allows attackers to execute arbitrary commands via the ad parameter to /admin_area/login_transfer.php.", "No PoCs found on GitHub currently.", "https://github.com/Future-Depth/IMS/issues/1"], ["2022", "CVE-2022-32047", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc parameter in the function FUN_00412ef4.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules"], ["2022", "CVE-2022-21236", "An information disclosure vulnerability exists due to a web server misconfiguration in the Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446"], ["2022", "CVE-2022-37821", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the ProvinceCode parameter in the function formSetProvince.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6"], ["2022", "CVE-2022-44949", "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Short Name field.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/12"], ["2022", "CVE-2022-4475", "The Collapse-O-Matic WordPress plugin before 1.8.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5"], ["2022", "CVE-2022-28795", "A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari.", "No PoCs found on GitHub currently.", "https://support.norton.com/sp/static/external/tools/security-advisories.html"], ["2022", "CVE-2022-32296", "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", "https://github.com/0xkol/rfc6056-device-tracker https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9"], ["2022", "CVE-2022-21376", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-40303", "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-24782", "Discourse is an open source discussion platform. Versions 2.8.2 and prior in the `stable` branch, 2.9.0.beta3 and prior in the `beta` branch, and 2.9.0.beta3 and prior in the `tests-passed` branch are vulnerable to a data leak. Users can request an export of their own activity. Sometimes, due to category settings, they may have category membership for a secure category. The name of this secure category is shown to the user in the export. The same thing occurs when the user's post has been moved to a secure category. A patch for this issue is available in the `main` branch of Discourse's GitHub repository and is anticipated to be part of future releases.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42206", "PHPGurukul Hospital Management System In PHP V 4.0 is vulnerable to Cross Site Scripting (XSS) via doctor/view-patient.php, admin/view-patient.php, and view-medhistory.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/riccardo-nannini/CVE", "No PoCs from references."], ["2022", "CVE-2022-28896", "A command injection vulnerability in the component /setnetworksettings/SubnetMask of D-Link DIR882 DIR882A1_FW130B06 allows attackers to escalate privileges to root via a crafted payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/2 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-3215", "NIOHTTP1 and projects using it for generating HTTP responses can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines to their input (usually in encoded form) and \"inject\" those newlines into the returned HTTP response. This capability allows users to work around security headers and HTTP/1.1 framing headers by injecting entirely false responses or other new headers. The injected false responses may also be treated as the response to subsequent requests, which can lead to XSS, cache poisoning, and a number of other flaws. This issue was resolved by adding validation to the HTTPHeaders type, ensuring that there's no whitespace incorrectly present in the HTTP headers provided by users. As the existing API surface is non-failable, all invalid characters are replaced by linear whitespace.", "https://github.com/dellalibera/dellalibera", "No PoCs from references."], ["2022", "CVE-2022-27979", "A cross-site scripting (XSS) vulnerability in ToolJet v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comment Body component.", "https://github.com/fourcube/security-advisories", "https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md"], ["2022", "CVE-2022-1081", "A vulnerability was found in SourceCodester Microfinance Management System 1.0. It has been declared as problematic. This vulnerability affects the file /mims/app/addcustomerHandler.php. The manipulation of the argument first_name, middle_name, and surname leads to cross site scripting. The attack can be initiated remotely.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.195640"], ["2022", "CVE-2022-1310", "Use after free in regular expressions in Google Chrome prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/rycbar77/V8Exploits https://github.com/singularseclab/Browser_Exploits https://github.com/wh1ant/vulnjs", "No PoCs from references."], ["2022", "CVE-2022-27458", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28099"], ["2022", "CVE-2022-4657", "The Restaurant Menu WordPress plugin before 2.3.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3"], ["2022", "CVE-2022-32325", "JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc https://github.com/adegoodyer/kubernetes-admin-toolkit", "No PoCs from references."], ["2022", "CVE-2022-23051", "PeteReport Version 0.5 allows an authenticated admin user to inject persistent JavaScript code while adding an 'Attack Tree' by modifying the 'svg_file' parameter.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/brown/"], ["2022", "CVE-2022-24932", "Improper Protection of Alternate Path vulnerability in Setup wizard process prior to SMR Mar-2022 Release 1 allows physical attacker package installation before finishing Setup wizard.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-45644", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the formSetClientState function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md"], ["2022", "CVE-2022-21154", "An integer overflow vulnerability exists in the fltSaveCMP functionality of Leadtools 22. A specially-crafted BMP file can lead to an integer overflow, that in turn causes a buffer overflow. An attacker can provide a malicious BMP file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464"], ["2022", "CVE-2022-40121", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search parameter at /net-banking/manage_customers.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection8.md https://github.com/zakee94/online-banking-system/issues/12"], ["2022", "CVE-2022-3037", "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5"], ["2022", "CVE-2022-4814", "Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4"], ["2022", "CVE-2022-26674", "ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28865", "An issue was discovered in Nokia NetAct 22 through the Site Configuration Tool website section. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42164", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md"], ["2022", "CVE-2022-24771", "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/MaySoMusician/geidai-ikoi https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35405", "Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AdamCrosser/awesome-vuln-writeups https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/UNC1739/awesome-vulnerability-research https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/viniciuspereiras/CVE-2022-35405 https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html"], ["2022", "CVE-2022-23280", "Microsoft Outlook for Mac Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/RonnieSalomonsen/My-CVEs", "No PoCs from references."], ["2022", "CVE-2022-39412", "Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: Admin Console). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Access Manager accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-21385", "A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea010070d0a7497253d5a6f919f6dd107450b31a"], ["2022", "CVE-2022-27518", "Unauthenticated remote arbitrary code execution", "https://github.com/ARPSyndicate/cvemon https://github.com/H4lo/awesome-IoT-security-article https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Smarttech247PT/citrix_fgateway_fingerprint https://github.com/dolby360/CVE-2022-27518_POC https://github.com/ipcis/Citrix_ADC_Gateway_Check https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/securekomodo/citrixInspector https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-4486", "The Meteor Slides WordPress plugin before 1.5.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b"], ["2022", "CVE-2022-4717", "The Strong Testimonials WordPress plugin before 3.0.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672"], ["2022", "CVE-2022-24963", "Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.This issue affects Apache Portable Runtime (APR) version 1.7.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/a23au/awe-base-images https://github.com/stkcat/awe-base-images", "No PoCs from references."], ["2022", "CVE-2022-23000", "The Western Digital My Cloud Web App [https://os5.mycloud.com/] uses a weak SSLContext when attempting to configure port forwarding rules. This was enabled to maintain compatibility with old or outdated home routers. By using an \"SSL\" context instead of \"TLS\" or specifying stronger validation, deprecated or insecure protocols are permitted. As a result, a local user with no privileges can exploit this vulnerability and jeopardize the integrity, confidentiality and authenticity of information transmitted. The scope of impact cannot extend to other components and no user input is required to exploit this vulnerability.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114"], ["2022", "CVE-2022-28677", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16663.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-30271", "The Motorola ACE1000 RTU through 2022-05-02 ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no private-key file exists. Thus, this hardcoded key is likely to be used by default.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-21294", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4597", "A vulnerability, which was classified as problematic, was found in Shoplazza LifeStyle 1.1. Affected is an unknown function of the file /admin/api/admin/v2_products of the component Create Product Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216192.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Dec/11"], ["2022", "CVE-2022-4606", "PHP Remote File Inclusion in GitHub repository flatpressblog/flatpress prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95"], ["2022", "CVE-2022-34678", "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause a null-pointer dereference, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-1163", "Cross-site Scripting (XSS) - Stored in GitHub repository mineweb/minewebcms prior to next.", "https://github.com/ARPSyndicate/cvemon https://github.com/AggressiveUser/AggressiveUser https://github.com/AggressiveUser/AggressiveUser.github.io", "http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149 https://www.exploit-db.com/exploits/50853"], ["2022", "CVE-2022-45916", "ILIAS before 7.16 allows XSS.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html http://seclists.org/fulldisclosure/2022/Dec/7 https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/"], ["2022", "CVE-2022-4845", "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b"], ["2022", "CVE-2022-3126", "The Frontend File Manager Plugin WordPress plugin before 21.4 does not have CSRF check when uploading files, which could allow attackers to make logged in users upload files on their behalf", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8"], ["2022", "CVE-2022-1023", "The Podcast Importer SecondLine WordPress plugin before 1.3.8 does not sanitise and properly escape some imported data, which could allow SQL injection attacks to be performed by imported a malicious podcast file", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48"], ["2022", "CVE-2022-4746", "The FluentAuth WordPress plugin before 1.0.2 prioritizes getting a visitor's IP address from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass the IP-based blocks set by the plugin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32"], ["2022", "CVE-2022-24823", "Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.", "https://github.com/ARPSyndicate/cvemon https://github.com/antonycc/ondemand-neo4j https://github.com/aws/aws-msk-iam-auth https://github.com/cezapata/appconfiguration-sample https://github.com/karimhabush/cyberowl https://github.com/sr-monika/sprint-rest", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-28737", "There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/ozun215/shim-review https://github.com/puzzleos/uefi-shim_review https://github.com/rhboot/shim-review https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-26926", "Windows Address Book Remote Code Execution Vulnerability", "https://github.com/VulnerabilityResearchCentre/patch-diffing-in-the-dark", "No PoCs from references."], ["2022", "CVE-2022-35850", "An improper neutralization of script-related HTML tags in a web page vulnerability [CWE-80] in FortiAuthenticator versions 6.4.0 through 6.4.4, 6.3.0 through 6.3.3, all versions of 6.2 and 6.1 may allow a remote unauthenticated attacker to trigger a reflected cross site scripting (XSS) attack via the \"reset-password\" page.", "https://github.com/lean0x2F/lean0x2f.github.io", "No PoCs from references."], ["2022", "CVE-2022-37955", "Windows Group Policy Elevation of Privilege Vulnerability", "https://github.com/CsEnox/SeManageVolumeExploit https://github.com/puckiestyle/SeManageVolumeExploit", "No PoCs from references."], ["2022", "CVE-2022-30036", "MA Lighting grandMA2 Light has a password of root for the root account. NOTE: The vendor's position is that the product was designed for isolated networks. Also, the successor product, grandMA3, is not affected by this vulnerability.", "No PoCs found on GitHub currently.", "https://parzival.sh/posts/Pwning-a-Lighting-Console-in-a-Few-Minutes/"], ["2022", "CVE-2022-21342", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4441", "Incorrect Privilege Assignment vulnerability in Hitachi Storage Plug-in for VMware vCenter allows remote authenticated users to cause privilege escalation. This issue affects Hitachi Storage Plug-in for VMware vCenter: from 04.9.0 before 04.9.1.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3221", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d"], ["2022", "CVE-2022-25848", "This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory.", "No PoCs found on GitHub currently.", "https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917"], ["2022", "CVE-2022-1324", "The Event Timeline WordPress plugin through 1.1.5 does not sanitize and escape Timeline Text, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd"], ["2022", "CVE-2022-40337", "OASES (aka Open Aviation Strategic Engineering System) 8.8.0.2 allows attackers to execute arbitrary code via the Open Print Folder menu.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-40277", "Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.", "No PoCs found on GitHub currently.", "https://github.com/laurent22/joplin"], ["2022", "CVE-2022-35582", "Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control.", "No PoCs found on GitHub currently.", "https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb"], ["2022", "CVE-2022-45980", "Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via /goform/SysToolRestoreSet .", "No PoCs found on GitHub currently.", "https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6"], ["2022", "CVE-2022-38568", "Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overflow vulnerability in the function formSetFixTools. This vulnerability allows attackers to cause a Denial of Service (DoS) via the hostname parameter.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname"], ["2022", "CVE-2022-25908", "All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953"], ["2022", "CVE-2022-1264", "The affected product may allow an attacker with access to the Ignition web configuration to run arbitrary code.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4690", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335"], ["2022", "CVE-2022-45512", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeEmailFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md"], ["2022", "CVE-2022-23307", "CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/GavinStevensHoboken/log4j https://github.com/HynekPetrak/log4shell-finder https://github.com/OWASP/www-project-ide-vulscanner https://github.com/Pranshu021/cve_details_fetch https://github.com/RihanaDave/logging-log4j1-main https://github.com/Schnitker/log4j-min https://github.com/albert-liu435/logging-log4j-1_2_17 https://github.com/apache/logging-log4j1 https://github.com/averemee-si/oracdc https://github.com/buluma/ansible-role-cve_2022-23307 https://github.com/buluma/buluma https://github.com/buluma/crazy-max https://github.com/cybersheepdog/Analyst-Tool https://github.com/davejwilson/azure-spark-pools-log4j https://github.com/lel99999/dev_MesosRI https://github.com/logpresso/CVE-2021-44228-Scanner https://github.com/ltslog/ltslog https://github.com/scopion/ansible-role-cve_2022-23307 https://github.com/thl-cmk/CVE-log4j-check_mk-plugin https://github.com/trhacknon/CVE-2021-44228-Scanner https://github.com/trhacknon/log4shell-finder https://github.com/whitesource/log4j-detect-distribution", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-32073", "WolfSSH v1.4.7 was discovered to contain an integer overflow via the function wolfSSH_SFTP_RecvRMDIR.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mgregus/project_BIT_nmap_script https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-35910", "In Jellyfin before 10.8, stored XSS allows theft of an admin access token.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30176", "Azure RTOS GUIX Studio Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37815", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the PPPOEPassword parameter in the function formQuickIndex.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18"], ["2022", "CVE-2022-4781", "The Accordion Shortcodes WordPress plugin through 2.4.2 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d"], ["2022", "CVE-2022-45403", "Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30067", "GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a crafted XCF file, the program will allocate for a huge amount of memory, resulting in insufficient memory or program crash.", "https://github.com/ARPSyndicate/cvemon https://github.com/Tonaram/DSS-BufferOverflow", "https://gitlab.gnome.org/GNOME/gimp/-/issues/8120"], ["2022", "CVE-2022-21313", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0388", "The Interactive Medical Drawing of Human Body WordPress plugin before 2.6 does not sanitise and escape the Link field, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced"], ["2022", "CVE-2022-35493", "A Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS", "https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md"], ["2022", "CVE-2022-35702", "Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39816", "In NOKIA 1350 OMS R14.2, Insufficiently Protected Credentials (cleartext administrator password) occur in the edit configuration page. Exploitation requires an authenticated attacker.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-42263", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an Integer overflow may lead to denial of service or information disclosure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-45891", "Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList).", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-4882", "A vulnerability was found in kaltura mwEmbed up to 2.91. It has been rated as problematic. Affected by this issue is some unknown functionality of the file modules/KalturaSupport/components/share/share.js of the component Share Plugin. The manipulation of the argument res leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.92.rc1 is able to address this issue. The name of the patch is 4f11b6f6610acd6d89de5f8be47cf7c610643845. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217664.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.217664"], ["2022", "CVE-2022-25819", "OOB read vulnerability in hdcp2 device node prior to SMR Mar-2022 Release 1 allow an attacker to view Kernel stack memory.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-1235", "Weak secrethash can be brute-forced in GitHub repository livehelperchat/livehelperchat prior to 3.96.", "https://github.com/ARPSyndicate/cvemon https://github.com/clearbluejar/cve-markdown-charts", "https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705"], ["2022", "CVE-2022-35642", "\"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227592.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/DojoSecurity/DojoSecurity https://github.com/afine-com/research https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28521", "ZCMS v20170206 was discovered to contain a file inclusion vulnerability via index.php?m=home&c=home&a=sp_set_config.", "No PoCs found on GitHub currently.", "https://github.com/zhendezuile/bug_report/blob/main/zcms%EF%BC%9Aphp%20file%20inclusion"], ["2022", "CVE-2022-45543", "Cross site scripting (XSS) vulnerability in DiscuzX 3.4 allows attackers to execute arbitrary code via the datetline, title, tpp, or username parameters via the audit search.", "https://github.com/Srpopty/Corax https://github.com/TheKingOfDuck/SBCVE", "https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/"], ["2022", "CVE-2022-32022", "Car Rental Management System v1.0 is vulnerable to SQL Injection via /ip/car-rental-management-system/admin/ajax.php?action=login.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-21253", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0159", "orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b"], ["2022", "CVE-2022-4550", "The User Activity WordPress plugin through 1.0.1 checks headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e"], ["2022", "CVE-2022-3112", "An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99"], ["2022", "CVE-2022-46699", "A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/googleprojectzero/fuzzilli https://github.com/zhangjiahui-buaa/MasterThesis", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/26 http://seclists.org/fulldisclosure/2022/Dec/27 http://seclists.org/fulldisclosure/2022/Dec/28"], ["2022", "CVE-2022-1386", "The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ardzz/CVE-2022-1386 https://github.com/im-hanzou/fubucker https://github.com/imhunterand/CVE-2022-1386 https://github.com/leoambrus/CheckersNomisec https://github.com/nomi-sec/PoC-in-GitHub https://github.com/satyasai1460/CVE-2022-1386 https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability", "https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/"], ["2022", "CVE-2022-26580", "PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow the execution of specific command injections on selected binaries in the ADB daemon shell service. The attacker must have physical USB access to the device in order to exploit this vulnerability.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/"], ["2022", "CVE-2022-47967", "A vulnerability has been identified in Solid Edge (All versions < V2023 MP1). The DOCMGMT.DLL contains a memory corruption vulnerability that could be triggered while parsing files in different file formats such as PAR, ASM, DFT. This could allow an attacker to execute code in the context of the current process.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42290", "NVIDIA BMC contains a vulnerability in SPX REST API, where an authorized attacker can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure and data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-24714", "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-32200", "libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.", "No PoCs found on GitHub currently.", "https://github.com/davea42/libdwarf-code/issues/116 https://www.prevanders.net/dwarfbug.html"], ["2022", "CVE-2022-28703", "A stored cross-site scripting vulnerability exists in the HdConfigActions.aspx altertextlanguages functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532"], ["2022", "CVE-2022-28492", "TOTOLINK Technology CPE with firmware V6.3c.566 ,allows remote attackers to bypass Login.", "No PoCs found on GitHub currently.", "https://github.com/B2eFly/CVE/blob/main/totolink/CP900/8/8.md"], ["2022", "CVE-2022-47664", "Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/368"], ["2022", "CVE-2022-26912", "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41228", "A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24957", "DHC Vision eQMS through 5.4.8.322 has Persistent XSS due to insufficient encoding of untrusted input/output. To exploit the vulnerability, the attacker has to create or edit a new information object and use the XSS payload as the name. Any user that opens the object's version or history tab will be attacked.", "No PoCs found on GitHub currently.", "https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt"], ["2022", "CVE-2022-30245", "Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.", "No PoCs found on GitHub currently.", "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security"], ["2022", "CVE-2022-26852", "Dell PowerScale OneFS, versions 8.2.x-9.3.x, contain a predictable seed in pseudo-random number generator. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to an account compromise.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities"], ["2022", "CVE-2022-37425", "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.", "No PoCs found on GitHub currently.", "https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/"], ["2022", "CVE-2022-26751", "A memory corruption issue was addressed with improved input validation. This issue is fixed in iTunes 12.12.4 for Windows, iOS 15.5 and iPadOS 15.5, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6, macOS Monterey 12.4. Processing a maliciously crafted image may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40144", "A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product\ufffds login authentication by falsifying request parameters on affected installations.", "https://github.com/ARPSyndicate/cvemon https://github.com/MehmetMHY/analyze-cve-repo", "No PoCs from references."], ["2022", "CVE-2022-45922", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The request handler for ll.KeepAliveSession sets a valid AdminPwd cookie even when the Web Admin password was not entered. This allows access to endpoints, which require a valid AdminPwd cookie, without knowing the password.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html http://seclists.org/fulldisclosure/2023/Jan/14 https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/"], ["2022", "CVE-2022-28940", "In H3C MagicR100 <=V100R005, the / Ajax / ajaxget interface can be accessed without authorization. It sends a large amount of data through ajaxmsg to carry out DOS attack.", "https://github.com/ARPSyndicate/cvemon https://github.com/ilovekeer/IOT_Vul https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-35520", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 api.cgi has no filtering on parameter ufconf, and this is a hidden parameter which doesn't appear in POST body, but exist in cgi binary. This leads to command injection in page /ledonoff.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi"], ["2022", "CVE-2022-24654", "Authenticated stored cross-site scripting (XSS) vulnerability in \"Field Server Address\" field in INTELBRAS ATA 200 Firmware 74.19.10.21 allows attackers to inject JavaScript code through a crafted payload.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/leonardobg/CVE-2022-24654 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/leonardobg/CVE-2022-24654 https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html"], ["2022", "CVE-2022-31129", "moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/"], ["2022", "CVE-2022-26640", "TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the minAddress parameter.", "No PoCs found on GitHub currently.", "https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf"], ["2022", "CVE-2022-40055", "An issue in GX Group GPON ONT Titanium 2122A T2122-V1.26EXL allows attackers to escalate privileges via a brute force attack at the login page.", "No PoCs found on GitHub currently.", "https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055"], ["2022", "CVE-2022-42150", "TinyLab linux-lab v1.1-rc1 and cloud-labv0.8-rc2, v1.1-rc1 are vulnerable to insecure permissions. The default configuration could cause Container Escape.", "No PoCs found on GitHub currently.", "https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo"], ["2022", "CVE-2022-3143", "wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1046", "The Visual Form Builder WordPress plugin before 3.0.7 does not sanitise and escape the form's 'Email to' field , which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon https://github.com/akashrpatil/akashrpatil", "https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758"], ["2022", "CVE-2022-31038", "Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.", "https://github.com/wuhan005/wuhan005", "No PoCs from references."], ["2022", "CVE-2022-4723", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c"], ["2022", "CVE-2022-25429", "Tenda AC9 v15.03.2.21 was discovered to contain a buffer overflow via the time parameter in the saveparentcontrolinfo function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1"], ["2022", "CVE-2022-23125", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-24846", "GeoWebCache is a tile caching server implemented in Java. The GeoWebCache disk quota mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. While in GeoWebCache the JNDI strings are provided via local configuration file, in GeoServer a user interface is provided to perform the same, that can be accessed remotely, and requires admin-level login to be used. These lookup are unrestricted in scope and can lead to code execution. The lookups are going to be restricted in GeoWebCache 1.21.0, 1.20.2, 1.19.3.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39426", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-47635", "Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php.", "No PoCs found on GitHub currently.", "https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs"], ["2022", "CVE-2022-26943", "The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-32311", "Ingredient Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /isms/admin/stocks/view_stock.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-23065", "In Vendure versions 0.1.0-alpha.2 to 1.5.1 are affected by Stored XSS vulnerability, where an attacker having catalog permission can upload a SVG file that contains malicious JavaScript into the \u201cAssets\u201d tab. The uploaded file will affect administrators as well as regular users.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065"], ["2022", "CVE-2022-28583", "It is found that there is a command injection vulnerability in the setWiFiWpsCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7"], ["2022", "CVE-2022-45670", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the ping1 parameter in the formSetAutoPing function.", "https://github.com/ARPSyndicate/cvemon https://github.com/iceyjchen/VulnerabilityProjectRecords", "https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md"], ["2022", "CVE-2022-36489", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function EnableIpv6.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1"], ["2022", "CVE-2022-3392", "The WP Humans.txt WordPress plugin through 1.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca"], ["2022", "CVE-2022-1106", "use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f"], ["2022", "CVE-2022-1297", "Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac"], ["2022", "CVE-2022-26700", "A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40115", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/delete_beneficiary.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection1.md https://github.com/zakee94/online-banking-system/issues/10"], ["2022", "CVE-2022-47876", "The integrator in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html"], ["2022", "CVE-2022-40284", "A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.", "No PoCs found on GitHub currently.", "https://github.com/tuxera/ntfs-3g/releases"], ["2022", "CVE-2022-28911", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/CloudACMunualUpdate.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/7"], ["2022", "CVE-2022-42010", "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.", "https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-24594", "In waline 1.6.1, an attacker can submit messages using X-Forwarded-For to forge any IP address.", "No PoCs found on GitHub currently.", "https://github.com/walinejs/waline/issues/785"], ["2022", "CVE-2022-1708", "A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44312", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceInteger function in expression.c when called from ExpressionInfixOperator.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-23968", "Xerox VersaLink devices on specific versions of firmware before 2022-01-26 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61. NOTE: the 2022-01-24 NeoSmart article included \"believed to affect all previous and later versions as of the date of this posting\" but a 2022-01-26 vendor statement reports \"the latest versions of firmware are not vulnerable to this issue.\"", "No PoCs found on GitHub currently.", "https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/"], ["2022", "CVE-2022-0464", "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22995", "The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities"], ["2022", "CVE-2022-31875", "Trendnet IP-110wn camera fw_tv-ip110wn_v2(1.2.2.68) has an xss vulnerability via the proname parameter in /admin/scheprofile.cgi", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md"], ["2022", "CVE-2022-36116", "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for the setValidationInfo administrative function. Removing the validation applied to newly designed processes increases the chance of successfully hiding malicious code that could be executed in a production environment.", "No PoCs found on GitHub currently.", "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise"], ["2022", "CVE-2022-41477", "A security issue was discovered in WeBid <=1.2.2. A Server-Side Request Forgery (SSRF) vulnerability in the admin/theme.php file allows remote attackers to inject payloads via theme parameters to read files across directories.", "https://github.com/zer0yu/CVE_Request", "https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md"], ["2022", "CVE-2022-25227", "Thinfinity VNC v4.0.0.1 contains a Cross-Origin Resource Sharing (CORS) vulnerability which can allow an unprivileged remote attacker, if they can trick a user into browse malicious site, to obtain an 'ID' that can be used to send websocket requests and achieve RCE.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/clapton/"], ["2022", "CVE-2022-40958", "By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.", "https://github.com/ARPSyndicate/cvemon https://github.com/Haxatron/browser-vulnerability-research", "No PoCs from references."], ["2022", "CVE-2022-0524", "Business Logic Errors in GitHub repository publify/publify prior to 9.2.7.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d"], ["2022", "CVE-2022-2421", "Due to improper type validation in attachment parsing the Socket.io js library, it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting query object.", "https://github.com/HotDB-Community/HotDB-Engine", "No PoCs from references."], ["2022", "CVE-2022-1759", "The RB Internal Links WordPress plugin through 2.0.16 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, as well as perform Stored Cross-Site Scripting attacks due to the lack of sanitisation and escaping", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8"], ["2022", "CVE-2022-29321", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the lanip parameter in /goform/setNetworkLan.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/4 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-41426", "Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_AtomFactory::CreateAtomFromStream function in mp4split.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/772"], ["2022", "CVE-2022-40849", "ThinkCMF version 6.0.7 is affected by Stored Cross-Site Scripting (XSS). An attacker who successfully exploited this vulnerability could inject a Persistent XSS payload in the Slideshow Management section that execute arbitrary JavaScript code on the client side, e.g., to steal the administrator's PHP session token (PHPSESSID).", "No PoCs found on GitHub currently.", "https://github.com/thinkcmf/thinkcmf/issues/737"], ["2022", "CVE-2022-0435", "A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.", "https://github.com/ARPSyndicate/cvemon https://github.com/bollwarm/SecToolSet https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/teresaweber685/book_list https://github.com/whoforget/CVE-POC https://github.com/wlswotmd/CVE-2022-0435 https://github.com/xairy/linux-kernel-exploitation https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-0575", "Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/faisalfs10x/CVE-IDs", "https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d"], ["2022", "CVE-2022-2470", "Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.21.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3f1f679c-c243-431c-8ed0-e61543b9921b"], ["2022", "CVE-2022-34293", "wolfSSL before 5.4.0 allows remote attackers to cause a denial of service via DTLS because a check for return-routability can be skipped.", "https://github.com/ARPSyndicate/cvemon https://github.com/jpbland1/wolfssl-expanded-ed25519 https://github.com/karimhabush/cyberowl https://github.com/wolfSSL/wolfssl", "No PoCs from references."], ["2022", "CVE-2022-34102", "Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt.", "No PoCs found on GitHub currently.", "https://www.crestron.com/Security/Security_Advisories"], ["2022", "CVE-2022-25276", "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.", "No PoCs found on GitHub currently.", "https://www.drupal.org/sa-core-2022-015"], ["2022", "CVE-2022-1588", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1619", "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450"], ["2022", "CVE-2022-22787", "The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request. This issue could be used in a more sophisticated attack to trick an unsuspecting users client to connect to a malicious server when attempting to use Zoom services.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html"], ["2022", "CVE-2022-30729", "Implicit Intent hijacking vulnerability in Settings prior to SMR Jun-2022 Release 1 allows attackers to get Wi-Fi SSID and password via a malicious QR code scanner.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-2652", "Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5"], ["2022", "CVE-2022-36225", "EyouCMS V1.5.8-UTF8-SP1 is vulnerable to Cross Site Request Forgery (CSRF) via the background, column management function and add.", "No PoCs found on GitHub currently.", "https://github.com/weng-xianhu/eyoucms/issues/26"], ["2022", "CVE-2022-41847", "An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/750 https://github.com/axiomatic-systems/Bento4/issues/775"], ["2022", "CVE-2022-22634", "A buffer overflow was addressed with improved bounds checking. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4. A malicious application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2951", "Altair HyperView Player versions 2021.1.0.27 and prior are vulnerable to improper validation of array index vulnerability during processing of H3D files. A DWORD value from a PoC file is extracted and used as an index to write to a buffer, leading to memory corruption.", "No PoCs found on GitHub currently.", "https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01"], ["2022", "CVE-2022-0854", "A memory leak flaw was found in the Linux kernel\u2019s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13"], ["2022", "CVE-2022-37149", "WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/fxc233/iot-vul", "https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md"], ["2022", "CVE-2022-24278", "The package convert-svg-core before 0.6.4 are vulnerable to Directory Traversal due to improper sanitization of SVG tags. Exploiting this vulnerability is possible by using a specially crafted SVG file.", "No PoCs found on GitHub currently.", "https://github.com/neocotic/convert-svg/issues/86 https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830"], ["2022", "CVE-2022-0914", "The Export All URLs WordPress plugin before 4.3 does not have CSRF in place when exporting data, which could allow attackers to make a logged in admin export all posts and pages (including private and draft) into an arbitrary CSV file, which the attacker can then download and retrieve the list of titles for example", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930"], ["2022", "CVE-2022-31505", "The cheo0/MercadoEnLineaBack repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-25114", "Event Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the full_name parameter under register.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0"], ["2022", "CVE-2022-43701", "When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code.", "No PoCs found on GitHub currently.", "https://developer.arm.com/documentation/ka005596/latest"], ["2022", "CVE-2022-43490", "Cross-Site Request Forgery (CSRF) vulnerability in XWP Stream plugin <=\u00a03.9.2 versions.", "https://github.com/HotDB-Community/HotDB-Engine", "No PoCs from references."], ["2022", "CVE-2022-0617", "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f"], ["2022", "CVE-2022-0586", "Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file", "https://github.com/ARPSyndicate/cvemon", "https://gitlab.com/wireshark/wireshark/-/issues/17813"], ["2022", "CVE-2022-22966", "An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server.", "https://github.com/ARPSyndicate/cvemon https://github.com/avboy1337/CVE-2022-22966 https://github.com/bb33bb/CVE-2022-22966 https://github.com/karimhabush/cyberowl https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-25394", "Medical Store Management System v1.0 was discovered to contain a SQL injection vulnerability via the cid parameter under customer-add.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/abhisheks008/2022/Medical-Store-Management-System"], ["2022", "CVE-2022-41715", "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrKsey/AdGuardHome https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "No PoCs from references."], ["2022", "CVE-2022-31886", "Marval MSM v14.19.0.12476 is vulnerable to Cross Site Request Forgery (CSRF). An attacker can disable the 2FA by sending the user a malicious form.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/2fa-bypass-via-x-csrf"], ["2022", "CVE-2022-27291", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formdumpeasysetup. This vulnerability allows attackers to cause a Denial of Service (DoS) via the config.save_network_enabled parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-30778", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/kang8/CVE-2022-30778 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/1nhann/vulns/issues/1"], ["2022", "CVE-2022-0706", "The Easy Digital Downloads WordPress plugin before 2.11.6 does not sanitise and escape the Downloadable File Name in the Logs, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907"], ["2022", "CVE-2022-47188", "There is an arbitrary file reading vulnerability in Generex UPS CS141 below 2.06 version. An attacker, making use of the default credentials, could upload a backup file containing a symlink to /etc/shadow, allowing him to obtain the content of this path.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-0497", "A vulnerbiility was found in Openscad, where a .scad file with no trailing newline could cause an out-of-bounds read during parsing of annotations.", "No PoCs found on GitHub currently.", "https://github.com/openscad/openscad/issues/4043"], ["2022", "CVE-2022-24369", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16087.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-31414", "D-Link DIR-1960 firmware DIR-1960_A1_1.11 was discovered to contain a buffer overflow via srtcat in prog.cgi. This vulnerability allowed attackers to cause a Denial of Service (DoS) via a crafted HTTP request.", "https://github.com/karimhabush/cyberowl", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-46175", "JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including versions 1.0.1 and 2.2.1 does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 versions 1.0.2, 2.2.2, and later.", "https://github.com/ARPSyndicate/cvemon https://github.com/anthonykirby/lora-packet https://github.com/arnau/obsidian-metatable https://github.com/chrisweb/waveform-visualizer https://github.com/chrisweb/web-audio-api-player https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/giz-berlin/quasar-app-webpack-json5-vulnerability https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/seal-community/patches https://github.com/softrams/npm-epss-audit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-29383", "NETGEAR ProSafe SSL VPN firmware FVS336Gv2 and FVS336Gv3 was discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Awrrays/FrameVul https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/badboycxcc/Netgear-ssl-vpn-20211222-CVE-2022-29383 https://github.com/badboycxcc/badboycxcc https://github.com/cxaqhq/netgear-to-CVE-2022-29383 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-22665", "A logic issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.3. A malicious application may be able to gain root privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20620", "Missing permission checks in Jenkins SSH Agent Plugin 1.23 and earlier allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-31554", "The rohitnayak/movie-review-sentiment-analysis repository through 2017-05-07 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41956", "Autolab is a course management service, initially developed by a team of students at Carnegie Mellon University, that enables instructors to offer autograded programming assignments to their students over the Web. A file disclosure vulnerability was discovered in Autolab's remote handin feature, whereby users are able to hand-in assignments using paths outside their submission directory. Users can then view the submission to view the file's contents. The vulnerability has been patched in version 2.10.0. As a workaround, ensure that the field for the remote handin feature is empty (Edit Assessment > Advanced > Remote handin path), and that you are not running Autolab as `root` (or any user that has write access to `/`). Alternatively, disable the remote handin feature if it is unneeded by replacing the body of `local_submit` in `app/controllers/assessment/handin.rb` with `render(plain: \"Feature disabled\", status: :bad_request) && return`.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/"], ["2022", "CVE-2022-2840", "The Zephyr Project Manager WordPress plugin before 3.2.5 does not sanitise and escape various parameters before using them in SQL statements via various AJAX actions available to both unauthenticated and authenticated users, leading to SQL injections", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c"], ["2022", "CVE-2022-40539", "Memory corruption in Automotive Android OS due to improper validation of array index.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0945", "Stored XSS viva axd and cshtml file upload in star7th/showdoc in GitHub repository star7th/showdoc prior to v2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e"], ["2022", "CVE-2022-22826", "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-43750", "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15"], ["2022", "CVE-2022-4148", "The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.3.0 has a flawed CSRF and authorisation check when deleting a client, which could allow any authenticated users, such as subscriber to delete arbitrary client.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41"], ["2022", "CVE-2022-25242", "In FileCloud before 21.3, file upload is not protected against Cross-Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://herolab.usd.de/security-advisories/"], ["2022", "CVE-2022-36033", "jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.)", "https://github.com/ARPSyndicate/cvemon https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-0541", "The flo-launch WordPress plugin before 2.4.1 injects code into wp-config.php when creating a cloned site, allowing any attacker to initiate a new site install by setting the flo_custom_table_prefix cookie to an arbitrary value.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce"], ["2022", "CVE-2022-21948", "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in paste allows remote attackers to place Javascript into SVG files. This issue affects: openSUSE paste paste version b57b9f87e303a3db9465776e657378e96845493b and prior versions.", "No PoCs found on GitHub currently.", "https://bugzilla.suse.com/show_bug.cgi?id=1197930"], ["2022", "CVE-2022-29315", "Invicti Acunetix before 14 allows CSV injection via the Description field on the Add Targets page, if the Export CSV feature is used.", "No PoCs found on GitHub currently.", "https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html"], ["2022", "CVE-2022-3668", "A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212008.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip https://github.com/axiomatic-systems/Bento4/issues/776"], ["2022", "CVE-2022-2996", "A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0893", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9"], ["2022", "CVE-2022-0401", "Path Traversal in NPM w-zip prior to 1.0.12.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d"], ["2022", "CVE-2022-28079", "College Management System v1.0 was discovered to contain a SQL injection vulnerability via the course_code parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated"], ["2022", "CVE-2022-25302", "All versions of package asneg/opcuastack are vulnerable to Denial of Service (DoS) due to a missing handler for failed casting when unvalidated data is forwarded to boost::get function in OpcUaNodeIdBase.h. Exploiting this vulnerability is possible when sending a specifically crafted OPC UA message with a special encoded NodeId.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732"], ["2022", "CVE-2022-33915", "Versions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.", "https://github.com/ARPSyndicate/cvemon https://github.com/justinsteven/advisories", "No PoCs from references."], ["2022", "CVE-2022-36173", "FreshService macOS Agent < 4.4.0 and FreshServce Linux Agent < 3.4.0 are vulnerable to TLS Man-in-The-Middle via the FreshAgent client and scheduled update service.", "No PoCs found on GitHub currently.", "https://public-exposure.inform.social/post/integrity-checking/"], ["2022", "CVE-2022-41412", "An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows attackers to access sensitive data and execute Server-Side Request Forgery (SSRF) attacks.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/renmizo/CVE-2022-41412 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html https://github.com/renmizo/CVE-2022-41412"], ["2022", "CVE-2022-0681", "The Simple Membership WordPress plugin before 4.1.0 does not have CSRF check in place when deleting Transactions, which could allow attackers to make a logged in admin delete arbitrary transactions via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef"], ["2022", "CVE-2022-0510", "Cross-site Scripting (XSS) - Reflected in Packagist pimcore/pimcore prior to 10.3.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe"], ["2022", "CVE-2022-2415", "Heap buffer overflow in WebGL in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html"], ["2022", "CVE-2022-4119", "The Image Optimizer, Resizer and CDN WordPress plugin before 6.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d"], ["2022", "CVE-2022-31901", "Buffer overflow in function Notepad_plus::addHotSpot in Notepad++ v8.4.3 and earlier allows attackers to crash the application via two crafted files.", "https://github.com/CDACesec/CVE-2022-31901 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/CDACesec/CVE-2022-31901"], ["2022", "CVE-2022-41991", "A heap-based buffer overflow vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639"], ["2022", "CVE-2022-31593", "SAP Business One client - version 10.0 allows an attacker with low privileges, to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-38170", "In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29204", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative value would result in a `CHECK`-failure (assertion failure), as per TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-2887", "The WP Server Health Stats WordPress plugin before 1.7.0 does not escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497"], ["2022", "CVE-2022-21919", "Windows User Profile Service Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-20436", "There is an unauthorized service in the system service. Since the component does not have permission check, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242248369", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22533", "Due to improper error handling in SAP NetWeaver Application Server Java - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, an attacker could submit multiple HTTP server requests resulting in errors, such that it consumes the memory buffer. This could result in system shutdown rendering the system unavailable.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-33647", "Windows Kerberos Elevation of Privilege Vulnerability", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-4059", "The Cryptocurrency Widgets Pack WordPress plugin before 2.0 does not sanitise and escape some parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d"], ["2022", "CVE-2022-48331", "Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_save_keys feature_name_len integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/"], ["2022", "CVE-2022-34027", "Nginx NJS v0.7.4 was discovered to contain a segmentation violation via njs_value_property at njs_value.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/504"], ["2022", "CVE-2022-27256", "A PHP Local File inclusion vulnerability in the Redbasic theme for Hubzilla before version 7.2 allows remote attackers to include arbitrary php files via the schema parameter.", "No PoCs found on GitHub currently.", "https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/"], ["2022", "CVE-2022-0450", "The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a"], ["2022", "CVE-2022-2555", "The Yotpo Reviews for WooCommerce WordPress plugin through 2.0.4 lacks nonce check when updating its settings, which could allow attacker to make a logged in admin change them via a CSRF attack.", "https://github.com/AduraK2/Shiro_Weblogic_Tool", "https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae"], ["2022", "CVE-2022-28028", "Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Master.php?f=delete_amenity.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md"], ["2022", "CVE-2022-35169", "SAP BusinessObjects Business Intelligence Platform (LCM) - versions 420, 430, allows an attacker with an admin privilege to read and decrypt LCMBIAR file's password under certain conditions, enabling the attacker to modify the password or import the file into another system causing high impact on confidentiality but a limited impact on the availability and integrity of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-2874", "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79"], ["2022", "CVE-2022-42799", "The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-26318", "On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.", "https://github.com/ARPSyndicate/cvemon https://github.com/BabyTeam1024/CVE-2022-26318 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/Throns1956/watchguard_cve-2022-26318 https://github.com/WhooAmii/POC_to_review https://github.com/h3llk4t3/Watchguard-RCE-POC-CVE-2022-26318 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/misterxid/watchguard_cve-2022-26318 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-20614", "A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-31560", "The uncleYiba/photo_tag repository through 2020-08-31 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-38183", "In Gitea before 1.16.9, it was possible for users to add existing issues to projects. Due to improper access controls, an attacker could assign any issue to any project in Gitea (there was no permission check for fetching the issue). As a result, the attacker would get access to private issue titles.", "No PoCs found on GitHub currently.", "https://herolab.usd.de/security-advisories/usd-2022-0015/"], ["2022", "CVE-2022-25171", "The package p4 before 0.0.7 are vulnerable to Command Injection via the run() function due to improper input sanitization", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-P4-3167330"], ["2022", "CVE-2022-48113", "A vulnerability in TOTOLINK N200RE_v5 firmware V9.3.5u.6139 allows unauthenticated attackers to access the telnet service via a crafted POST request. Attackers are also able to leverage this vulnerability to login as root via hardcoded credentials.", "No PoCs found on GitHub currently.", "https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html"], ["2022", "CVE-2022-20917", "A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) message processing feature of Cisco Jabber could allow an authenticated, remote attacker to manipulate the content of XMPP messages that are used by the affected application. This vulnerability is due to the improper handling of nested XMPP messages within requests that are sent to the Cisco Jabber client software. An attacker could exploit this vulnerability by connecting to an XMPP messaging server and sending crafted XMPP messages to an affected Jabber client. A successful exploit could allow the attacker to manipulate the content of XMPP messages, possibly allowing the attacker to cause the Jabber client application to perform unsafe actions.", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM"], ["2022", "CVE-2022-21578", "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2777", "Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f"], ["2022", "CVE-2022-21438", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0732", "The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability.", "No PoCs found on GitHub currently.", "https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/"], ["2022", "CVE-2022-20857", "Multiple vulnerabilities in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to execute arbitrary commands, read or upload container image files, or perform a cross-site request forgery attack. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "No PoCs from references."], ["2022", "CVE-2022-27134", "EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfer` function of the smart contract which allows remote attackers to win the cryptocurrency without paying ticket fee via the `std::string memo` parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/Kenun99/CVE-batdappboomx https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/Kenun99/CVE-batdappboomx"], ["2022", "CVE-2022-22651", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.3. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.", "https://github.com/felix-pb/remote_pocs", "No PoCs from references."], ["2022", "CVE-2022-35029", "OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6babea.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md"], ["2022", "CVE-2022-0831", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-26258", "D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-31531", "The dainst/cilantro repository through 0.0.4 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22740", "Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1742334"], ["2022", "CVE-2022-2825", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.", "https://github.com/claroty/opcua-exploit-framework", "No PoCs from references."], ["2022", "CVE-2022-0920", "The Salon booking system Free and Pro WordPress plugins before 7.6.3 do not have proper authorisation in some of its endpoints, which could allow customers to access all bookings and other customer's data", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0"], ["2022", "CVE-2022-21529", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0623", "Out-of-bounds Read in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580"], ["2022", "CVE-2022-2726", "A vulnerability classified as critical has been found in SEMCMS. This affects an unknown part of the file Ant_Check.php. The manipulation of the argument DID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205839.", "https://github.com/ARPSyndicate/cvemon https://github.com/G0mini/G0mini", "https://vuldb.com/?id.205839"], ["2022", "CVE-2022-25060", "TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_startPing.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/exploitwritter/CVE-2022-25060 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-43675", "An issue was discovered in NOKIA NFM-T R19.9. Reflected XSS in the Network Element Manager exists via /oms1350/pages/otn/cpbLogDisplay via the filename parameter, under /oms1350/pages/otn/connection/E2ERoutingDisplayWithOverLay via the id parameter, and under /oms1350/pages/otn/mainOtn via all parameters.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/redteam"], ["2022", "CVE-2022-3998", "A vulnerability, which was classified as critical, was found in MonikaBrzica scm. This affects an unknown part of the file uredi_korisnika.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213699.", "No PoCs found on GitHub currently.", "https://github.com/MonikaBrzica/scm/issues/1"], ["2022", "CVE-2022-36180", "Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106.", "No PoCs found on GitHub currently.", "https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/"], ["2022", "CVE-2022-21469", "Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: UI Framework). Supported versions that are affected are 13.4.0.0 and 13.5.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Enterprise Manager Base Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0763", "Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6"], ["2022", "CVE-2022-2666", "A vulnerability has been found in SourceCodester Loan Management System and classified as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205618 is the identifier assigned to this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/cxaqhq/cxaqhq", "No PoCs from references."], ["2022", "CVE-2022-2965", "Improper Restriction of Rendered UI Layers or Frames in GitHub repository notrinos/notrinoserp prior to 0.7.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/61e3bdf7-3548-45ea-b105-967abc0977f4"], ["2022", "CVE-2022-0860", "Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d"], ["2022", "CVE-2022-26209", "Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUploadSetting, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-20494", "In AutomaticZenRule of AutomaticZenRule.java, there is a possible persistent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243794204", "https://github.com/ARPSyndicate/cvemon https://github.com/Supersonic/CVE-2022-20494 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-20705", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC", "http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-44384", "An arbitrary file upload vulnerability in rconfig v3.9.6 allows attackers to execute arbitrary code via a crafted PHP file.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/49783"], ["2022", "CVE-2022-44015", "An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-22600", "The issue was addressed with improved permissions logic. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A malicious application may be able to bypass certain Privacy preferences.", "https://github.com/ARPSyndicate/cvemon https://github.com/KlinKlinKlin/MSF-screenrecord-on-MacOS https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/acheong08/MSF-screenrecord-on-MacOS https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2676", "A vulnerability was found in SourceCodester Electronic Medical Records System and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument user_email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205664.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205664"], ["2022", "CVE-2022-0773", "The Documentor WordPress plugin through 1.5.3 fails to sanitize and escape user input before it is being interpolated in an SQL statement and then executed, leading to an SQL Injection exploitable by unauthenticated users.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc"], ["2022", "CVE-2022-21479", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-36190", "GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. This vulnerability was fixed in commit fef6242.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2220"], ["2022", "CVE-2022-36201", "Doctor\u2019s Appointment System v1.0 is vulnerable to Blind SQLi via settings.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/aznull/CVEs", "http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-20816", "A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to delete arbitrary files from an affected system. This vulnerability exists because the affected software does not properly validate HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE"], ["2022", "CVE-2022-41760", "An issue was discovered in NOKIA NFM-T R19.9. Relative Path Traversal can occur under /oms1350/data/cpb/log of the Network Element Manager via the filename parameter, allowing a remote authenticated attacker to read arbitrary files.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-43665", "A denial of service vulnerability exists in the malware scan functionality of ESTsoft Alyac 2.5.8.645. A specially-crafted PE file can lead to killing target process. An attacker can provide a malicious file to trigger this vulnerability.", "https://github.com/karimhabush/cyberowl", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682"], ["2022", "CVE-2022-48012", "Opencats v0.9.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /opencats/index.php?m=settings&a=ajax_tags_upd.", "No PoCs found on GitHub currently.", "https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Reflected%20XSS%20in%20onChangeTag.md"], ["2022", "CVE-2022-22610", "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38313", "Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the time parameter at /goform/saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2"], ["2022", "CVE-2022-44005", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-46291", "Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MSI file format", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666"], ["2022", "CVE-2022-26188", "TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via /setting/NTPSyncWithHost.", "No PoCs found on GitHub currently.", "https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/"], ["2022", "CVE-2022-0870", "Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cokeBeer/go-cves https://github.com/michaellrowley/michaellrowley", "https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531"], ["2022", "CVE-2022-35068", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e420d.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35068.md"], ["2022", "CVE-2022-26359", "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0930", "File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993"], ["2022", "CVE-2022-29127", "BitLocker Security Feature Bypass Vulnerability", "https://github.com/Wack0/bitlocker-attacks", "No PoCs from references."], ["2022", "CVE-2022-41923", "Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In some Grails framework applications, access to the targeted endpoint will be granted based on meeting the authorization requirements of the donor endpoint, which can result in a privilege escalation attack. This vulnerability has been patched in grails-spring-security-core versions 3.3.2, 4.0.5 and 5.1.1. Impacted Applications: Grails Spring Security Core plugin versions: 1.x 2.x >=3.0.0 <3.3.2 >=4.0.0 <4.0.5 >=5.0.0 <5.1.1 We strongly suggest that all Grails framework applications using the Grails Spring Security Core plugin be updated to a patched release of the plugin. Workarounds: Users should create a subclass extending one of the following classes from the `grails.plugin.springsecurity.web.access.intercept` package, depending on their security configuration: * `AnnotationFilterInvocationDefinition` * `InterceptUrlMapFilterInvocationDefinition` * `RequestmapFilterInvocationDefinition` In each case, the subclass should override the `calculateUri` method like so: ``` @Override protected String calculateUri(HttpServletRequest request) { UrlPathHelper.defaultInstance.getRequestUri(request) } ``` This should be considered a temporary measure, as the patched versions of grails-spring-security-core deprecates the `calculateUri` method. Once upgraded to a patched version of the plugin, this workaround is no longer needed. The workaround is especially important for version 2.x, as no patch is available version 2.x of the GSSC plugin.", "https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/grails/GSSC-CVE-2022-41923 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-31521", "The Niyaz-Mohamed/mosaic repository through 1.0.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20956", "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.
This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to.
Cisco plans to release software updates that address this vulnerability.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx\"]", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-broken-access-control/"], ["2022", "CVE-2022-25130", "A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-22853", "A stored cross-site scripting (XSS) vulnerability in Hospital Patient Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Name field.", "No PoCs found on GitHub currently.", "https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip"], ["2022", "CVE-2022-0633", "The UpdraftPlus WordPress plugin Free before 1.22.3 and Premium before 2.22.3 do not properly validate a user has the required privileges to access a backup's nonce identifier, which may allow any users with an account on the site (such as subscriber) to download the most recent site & database backup.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166059/WordPress-UpdraftPlus-1.22.2-Backup-Disclosure.html https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3"], ["2022", "CVE-2022-21539", "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-43634", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dsi_writeinit function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17646.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-22942", "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-32659", "In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705066; Issue ID: GN20220705066.", "https://github.com/ARPSyndicate/cvemon https://github.com/efchatz/WPAxFuzz", "No PoCs from references."], ["2022", "CVE-2022-2627", "The Newspaper WordPress theme before 12 does not sanitise a parameter before outputting it back in an HTML attribute via an AJAX action, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea"], ["2022", "CVE-2022-0722", "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url prior to 7.0.0.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21428", "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0821", "Improper Authorization in GitHub repository orchardcms/orchardcore prior to 1.3.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0019eb1c-8bf9-4bd0-a27f-aadc173515cb"], ["2022", "CVE-2022-2924", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f0f3aded-6e97-4cf2-980a-c90f2c6ca0e0"], ["2022", "CVE-2022-35039", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e20a0.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md"], ["2022", "CVE-2022-29036", "Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22701", "PartKeepr versions up to v1.4.0, loads attachments using a URL while creating a part and allows the use of the 'file://' URI scheme, allowing an authenticated user to read local files.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/hendrix/"], ["2022", "CVE-2022-29176", "Rubygems is a package registry used to supply software for the Ruby language ecosystem. Due to a bug in the yank action, it was possible for any RubyGems.org user to remove and replace certain gems even if that user was not authorized to do so. To be vulnerable, a gem needed: one or more dashes in its name creation within 30 days OR no updates for over 100 days At present, we believe this vulnerability has not been exploited. RubyGems.org sends an email to all gem owners when a gem version is published or yanked. We have not received any support emails from gem owners indicating that their gem has been yanked without authorization. An audit of gem changes for the last 18 months did not find any examples of this vulnerability being used in a malicious way. A deeper audit for any possible use of this exploit is ongoing, and we will update this advisory once it is complete. Using Bundler in --frozen or --deployment mode in CI and during deploys, as the Bundler team has always recommended, will guarantee that your application does not silently switch to versions created using this exploit. To audit your application history for possible past exploits, review your Gemfile.lock and look for gems whose platform changed when the version number did not change. For example, gemname-3.1.2 updating to gemname-3.1.2-java could indicate a possible abuse of this vulnerability. RubyGems.org has been patched and is no longer vulnerable to this issue as of the 5th of May 2022.", "https://github.com/ARPSyndicate/cvemon https://github.com/gregmolnar/gregmolnar", "No PoCs from references."], ["2022", "CVE-2022-31570", "The adriankoczuruek/ceneo-web-scrapper repository through 2021-03-15 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-26099", "Null pointer dereference vulnerability in parser_infe function of libsimba library prior to SMR Apr-2022 Release 1 allows out of bounds read by remote attackers.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-0961", "The microweber application allows large characters to insert in the input field \"post title\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436"], ["2022", "CVE-2022-42789", "An issue in code signature validation was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, macOS Monterey 12.6. An app may be able to access user-sensitive data.", "https://github.com/ARPSyndicate/cvemon https://github.com/FFRI/AotPoisoning https://github.com/kohnakagawa/kohnakagawa", "No PoCs from references."], ["2022", "CVE-2022-0662", "The AdRotate WordPress plugin before 5.8.23 does not sanitise and escape Advert Names which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69"], ["2022", "CVE-2022-21568", "Vulnerability in the Oracle iReceivables product of Oracle E-Business Suite (component: Access Request). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iReceivables. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iReceivables accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-27064", "Musical World v1 was discovered to contain an arbitrary file upload vulnerability via uploaded_songs.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC"], ["2022", "CVE-2022-36310", "Airspan AirVelocity 1500 software prior to version 15.18.00.2511 had NET-SNMP-EXTEND-MIB enabled on its snmpd service, enabling an attacker with SNMP write abilities to execute commands as root on the eNodeB. This issue may affect other AirVelocity and AirSpeed models.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm"], ["2022", "CVE-2022-41671", "A CWE-89: Improper Neutralization of Special Elements used in SQL Command (\u2018SQL Injection\u2019) vulnerability exists that allows adversaries with local user privileges to craft a malicious SQL query and execute as part of project migration which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).", "No PoCs found on GitHub currently.", "https://www.se.com/ww/en/download/document/SEVD-2022-284-01/"], ["2022", "CVE-2022-3899", "The 3dprint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will delete any number of files or directories on the target server by tricking a logged in admin into submitting a form.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/"], ["2022", "CVE-2022-43774", "The HandlerPageP_KID class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that could allow an attacker to gain code execution on a remote system.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-33"], ["2022", "CVE-2022-38020", "Visual Studio Code Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-21849", "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/G-Mully/Unit-17-HW-PT2", "No PoCs from references."], ["2022", "CVE-2022-0440", "The Catch Themes Demo Import WordPress plugin before 2.1.1 does not validate one of the file to be imported, which could allow high privivilege admin to upload an arbitrary PHP file and gain RCE even in the case of an hardened blog (ie DISALLOW_UNFILTERED_HTML, DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS constants set to true)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1"], ["2022", "CVE-2022-25343", "An issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Denial of Service. An unauthenticated attacker, who can send POST requests to the /download/set.cgi page by manipulating the failhtmfile variable, is able to cause interruption of the service provided by the Web Application.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-48321", "Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.", "https://github.com/ARPSyndicate/cvemon https://github.com/JacobEbben/CVE-2022-47909_unauth_arbitrary_file_deletion https://github.com/gbrsh/checkmk-race", "No PoCs from references."], ["2022", "CVE-2022-4049", "The WP User WordPress plugin through 7.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be"], ["2022", "CVE-2022-4298", "The Wholesale Market WordPress plugin before 2.2.1 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478"], ["2022", "CVE-2022-4109", "The Wholesale Market for WooCommerce WordPress plugin before 2.0.0 does not validate user input against path traversal attacks, allowing high privilege users such as admin to download arbitrary logs from the server even when they should not be able to (for example in multisite)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670"], ["2022", "CVE-2022-2405", "The WP Popup Builder WordPress plugin before 1.2.9 does not have authorisation and CSRF check in an AJAX action, allowing any authenticated users, such as subscribers to delete arbitrary Popup", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917"], ["2022", "CVE-2022-0500", "A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel\u2019s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57"], ["2022", "CVE-2022-0691", "Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.", "https://github.com/ARPSyndicate/cvemon https://github.com/seal-community/patches", "https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4"], ["2022", "CVE-2022-2897", "Measuresoft ScadaPro Server and Client (All Versions) do not properly resolve links before file access; this could allow privilege escalation..", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3769", "The OWM Weather WordPress plugin before 5.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as contributor", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/owm-weather_5-6-8/ https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8"], ["2022", "CVE-2022-44276", "In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions resulting in RCE.", "https://github.com/HerrLeStrate/CVE-2022-44276-PoC https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/HerrLeStrate/CVE-2022-44276-PoC"], ["2022", "CVE-2022-31583", "The sravaniboinepelli/AutomatedQuizEval repository through 2020-04-27 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20566", "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41981", "A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628"], ["2022", "CVE-2022-44367", "Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setUplinkInfo.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md"], ["2022", "CVE-2022-29305", "imgurl v2.31 was discovered to contain a Blind SQL injection vulnerability via /upload/localhost.", "No PoCs found on GitHub currently.", "https://github.com/helloxz/imgurl/issues/75"], ["2022", "CVE-2022-31492", "Cross Site scripting (XSS) vulnerability inLibreHealth EHR Base 2.0.0 via interface/usergroup/usergroup_admin_add.php Username.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-41890", "TensorFlow is an open source platform for machine learning. If `BCast::ToShape` is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in `tf.experimental.numpy.outer` by passing in large input to the input `b`. We have patched the issue in GitHub commit 8310bf8dd188ff780e7fc53245058215a05bdbe5. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-41793", "An out-of-bounds write vulnerability exists in the CSR format title functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667 https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667"], ["2022", "CVE-2022-27217", "Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25083", "TOTOLink A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A860R/README.md"], ["2022", "CVE-2022-43507", "Improper buffer restrictions in the Intel(R) QAT Engine for OpenSSL before version 0.6.16 may allow a privileged user to potentially enable escalation of privilege via network access.", "https://github.com/chnzzh/OpenSSL-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-4018", "Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5"], ["2022", "CVE-2022-2514", "The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected XSS due to the lack of escaping of error messages which contained the parameters in verbatim.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429"], ["2022", "CVE-2022-2685", "A vulnerability was found in SourceCodester Interview Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /addQuestion.php. The manipulation of the argument question with the input leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205673 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205673"], ["2022", "CVE-2022-0411", "The Asgaros Forum WordPress plugin before 2.0.0 does not sanitise and escape the post_id parameter before using it in a SQL statement via a REST route of the plugin (accessible to any authenticated user), leading to a SQL injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172"], ["2022", "CVE-2022-0780", "The SearchIQ WordPress plugin before 3.9 contains a flag to disable the verification of CSRF nonces, granting unauthenticated attackers access to the siq_ajax AJAX action and allowing them to perform Cross-Site Scripting attacks due to the lack of sanitisation and escaping in the customCss parameter", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825"], ["2022", "CVE-2022-2454", "Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f"], ["2022", "CVE-2022-41542", "devhub 0.102.0 was discovered to contain a broken session control.", "No PoCs found on GitHub currently.", "https://medium.com/@sc0p3hacker/cve-2022-41542-session-mis-configuration-in-devhub-application-ca956bb9027a"], ["2022", "CVE-2022-27357", "Ecommerce-Website v1 was discovered to contain an arbitrary file upload vulnerability via /customer_register.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md"], ["2022", "CVE-2022-34126", "The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter.", "No PoCs found on GitHub currently.", "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/"], ["2022", "CVE-2022-4158", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15 https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64"], ["2022", "CVE-2022-38131", "RStudio Connect prior to 2023.01.0 is affected by an Open Redirect issue. The vulnerability could allow an attacker to redirect users to malicious websites.", "https://github.com/JoshuaMart/JoshuaMart", "https://support.posit.co/hc/en-us/articles/10983374992023"], ["2022", "CVE-2022-33746", "P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-37048", "The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_l2len_protocol at common/get.c:344. NOTE: this is different from CVE-2022-27941.", "No PoCs found on GitHub currently.", "https://github.com/appneta/tcpreplay/issues/735"], ["2022", "CVE-2022-0955", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/data-hub prior to 1.2.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df"], ["2022", "CVE-2022-2850", "A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22735", "The Simple Quotation WordPress plugin through 1.3.2 does not have authorisation (and CSRF) checks in various of its AJAX actions and is lacking escaping of user data when using it in SQL statements, allowing any authenticated users, such as subscriber to perform SQL injection attacks", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00"], ["2022", "CVE-2022-38236", "XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-41946", "pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/srchen1987/springcloud-distributed-transaction", "No PoCs from references."], ["2022", "CVE-2022-31544", "The meerstein/rbtm repository through 1.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22836", "CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.", "https://github.com/ARPSyndicate/cvemon", "https://yoursecuritybores.me/coreftp-vulnerabilities/"], ["2022", "CVE-2022-23459", "Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx"], ["2022", "CVE-2022-2753", "The Ketchup Restaurant Reservations WordPress plugin through 1.0.0 does not sanitise and escape some of the reservation user inputs, allowing unauthenticated attackers to perform Cross-Site Scripting attacks logged in admin viewing the malicious reservation made", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182"], ["2022", "CVE-2022-0656", "The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151"], ["2022", "CVE-2022-2613", "Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.", "https://github.com/ARPSyndicate/cvemon https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-0487", "A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.", "https://github.com/ARPSyndicate/cvemon https://github.com/si1ent-le/CVE-2022-0847", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39"], ["2022", "CVE-2022-30768", "A Stored Cross Site Scripting (XSS) issue in ZoneMinder 1.36.12 allows an attacker to execute HTML or JavaScript code via the Username field when an Admin (or non-Admin users that can see other users logged into the platform) clicks on Logout. NOTE: this exists in later versions than CVE-2019-7348 and requires a different attack method.", "No PoCs found on GitHub currently.", "https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31"], ["2022", "CVE-2022-43591", "A buffer overflow vulnerability exists in the QML QtScript Reflect API of Qt Project Qt 6.3.2. A specially-crafted javascript code can trigger an out-of-bounds memory access, which can lead to arbitrary code execution. Target application would need to access a malicious web page to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650"], ["2022", "CVE-2022-43600", "Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656"], ["2022", "CVE-2022-22976", "Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE.", "https://github.com/ARPSyndicate/cvemon https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/muneebaashiq/MBProjects https://github.com/nomi-sec/PoC-in-GitHub https://github.com/spring-io/cve-2022-22976-bcrypt-skips-salt https://github.com/tindoc/spring-blog https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-25015", "A stored cross-site scripting (XSS) vulnerability in Ice Hrm 30.0.0.OS allows attackers to steal cookies via a crafted payload inserted into the First Name field.", "https://github.com/cooliscool/Advisories", "https://github.com/gamonoid/icehrm/issues/285"], ["2022", "CVE-2022-22675", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, watchOS 8.6, macOS Big Sur 11.6.6, macOS Monterey 12.3.1, iOS 15.4.1 and iPadOS 15.4.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/b1n4r1b01/n-days https://github.com/h26forge/h26forge", "No PoCs from references."], ["2022", "CVE-2022-29393", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_004192cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules"], ["2022", "CVE-2022-29002", "A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add.", "No PoCs found on GitHub currently.", "https://github.com/xuxueli/xxl-job/issues/2821"], ["2022", "CVE-2022-31795", "An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/"], ["2022", "CVE-2022-20770", "On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-37299", "An issue was discovered in Shirne CMS 1.2.0. There is a Path Traversal vulnerability which could cause arbitrary file read via /static/ueditor/php/controller.php", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/StarCrossPortal/scalpel https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "No PoCs from references."], ["2022", "CVE-2022-40469", "iKuai OS v3.6.7 was discovered to contain an authenticated remote code execution (RCE) vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/yikesoftware/yikesoftware", "https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469"], ["2022", "CVE-2022-22764", "Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-46074", "Helmet Store Showroom 1.0 is vulnerable to Cross Site Request Forgery (CSRF). An unauthenticated user can add an admin account due to missing CSRF protection.", "No PoCs found on GitHub currently.", "https://www.youtube.com/watch?v=5Q3vyTo02bc&ab_channel=IkariShinji https://yuyudhn.github.io/CVE-2022-46074/"], ["2022", "CVE-2022-31515", "The Delor4/CarceresBE repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-31684", "Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.", "https://github.com/ARPSyndicate/cvemon https://github.com/sr-monika/sprint-rest", "No PoCs from references."], ["2022", "CVE-2022-0904", "A stack overflow bug in the document extractor in Mattermost Server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted Apple Pages document.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-2801", "A vulnerability, which was classified as critical, was found in SourceCodester Automated Beer Parlour Billing System. This affects an unknown part of the component Login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-206247.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206247"], ["2022", "CVE-2022-23408", "wolfSSL 5.x before 5.1.1 uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS 1.1 or 1.2 or DTLS 1.1 or 1.2. This occurs because of misplaced memory initialization in BuildMessage in internal.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/wolfSSL/wolfssl", "No PoCs from references."], ["2022", "CVE-2022-2493", "Data Access from Outside Expected Data Manager Component in GitHub repository openemr/openemr prior to 7.0.0.", "https://github.com/zn9988/publications", "No PoCs from references."], ["2022", "CVE-2022-2702", "A vulnerability was found in SourceCodester Company Website CMS and classified as critical. Affected by this issue is some unknown functionality of the file site-settings.php of the component Cookie Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-205826 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205826"], ["2022", "CVE-2022-0596", "Improper Validation of Specified Quantity in Input in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5"], ["2022", "CVE-2022-0607", "Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-47089", "GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow via gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2338"], ["2022", "CVE-2022-27001", "Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the dhcp function via the hostname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-36375", "Authenticated (high role user) WordPress Options Change vulnerability in Biplob Adhikari's Tabs plugin <= 3.6.0 at WordPress.", "https://github.com/ARPSyndicate/cvemon https://github.com/tr3ss/gofetch", "No PoCs from references."], ["2022", "CVE-2022-43711", "Interactive Forms (IAF) in GX Software XperienCentral versions 10.29.1 until 10.33.0 was vulnerable to cross site scripting attacks (XSS) because the CSP header uses eval() in the script-src.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-25295", "This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue(\"next\")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\\\\\\\example.com, browser will redirect user to http://example.com.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177"], ["2022", "CVE-2022-25104", "HorizontCMS v1.0.0-beta.2 was discovered to contain an arbitrary file download vulnerability via the component /admin/file-manager/.", "No PoCs found on GitHub currently.", "https://github.com/ttimot24/HorizontCMS/issues/43"], ["2022", "CVE-2022-34270", "An issue was discovered in RWS WorldServer before 11.7.3. Regular users can create users with the Administrator role via UserWSUserManager.", "No PoCs found on GitHub currently.", "https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver"], ["2022", "CVE-2022-20822", "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to read and delete files on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains certain character sequences to an affected system. A successful exploit could allow the attacker to read or delete specific files on the device that their configured administrative level should not have access to. Cisco plans to release software updates that address this vulnerability.", "https://github.com/karimhabush/cyberowl", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/"], ["2022", "CVE-2022-25044", "Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.", "No PoCs found on GitHub currently.", "https://github.com/espruino/Espruino/issues/2142"], ["2022", "CVE-2022-0747", "The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection", "https://github.com/ARPSyndicate/cvemon https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3"], ["2022", "CVE-2022-37159", "Claroline 13.5.7 and prior is vulnerable to Remote code execution via arbitrary file upload.", "https://github.com/ARPSyndicate/cvemon https://github.com/matthieu-hackwitharts/claroline-CVEs", "https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md"], ["2022", "CVE-2022-2941", "The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the \"Naming Conventions\" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt"], ["2022", "CVE-2022-24328", "In JetBrains Hub before 2021.1.13956, an unprivileged user could perform DoS.", "https://github.com/ARPSyndicate/cvemon https://github.com/yuriisanin/cve-exploits https://github.com/yuriisanin/whoami https://github.com/yuriisanin/yuriisanin", "No PoCs from references."], ["2022", "CVE-2022-22624", "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22894", "Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_lcache_lookup in /jerry-core/ecma/base/ecma-lcache.c.", "No PoCs found on GitHub currently.", "https://github.com/jerryscript-project/jerryscript/issues/4890"], ["2022", "CVE-2022-43473", "A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve a malicious XML payload to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685"], ["2022", "CVE-2022-2460", "The WPDating WordPress plugin before 7.4.0 does not properly escape user input before concatenating it to certain SQL queries, leading to multiple SQL injection vulnerabilities exploitable by unauthenticated users", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db"], ["2022", "CVE-2022-0565", "Cross-site Scripting in Packagist pimcore/pimcore prior to 10.3.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5"], ["2022", "CVE-2022-38105", "An information disclosure vulnerability exists in the cm_processREQ_NC opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packets can lead to a disclosure of sensitive information. An attacker can send a network request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590"], ["2022", "CVE-2022-29271", "In Nagios XI through 5.8.5, a read-only Nagios user (due to an incorrect permission check) is able to schedule downtime for any host/services. This allows an attacker to permanently disable all monitoring checks.", "https://github.com/ARPSyndicate/cvemon https://github.com/sT0wn-nl/CVEs", "https://github.com/4LPH4-NL/CVEs https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi"], ["2022", "CVE-2022-31677", "An Insufficient Session Expiration issue was discovered in the Pinniped Supervisor (before v0.19.0). A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1609", "The School Management WordPress plugin before 9.9.7 contains an obfuscated backdoor injected in it's license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site.", "https://github.com/0x007f/cve-2022-1609-exploit https://github.com/0xSojalSec/-CVE-2022-1609 https://github.com/0xSojalSec/CVE-2022-1609 https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/WhooAmii/POC_to_review https://github.com/WitchWatcher/cve-2022-1609-exploit https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nastar-id/WP-school-management-RCE https://github.com/nomi-sec/PoC-in-GitHub https://github.com/savior-only/CVE-2022-1609 https://github.com/tuxsyscall/cve-2022-1609-exploit https://github.com/w4r3s/cve-2022-1609-exploit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/"], ["2022", "CVE-2022-46087", "CloudSchool v3.0.1 is vulnerable to Cross Site Scripting (XSS). A normal user can steal session cookies of the admin users through notification received by the admin user.", "https://github.com/ARPSyndicate/cvemon https://github.com/G37SYS73M/CVE-2022-46087 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-46087/poc.md"], ["2022", "CVE-2022-1598", "The WPQA Builder WordPress plugin before 5.5 which is a companion to the Discy and Himer , lacks authentication in a REST API endpoint, allowing unauthenticated users to discover private questions sent between users on the site.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/V35HR4J/CVE-2022-1598 https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8"], ["2022", "CVE-2022-22546", "Due to improper HTML encoding in input control summary, an authorized attacker can execute XSS vulnerability in SAP Business Objects Web Intelligence (BI Launchpad) - version 420.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-27223", "In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12"], ["2022", "CVE-2022-25326", "fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2431", "The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including 3.2.50. This is due to insufficient file type and path validation on the deleteFiles() function found in the ~/Admin/Menu/Packages.php file that triggers upon download post deletion. This makes it possible for contributor level users and above to supply an arbitrary file path via the 'file[files]' parameter when creating a download post and once the user deletes the post the supplied arbitrary file will be deleted. This can be used by attackers to delete the /wp-config.php file which will reset the installation and make it possible for an attacker to achieve remote code execution on the server.", "https://github.com/ARPSyndicate/cvemon", "https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt"], ["2022", "CVE-2022-0534", "A vulnerability was found in htmldoc version 1.9.15 where the stack out-of-bounds read takes place in gif_get_code() and occurs when opening a malicious GIF file, which can result in a crash (segmentation fault).", "No PoCs found on GitHub currently.", "https://github.com/michaelrsweet/htmldoc/issues/463"], ["2022", "CVE-2022-25237", "Bonita Web 2021.2 is affected by a authentication/authorization bypass vulnerability due to an overly broad exclude pattern used in the RestAPIAuthorizationFilter. By appending ;i18ntranslation or /../i18ntranslation/ to the end of a URL, users with no privileges can access privileged API endpoints. This can lead to remote code execution by abusing the privileged API actions.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4cksploit/CVEs-master https://github.com/Mayukh-Ghara/Meerkat-Analysis-Report https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/RhinoSecurityLabs/CVEs https://github.com/lions2012/Penetration_Testing_POC https://github.com/merlinepedra/RHINOECURITY-CVEs https://github.com/merlinepedra25/RHINOSECURITY-CVEs https://github.com/xuetusummer/Penetration_Testing_POC", "https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/"], ["2022", "CVE-2022-31626", "In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/CFandR-github/PHP-binary-bugs https://github.com/amitlttwo/CVE-2022-31626 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-30898", "A Cross-site request forgery (CSRF) vulnerability in Cscms music portal system v4.2 allows remote attackers to change the administrator's username and password.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/37"], ["2022", "CVE-2022-29360", "The Email Viewer in RainLoop through 1.6.0 allows XSS via a crafted email message.", "No PoCs found on GitHub currently.", "https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/"], ["2022", "CVE-2022-46196", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none.", "https://github.com/devAL3X/cacti_cve_statistics https://github.com/dpgg101/CVE-2022-46196", "No PoCs from references."], ["2022", "CVE-2022-1718", "The trudesk application allows large characters to insert in the input field \"Full Name\" on the signup field which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in GitHub repository polonel/trudesk prior to 1.2.2. This can lead to Denial of service.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e"], ["2022", "CVE-2022-27272", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_1791C. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-25377", "The ACME-challenge endpoint in Appwrite 0.5.0 through 0.12.x before 0.12.2 allows remote attackers to read arbitrary local files via ../ directory traversal. In order to be vulnerable, APP_STORAGE_CERTIFICATES/.well-known/acme-challenge must exist on disk. (This pathname is automatically created if the user chooses to install Let's Encrypt certificates via Appwrite.)", "No PoCs found on GitHub currently.", "https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/"], ["2022", "CVE-2022-2571", "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571"], ["2022", "CVE-2022-4673", "The Rate my Post WordPress plugin before 3.3.9 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff"], ["2022", "CVE-2022-36499", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function DEleteusergroup.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19"], ["2022", "CVE-2022-21170", "Improper check for certificate revocation in i-FILTER Ver.10.45R01 and earlier, i-FILTER Ver.9.50R10 and earlier, i-FILTER Browser & Cloud MultiAgent for Windows Ver.4.93R04 and earlier, and D-SPA (Ver.3 / Ver.4) using i-FILTER allows a remote unauthenticated attacker to conduct a man-in-the-middle attack and eavesdrop on an encrypted communication.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-45660", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedStartTime parameter in the setSchedWifi function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md"], ["2022", "CVE-2022-35561", "A stack overflow vulnerability exists in /goform/WifiMacFilterSet in Tenda W6 V1.0.0.9(4122) version, which can be exploited by attackers to cause a denial of service (DoS) via the index parameter.", "https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-24615", "zip4j up to v2.10.0 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28901", "A command injection vulnerability in the component /SetTriggerLEDBlink/Blink of D-Link DIR882 DIR882A1_FW130B06 allows attackers to escalate privileges to root via a crafted payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/3 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-40105", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFilterGet function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-26481", "An issue was discovered in Poly Studio before 3.7.0. Command Injection can occur via the CN field of a Create Certificate Signing Request (CSR) action.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/"], ["2022", "CVE-2022-26710", "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, tvOS 15.5, watchOS 8.6. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1287", "A vulnerability classified as critical was found in School Club Application System 1.0. This vulnerability affects a request to the file /scas/classes/Users.php?f=save_user. The manipulation with a POST request leads to privilege escalation. The attack can be initiated remotely and does not require authentication. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.196750"], ["2022", "CVE-2022-1116", "Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html"], ["2022", "CVE-2022-3382", "HIWIN Robot System Software version 3.3.21.9869 does not properly address the terminated command source. As a result, an attacker could craft code to disconnect HRSS and the controller and cause a denial-of-service condition.", "https://github.com/PyterSmithDarkGhost/CVE-2022-3382ROBOTICAEXPLOITPOC https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-3013", "A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423.", "https://github.com/karimhabush/cyberowl", "https://vuldb.com/?id.207423"], ["2022", "CVE-2022-1056", "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/391"], ["2022", "CVE-2022-46549", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md"], ["2022", "CVE-2022-3153", "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a"], ["2022", "CVE-2022-4830", "The Paid Memberships Pro WordPress plugin before 2.9.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c"], ["2022", "CVE-2022-24755", "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When Bareos Director >= 18.2 >= 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, it will skip authorization checks completely. Expired accounts and accounts with expired passwords can still login. This problem will affect users that have PAM enabled. Currently there is no authorization (e.g. check for expired or disabled accounts), but only plain authentication (i.e. check if username and password match). Bareos Director versions 21.1.0, 20.0.6 and 19.2.12 implement the authorization check that was previously missing. The only workaround is to make sure that authentication fails if the user is not authorized.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/"], ["2022", "CVE-2022-42140", "Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose.", "No PoCs found on GitHub currently.", "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/"], ["2022", "CVE-2022-45823", "Cross-Site Request Forgery (CSRF) vulnerability in GalleryPlugins Video Contest WordPress plugin <=\u00a03.2 versions.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-26953", "Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body.", "No PoCs found on GitHub currently.", "https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md"], ["2022", "CVE-2022-45720", "IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the ip, mac, and remark parameters in the formIPMacBindModify function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SkCD5PEUo"], ["2022", "CVE-2022-24856", "FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this is not required for console anymore. A patch is available in FlyteConsole version 0.52.0. Disable FlyteConsole availability on the internet as a workaround.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-32241", "When a user opens manipulated Portable Document Format (.pdf, PDFView.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-25439", "Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the list parameter in the SetIpMacBind function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/8"], ["2022", "CVE-2022-4733", "Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f353adfb-e5b8-43e7-957a-894670fd4ccd"], ["2022", "CVE-2022-26842", "A reflected cross-site scripting (xss) vulnerability exists in the charts tab selection functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537"], ["2022", "CVE-2022-24947", "Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-4622", "The Login Logout Menu WordPress plugin through 1.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2"], ["2022", "CVE-2022-36759", "Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=.", "No PoCs found on GitHub currently.", "https://hackmd.io/@hieuleuxuan/OFOS_Sql_Injection"], ["2022", "CVE-2022-3042", "Use after free in PhoneHub in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24644", "ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution vulnerability during an unauthenticated update. To exploit this vulnerability, a user must trigger an update of an affected installation of KeyMouse.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/ThanhThuy2908/ATHDH_CVE_2022_24644 https://github.com/WhooAmii/POC_to_review https://github.com/gerr-re/cve-2022-24644 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf"], ["2022", "CVE-2022-40154", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/ARPSyndicate/cvemon https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-24495", "Windows Direct Show - Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24704", "The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suffers from a buffer overflow vulnerability, whereby user input len is copied into a fixed buffer &attr->val.integer without any bound checks. If the client connects to the server and sends a large radius packet, a buffer overflow vulnerability will be triggered.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28810", "Zoho ManageEngine ADSelfService Plus before build 6122 allows a remote authenticated administrator to execute arbitrary operating OS commands as SYSTEM via the policy custom script feature. Due to the use of a default administrator password, attackers may be able to abuse this functionality with minimal effort. Additionally, a remote and partially authenticated attacker may be able to inject arbitrary commands into the custom script due to an unsanitized password field.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/karimhabush/cyberowl https://github.com/todb-cisa/kev-cwes", "http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/"], ["2022", "CVE-2022-42280", "NVIDIA BMC contains a vulnerability in SPX REST auth handler, where an un-authorized attacker can exploit a path traversal, which may lead to authentication bypass.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-45872", "iTerm2 before 3.4.18 mishandles a DECRQSS response.", "https://github.com/dgl/houdini-kubectl-poc", "No PoCs from references."], ["2022", "CVE-2022-42111", "A Cross-site scripting (XSS) vulnerability in the Sharing module's user notification in Liferay Portal 7.2.1 through 7.4.2, and Liferay DXP 7.2 before fix pack 19, and 7.3 before update 4 allows remote attackers to inject arbitrary web script or HTML by sharing an asset with a crafted payload.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17379"], ["2022", "CVE-2022-1396", "The Donorbox WordPress plugin before 7.1.7 does not sanitise and escape its Campaign URL settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166531/ https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9"], ["2022", "CVE-2022-1007", "The Advanced Booking Calendar WordPress plugin before 1.7.1 does not sanitise and escape the room parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue", "https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358"], ["2022", "CVE-2022-46689", "A race condition was addressed with additional validation. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/2201757474/Cowabunga https://github.com/69camau/sw1tch https://github.com/ARPSyndicate/cvemon https://github.com/BomberFish/AppCommander https://github.com/BomberFish/AppCommander-legacy https://github.com/BomberFish/BomberFish https://github.com/BomberFish/JailedCement https://github.com/BomberFish/Mandela https://github.com/BomberFish/Mandela-Classic https://github.com/BomberFish/Mandela-Legacy https://github.com/BomberFish/Mandela-Rewritten https://github.com/Hiimsonkul/Hiimsonkul https://github.com/Ingan121/FSUntether https://github.com/Kry9toN/WDBFontOverwrite https://github.com/ManoChina/Cowabunga https://github.com/ManoChina/MacDirtyCowDemo https://github.com/PureKFD/PureKFD https://github.com/PureKFD/PureKFDRepo https://github.com/Smile1024me/Cowabunga https://github.com/Thyssenkrupp234/ra1nm8 https://github.com/ZZY3312/KFDFontOverwrite-M1 https://github.com/ahkecha/McDirty https://github.com/beyonik/macdirtycow-flutter https://github.com/c22dev/TipsGotTrolled https://github.com/emtee40/MacDirtyCowDemo https://github.com/enty8080/MacDirtyCow https://github.com/ginsudev/WDBFontOverwrite https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/isejb/IseJB https://github.com/k0mi-tg/CVE-POC https://github.com/leminlimez/Cowabunga https://github.com/manas3c/CVE-POC https://github.com/mineek/FileManager https://github.com/missuo/awesome-stars https://github.com/neon443/mdcsource https://github.com/neon443/n443source https://github.com/nomi-sec/PoC-in-GitHub https://github.com/puffycheezball8/MacDirtyCow-AltSource https://github.com/ryanfortner/starred https://github.com/serdykee/serdykee.github.io https://github.com/spinfal/CVE-2022-46689 https://github.com/staturnzz/sw1tch https://github.com/straight-tamago/DockTransparent https://github.com/straight-tamago/FileSwitcherPro https://github.com/straight-tamago/FileSwitcherX https://github.com/straight-tamago/NoCameraSound https://github.com/straight-tamago/NoHomeBar https://github.com/swaggyP36000/TrollStore-IPAs https://github.com/tdquang266/MDC https://github.com/whoforget/CVE-POC https://github.com/xqf400/CarMacDirtyCow https://github.com/youwizard/CVE-POC https://github.com/zhuowei/MacDirtyCowDemo", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/24 http://seclists.org/fulldisclosure/2022/Dec/25 http://seclists.org/fulldisclosure/2022/Dec/26 http://seclists.org/fulldisclosure/2022/Dec/27"], ["2022", "CVE-2022-38808", "ywoa v6.1 is vulnerable to SQL Injection via backend/oa/visual/exportExcel.do interface.", "No PoCs found on GitHub currently.", "https://github.com/cloudwebsoft/ywoa/issues/26"], ["2022", "CVE-2022-4762", "The Materialis Companion WordPress plugin before 1.3.40 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e"], ["2022", "CVE-2022-36588", "In D-Link DAP1650 v1.04 firmware, the fileaccess.cgi program in the firmware has a buffer overflow vulnerability caused by strncpy.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-36619", "In D-link DIR-816 A2_v1.10CNB04.img,the network can be reset without authentication via /goform/setMAC.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-30315", "Honeywell Experion PKS Safety Manager (SM and FSC) through 2022-05-06 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0053, there is a Honeywell Experion PKS Safety Manager insufficient logic security controls issue. The affected components are characterized as: Honeywell FSC runtime (FSC-CPU, QPP), Honeywell Safety Builder. The potential impact is: Remote Code Execution, Denial of Service. The Honeywell Experion PKS Safety Manager family of safety controllers utilize the unauthenticated Safety Builder protocol (FSCT-2022-0051) for engineering purposes, including downloading projects and control logic to the controller. Control logic is downloaded to the controller on a block-by-block basis. The logic that is downloaded consists of FLD code compiled to native machine code for the CPU module (which applies to both the Safety Manager and FSC families). Since this logic does not seem to be cryptographically authenticated, it allows an attacker capable of triggering a logic download to execute arbitrary machine code on the controller's CPU module in the context of the runtime. While the researchers could not verify this in detail, the researchers believe that the microprocessor underpinning the FSC and Safety Manager CPU modules is incapable of offering memory protection or privilege separation capabilities which would give an attacker full control of the CPU module. There is no authentication on control logic downloaded to the controller. Memory protection and privilege separation capabilities for the runtime are possibly lacking. The researchers confirmed the issues in question on Safety Manager R145.1 and R152.2 but suspect the issue affects all FSC and SM controllers and associated Safety Builder versions regardless of software or firmware revision. An attacker who can communicate with a Safety Manager controller via the Safety Builder protocol can execute arbitrary code without restrictions on the CPU module, allowing for covert manipulation of control operations and implanting capabilities similar to the TRITON malware (MITRE ATT&CK software ID S1009). A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-45771", "An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/yuriisanin/CVE-2022-45771 https://github.com/yuriisanin/yuriisanin", "https://github.com/pwndoc/pwndoc/issues/401"], ["2022", "CVE-2022-1225", "Incorrect Privilege Assignment in GitHub repository phpipam/phpipam prior to 1.4.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/49b44cfa-d142-4d79-b529-7805507169d2"], ["2022", "CVE-2022-25949", "The kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010.06.23.247 fails to properly handle crafted inputs, leading to stack-based buffer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/tandasat/CVE-2022-25949 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-38529", "tinyexr commit 0647fb3 was discovered to contain a heap-buffer overflow via the component rleUncompress.", "No PoCs found on GitHub currently.", "https://github.com/syoyo/tinyexr/issues/169"], ["2022", "CVE-2022-0149", "The WooCommerce Stored Exporter WordPress plugin before 2.7.1 was affected by a Reflected Cross-Site Scripting (XSS) vulnerability in the woo_ce admin page.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c"], ["2022", "CVE-2022-21243", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Primavera Portfolio Management. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23346", "BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues.", "No PoCs found on GitHub currently.", "https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346"], ["2022", "CVE-2022-32032", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the deviceList parameter in the function formAddMacfilterRule.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule"], ["2022", "CVE-2022-35951", "Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28531", "Sourcecodester Covid-19 Directory on Vaccination System1.0 is vulnerable to SQL Injection via the admin/login.php txtusername (aka Username) field.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-0398", "The ThirstyAffiliates Affiliate Link Manager WordPress plugin before 3.10.5 does not have authorisation and CSRF checks when creating affiliate links, which could allow any authenticated user, such as subscriber to create arbitrary affiliate links, which could then be used to redirect users to an arbitrary website", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24"], ["2022", "CVE-2022-37914", "Vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to bypass authentication. Successful exploitation of these vulnerabilities could allow an attacker to gain administrative privileges leading to a complete compromise of the Aruba EdgeConnect Enterprise Orchestrator with versions 9.1.2.40051 and below, 9.0.7.40108 and below, 8.10.23.40009 and below, and any older branches of Orchestrator not specifically mentioned.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21303", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-32172", "In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user\u2019s credentials.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32172"], ["2022", "CVE-2022-45413", "Using the S.browser_fallback_url parameter parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent. *This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1791201"], ["2022", "CVE-2022-28471", "In ffjpeg (commit hash: caade60), the function bmp_load() in bmp.c contains an integer overflow vulnerability, which eventually results in the heap overflow in jfif_encode() in jfif.c. This is due to the incomplete patch for issue 38", "No PoCs found on GitHub currently.", "https://github.com/rockcarry/ffjpeg/issues/49"], ["2022", "CVE-2022-4791", "The Product Slider and Carousel with Category for WooCommerce WordPress plugin before 2.8 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782"], ["2022", "CVE-2022-42273", "NVIDIA BMC contains a vulnerability in libwebsocket, where an authorized attacker can cause a buffer overflow and cause a denial of service or gain code execution.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-39806", "Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Drawing (.slddrw, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1274", "A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.", "No PoCs found on GitHub currently.", "https://herolab.usd.de/security-advisories/usd-2021-0033/"], ["2022", "CVE-2022-25918", "The package shescape from 1.5.10 and before 1.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the escape function in index.js, due to the usage of insecure regex in the escapeArgBash function.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108"], ["2022", "CVE-2022-3371", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce"], ["2022", "CVE-2022-24577", "GPAC 1.0.1 is affected by a NULL pointer dereference in gf_utf8_wcslen. (gf_utf8_wcslen is a renamed Unicode utf8_wcslen function.)", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/"], ["2022", "CVE-2022-35603", "A SQL injection vulnerability in CustomerDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter searchTxt.", "No PoCs found on GitHub currently.", "https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-37706", "enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.", "https://github.com/ARPSyndicate/cvemon https://github.com/ECU-10525611-Xander/CVE-2022-37706 https://github.com/GrayHatZone/CVE-2022-37706-LPE-exploit https://github.com/J0hnbX/Ubuntu-22-LPE https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/WhooAmii/POC_to_review https://github.com/beruangsalju/LocalPrivelegeEscalation https://github.com/beruangsalju/LocalPrivilegeEscalation https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit"], ["2022", "CVE-2022-0289", "Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html"], ["2022", "CVE-2022-37805", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the function fromWizardHandle.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1"], ["2022", "CVE-2022-30166", "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html"], ["2022", "CVE-2022-23086", "Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small.Users with access to the mpr, mps or mpt device node may overwrite heap data, potentially resulting in privilege escalation. Note that the device node is only accessible to root and members of the operator group.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-23317", "CobaltStrike <=4.5 HTTP(S) listener does not determine whether the request URL begins with \"/\", and attackers can obtain relevant information by specifying the URL.", "https://github.com/evilashz/Counter-Strike-1.6", "No PoCs from references."], ["2022", "CVE-2022-28560", "There is a stack overflow vulnerability in the goform/fast_setting_wifi_set function in the httpd service of Tenda ac9 15.03.2.21_cn router. An attacker can obtain a stable shell through a carefully constructed payload", "No PoCs found on GitHub currently.", "https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9"], ["2022", "CVE-2022-45693", "Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/jettison-json/jettison/issues/52"], ["2022", "CVE-2022-4680", "The Revive Old Posts WordPress plugin before 9.0.11 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af"], ["2022", "CVE-2022-4451", "The Social Sharing WordPress plugin before 3.3.45 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5"], ["2022", "CVE-2022-47547", "GossipSub 1.1, as used for Ethereum 2.0, allows a peer to maintain a positive score (and thus not be pruned from the network) even though it continuously misbehaves by never forwarding topic messages.", "No PoCs found on GitHub currently.", "https://arxiv.org/pdf/2212.05197.pdf"], ["2022", "CVE-2022-21352", "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28420", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via BabyCare/admin.php?id=theme&setid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-45442", "Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/motoyasu-saburi/reported_vulnerability", "No PoCs from references."], ["2022", "CVE-2022-35743", "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/mattifestation/mattifestation", "No PoCs from references."], ["2022", "CVE-2022-24437", "The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.", "No PoCs found on GitHub currently.", "https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307"], ["2022", "CVE-2022-26532", "A argument injection vulnerability in the 'packet-trace' CLI command of Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, VPN series firmware versions 4.30 through 5.21, NSG series firmware versions 1.00 through 1.33 Patch 4, NXC2500 firmware version 6.10(AAIG.3) and earlier versions, NAP203 firmware version 6.25(ABFA.7) and earlier versions, NWA50AX firmware version 6.25(ABYW.5) and earlier versions, WAC500 firmware version 6.30(ABVS.2) and earlier versions, and WAX510D firmware version 6.30(ABTF.2) and earlier versions, that could allow a local authenticated attacker to execute arbitrary OS commands by including crafted arguments to the CLI command.", "https://github.com/0xdea/advisories https://github.com/ARPSyndicate/cvemon https://github.com/hnsecurity/vulns https://github.com/xinyisleep/pocscan", "http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html"], ["2022", "CVE-2022-1334", "The WP YouTube Live WordPress plugin before 1.8.3 does not validate, sanitise and escape various of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739"], ["2022", "CVE-2022-25858", "The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.", "https://github.com/ARPSyndicate/cvemon https://github.com/Naruse-developer/Miku_Theme https://github.com/Naruse-developer/Warframe_theme", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722 https://snyk.io/vuln/SNYK-JS-TERSER-2806366"], ["2022", "CVE-2022-3231", "Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.9.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f"], ["2022", "CVE-2022-1033", "Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045"], ["2022", "CVE-2022-3136", "The Social Rocket WordPress plugin before 1.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649"], ["2022", "CVE-2022-4855", "A vulnerability, which was classified as critical, was found in SourceCodester Lead Management System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-217020.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md"], ["2022", "CVE-2022-33148", "A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the title parameter.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551"], ["2022", "CVE-2022-24730", "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications' source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42125", "Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17517"], ["2022", "CVE-2022-47943", "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.", "https://github.com/helgerod/ksmb-check https://github.com/xairy/linux-kernel-exploitation", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2"], ["2022", "CVE-2022-26635", "** DISPUTED ** PHP-Memcached v2.2.0 and below contains an improper NULL termination which allows attackers to execute CLRF injection. Note: Third parties have disputed this as not affecting PHP-Memcached directly.", "No PoCs found on GitHub currently.", "https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/"], ["2022", "CVE-2022-30321", "go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24833", "PrivateBin is minimalist, open source online pastebin clone where the server has zero knowledge of pasted data. In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present in all versions from v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a specifically crafted SVG attachment, and interacts with the preview image and the instance isn't protected by an appropriate content security policy. Users are advised to either upgrade to version 1.4.0 or to ensure the content security policy of their instance is set correctly.", "No PoCs found on GitHub currently.", "https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw"], ["2022", "CVE-2022-32224", "A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/kastner/rails-serialization-problem https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ooooooo-q/cve-2022-32224-rails https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-34728", "Windows Graphics Component Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-43249", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_epel_hv_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/345"], ["2022", "CVE-2022-4756", "The My YouTube Channel WordPress plugin before 3.23.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61"], ["2022", "CVE-2022-34668", "NVFLARE, versions prior to 2.1.4, contains a vulnerability that deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html"], ["2022", "CVE-2022-4616", "The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to command injection through the network diagnosis page. This vulnerability could allow a remote unauthenticated user to add files, delete files, and change file permissions.", "https://github.com/ahanel13/CVE-2022-4616-POC https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-43309", "Supermicro X11SSL-CF HW Rev 1.01, BMC firmware v1.63 was discovered to contain insecure permissions.", "https://github.com/ARPSyndicate/cvemon https://github.com/Maxul/Awesome-SGX-Open-Source", "No PoCs from references."], ["2022", "CVE-2022-21284", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37401", "Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice", "No PoCs found on GitHub currently.", "https://www.openoffice.org/security/cves/CVE-2022-37401.html"], ["2022", "CVE-2022-1173", "stored xss in GitHub repository getgrav/grav prior to 1.7.33.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b6016e95-9f48-4945-89cb-199b6e072218"], ["2022", "CVE-2022-44569", "A locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.", "https://github.com/rweijnen/ivanti-automationmanager-exploit", "No PoCs from references."], ["2022", "CVE-2022-3076", "The CM Download Manager WordPress plugin before 2.8.6 allows high privilege users such as admin to upload arbitrary files by setting the any extension via the plugin's setting, which could be used by admins of multisite blog to upload PHP files for example.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd"], ["2022", "CVE-2022-24761", "Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that may lead to request smuggling that are addressed by this advisory: The use of Python's `int()` to parse strings into integers, leading to `+10` to be parsed as `10`, or `0x01` to be parsed as `1`, where as the standard specifies that the string should contain only digits or hex digits; and Waitress does not support chunk extensions, however it was discarding them without validating that they did not contain illegal characters. This vulnerability has been patched in Waitress 2.1.1. A workaround is available. When deploying a proxy in front of waitress, turning on any and all functionality to make sure that the request matches the RFC7230 standard. Certain proxy servers may not have this functionality though and users are encouraged to upgrade to the latest version of waitress instead.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28875", "A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant and in certain WithSecure products whereby the scanning the aemobile component can crash the scanning engine. The exploit can be triggered remotely by an attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-40071", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, formSetDeviceName.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2"], ["2022", "CVE-2022-20368", "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1062", "The th23 Social WordPress plugin through 1.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0"], ["2022", "CVE-2022-3167", "Improper Restriction of Rendered UI Layers or Frames in GitHub repository ikus060/rdiffweb prior to 2.4.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c"], ["2022", "CVE-2022-33119", "NUUO Network Video Recorder NVRsolo v03.06.02 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via login.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/badboycxcc/badboycxcc https://github.com/badboycxcc/nuuo-xss", "https://github.com/badboycxcc/nuuo-xss/blob/main/README.md"], ["2022", "CVE-2022-29888", "A leftover debug code vulnerability exists in the httpd port 4444 upload.cgi functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted HTTP request can lead to arbitrary file deletion. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522"], ["2022", "CVE-2022-26967", "GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2138"], ["2022", "CVE-2022-21395", "Vulnerability in the Oracle Communications Operations Monitor product of Oracle Communications (component: Mediation Engine). Supported versions that are affected are 3.4, 4.2, 4.3, 4.4 and 5.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Communications Operations Monitor. Successful attacks of this vulnerability can result in takeover of Oracle Communications Operations Monitor. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-45714", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formQOSRuleDel function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/S1QhLw0Ss"], ["2022", "CVE-2022-39402", "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. While the vulnerability is in MySQL Shell, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).", "https://github.com/ycdxsb/ycdxsb", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-23101", "OX App Suite through 7.10.6 allows XSS via appHandler in a deep link in an e-mail message.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Jul/11"], ["2022", "CVE-2022-32275", "** DISPUTED ** Grafana 8.4.3 allows reading files via (for example) a /dashboard/snapshot/%7B%7Bconstructor.constructor'/.. /.. /.. /.. /.. /.. /.. /.. /etc/passwd URI. NOTE: the vendor's position is that there is no vulnerability; this request yields a benign error page, not /etc/passwd content.", "https://github.com/ARPSyndicate/cvemon https://github.com/BrotherOfJhonny/grafana https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/kh4sh3i/Grafana-CVE https://github.com/lions2012/Penetration_Testing_POC https://github.com/vin01/bogus-cves https://github.com/xuetusummer/Penetration_Testing_POC", "https://github.com/BrotherOfJhonny/grafana https://github.com/BrotherOfJhonny/grafana/blob/main/README.md"], ["2022", "CVE-2022-35887", "Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` HTTP parameter, as used within the `/action/wirelessConnect` handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585"], ["2022", "CVE-2022-30230", "A vulnerability has been identified in SICAM GridEdge Essential ARM (All versions < V2.6.6), SICAM GridEdge Essential Intel (All versions < V2.6.6), SICAM GridEdge Essential with GDS ARM (All versions < V2.6.6), SICAM GridEdge Essential with GDS Intel (All versions < V2.6.6). The affected software does not require authenticated access for privileged functions. This could allow an unauthenticated attacker to create a new user with administrative permissions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21144", "This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756"], ["2022", "CVE-2022-45654", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the ssid parameter in the form_fast_setting_wifi_set function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md"], ["2022", "CVE-2022-23041", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-43358", "Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).", "No PoCs found on GitHub currently.", "https://github.com/sass/libsass/issues/3178"], ["2022", "CVE-2022-4647", "Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242"], ["2022", "CVE-2022-27448", "There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28095"], ["2022", "CVE-2022-1122", "A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.", "https://github.com/mzs555557/SosReverterbench", "https://github.com/uclouvain/openjpeg/issues/1368"], ["2022", "CVE-2022-4944", "A vulnerability, which was classified as problematic, has been found in kalcaddle KodExplorer up to 4.49. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.50 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227000.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrEmpy/CVE-2022-4944 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/kalcaddle/KodExplorer/issues/512 https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file"], ["2022", "CVE-2022-35555", "A command injection vulnerability exists in /goform/exeCommand in Tenda W6 V1.0.0.9(4122), which allows attackers to construct cmdinput parameters for arbitrary command execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-45957", "ZTE ZXHN-H108NS router with firmware version H108NSV1.0.7u_ZRD_GR2_A68 is vulnerable to remote stack buffer overflow.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html https://packetstormsecurity.com/files/169958/ZTE-ZXHN-H108NS-Authentication-Bypass.html"], ["2022", "CVE-2022-37450", "Go Ethereum (aka geth) through 1.10.21 allows attackers to increase rewards by mining blocks in certain situations, and using a manipulation of time-difference values to achieve replacement of main-chain blocks, aka Riskless Uncle Making (RUM), as exploited in the wild in 2020 through 2022.", "https://github.com/demining/Solidity-Forcibly-Send-Ether-Vulnerability", "https://medium.com/@aviv.yaish/uncle-maker-time-stamping-out-the-competition-in-ethereum-d27c1cb62fef"], ["2022", "CVE-2022-37971", "Microsoft Windows Defender Elevation of Privilege Vulnerability", "https://github.com/SafeBreach-Labs/aikido_wiper", "No PoCs from references."], ["2022", "CVE-2022-21366", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "https://github.com/ARPSyndicate/cvemon https://github.com/CodeIntelligenceTesting/jazzer", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26994", "Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pptp function via the pptpUserName and pptpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-35874", "Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `ssid` and `ssid_hex` configuration parameters, as used within the `testWifiAP` XCMD handler", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581"], ["2022", "CVE-2022-24891", "ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for \"onsiteURL\" in the **antisamy-esapi.xml** configuration file that can cause \"javascript:\" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the \"onsiteURL\" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.", "https://github.com/ARPSyndicate/cvemon https://github.com/razermuse/enum_cvss", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-28414", "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_member.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-28785", "Improper buffer size check logic in aviextractor library prior to SMR May-2022 Release 1 allows out of bounds read leading to possible temporary denial of service. The patch adds buffer size check logic.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-2169", "The Loading Page with Loading Screen WordPress plugin before 1.0.83 does not escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230"], ["2022", "CVE-2022-4465", "The WP Video Lightbox WordPress plugin before 1.9.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c"], ["2022", "CVE-2022-1091", "The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3"], ["2022", "CVE-2022-29778", "** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-890L 1.20b01 allows attackers to execute arbitrary code due to the hardcoded option Wake-On-Lan for the parameter 'descriptor' at SetVirtualServerSettings.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/TyeYeah/DIR-890L-1.20-RCE https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/TyeYeah/DIR-890L-1.20-RCE https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-3205", "Cross site scripting in automation controller UI in Red Hat Ansible Automation Platform 1.2 and 2.0 where the project name is susceptible to XSS injection", "No PoCs found on GitHub currently.", "https://bugzilla.redhat.com/show_bug.cgi?id=2120597"], ["2022", "CVE-2022-3194", "The Dokan WordPress plugin before 3.6.4 allows vendors to inject arbitrary javascript in product reviews, which may allow them to run stored XSS attacks against other users like site administrators.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/"], ["2022", "CVE-2022-28886", "A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-24403", "The TETRA TA61 identity encryption function internally uses a 64-bit value derived exclusively from the SCK (Class 2 networks) or CCK (Class 3 networks). The structure of TA61 allows for efficient recovery of this 64-bit value, allowing an adversary to encrypt or decrypt arbitrary identities given only three known encrypted/unencrypted identity pairs.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-24792", "PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is available on the `master` branch of the `pjsip/project` GitHub repository. As a workaround, apps can reject a WAV file received from an unknown source or validate the file first.", "https://github.com/ARPSyndicate/cvemon https://github.com/tianstcht/tianstcht", "No PoCs from references."], ["2022", "CVE-2022-26697", "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-40082", "Hertz v0.3.0 ws discovered to contain a path traversal vulnerability via the normalizePath function.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves", "No PoCs from references."], ["2022", "CVE-2022-24543", "Windows Upgrade Assistant Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-1240", "Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc"], ["2022", "CVE-2022-27829", "Improper validation vulnerability in VerifyCredentialResponse prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-29638", "TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the comment parameter in the function setIpQosRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.", "No PoCs found on GitHub currently.", "https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md"], ["2022", "CVE-2022-44959", "webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /meetings/listmeetings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/webtareas/issues/6"], ["2022", "CVE-2022-35934", "TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-45536", "AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the id parameter at \\admin\\post_comments.php. This vulnerability allows attackers to access database information.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_comments_sql_injection/post_comments_sql_injection.md https://rdyx0.github.io/2018/09/07/AeroCMS-v0.0.1-SQLi%20post_comments_sql_injection/"], ["2022", "CVE-2022-2029", "Cross-site Scripting (XSS) - DOM in GitHub repository kromitgmbh/titra prior to 0.77.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/9052a874-634c-473e-a2b3-65112181543f"], ["2022", "CVE-2022-47522", "The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target's MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target's original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client's pairwise encryption key.", "https://github.com/ARPSyndicate/cvemon https://github.com/domienschepers/wifi-framing https://github.com/vanhoefm/macstealer", "No PoCs from references."], ["2022", "CVE-2022-21337", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28445", "KiteCMS v1.1.1 was discovered to contain an arbitrary file read vulnerability via the background management module.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-39832", "An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.", "No PoCs found on GitHub currently.", "https://savannah.gnu.org/bugs/index.php?63000"], ["2022", "CVE-2022-1351", "Stored XSS in Tooltip in GitHub repository pimcore/pimcore prior to 10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615"], ["2022", "CVE-2022-27938", "stb_image.h (aka the stb image loader) 2.19, as used in libsixel and other products, has a reachable assertion in stbi__create_png_image_raw.", "No PoCs found on GitHub currently.", "https://github.com/saitoha/libsixel/issues/163"], ["2022", "CVE-2022-3254", "The WordPress Classifieds Plugin WordPress plugin before 4.3 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users and when a specific premium module is active, leading to a SQL injection", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660"], ["2022", "CVE-2022-29729", "Verizon 4G LTE Network Extender GA4.38 - V0.4.038.2131 utilizes a weak default admin password generation algorithm which generates passwords that are accessible to unauthenticated attackers via the webUI login page.", "No PoCs found on GitHub currently.", "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php"], ["2022", "CVE-2022-1211", "A vulnerability classified as critical has been found in tildearrow Furnace dev73. This affects the FUR to VGM converter in console mode which causes stack-based overflows and crashes. It is possible to initiate the attack remotely but it requires user-interaction. A POC has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/tildearrow/furnace/issues/325 https://vuldb.com/?id.196371"], ["2022", "CVE-2022-1180", "Reflected Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.", "https://github.com/zn9988/publications", "No PoCs from references."], ["2022", "CVE-2022-34998", "JPEGDEC commit be4843c was discovered to contain a global buffer overflow via JPEGDecodeMCU at /src/jpeg.inl.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-29669", "CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/news/admin/lists/zhuan.", "No PoCs found on GitHub currently.", "https://github.com/chshcms/cscms/issues/20#issue-1207634969"], ["2022", "CVE-2022-42096", "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/CVE-2022-42096 https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2"], ["2022", "CVE-2022-28997", "CSZCMS v1.3.0 allows attackers to execute a Server-Side Request Forgery (SSRF) which can be leveraged to leak sensitive data via a local file inclusion at /admin/filemanager/connector/.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html"], ["2022", "CVE-2022-35666", "Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 17.012.30249 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26786", "Windows Print Spooler Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21277", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30292", "Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sprushed/CVE-2022-30292 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/sprushed/CVE-2022-30292"], ["2022", "CVE-2022-32397", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/view_visit.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md"], ["2022", "CVE-2022-2078", "A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", "https://github.com/ARPSyndicate/cvemon https://github.com/delsploit/CVE-2022-2078 https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/xairy/linux-kernel-exploitation", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85"], ["2022", "CVE-2022-21266", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Pipeline Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Communications Billing and Revenue Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-4565", "A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.8.11 is able to address this issue. It is recommended to upgrade the affected component. VDB-215974 is the identifier assigned to this vulnerability.", "https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-34989", "Fruits Bazar v1.0 was discovered to contain a SQL injection vulnerability via the recover_email parameter at user_password_recover.php.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar"], ["2022", "CVE-2022-3094", "Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This, in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where this has been exploited. Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes. If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only likely to be possible to degrade or stop `named` by sending a flood of unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same detrimental outcome. BIND 9.11 and earlier branches are also affected, but through exhaustion of internal resources rather than memory constraints. This may reduce performance but should not be a significant problem for most servers. Therefore we don't intend to address this for BIND versions prior to BIND 9.16. This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.8-S1 through 9.16.36-S1.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1191", "SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhienit2010/Vulnerability", "https://huntr.dev/bounties/7264a2e1-17e7-4244-93e4-49ec14f282b3"], ["2022", "CVE-2022-37772", "Maarch RM 2.8.3 solution contains an improper restriction of excessive authentication attempts due to excessive verbose responses from the application. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to compromised accounts.", "https://github.com/frame84/vulns", "No PoCs from references."], ["2022", "CVE-2022-42087", "Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot.", "No PoCs found on GitHub currently.", "https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md"], ["2022", "CVE-2022-28986", "LMS Doctor Simple 2 Factor Authentication Plugin For Moodle Affected: 2021072900 has an Insecure direct object references (IDOR) vulnerability, which allows remote attackers to update sensitive records such as email, password and phone number of other user accounts.", "https://github.com/ARPSyndicate/cvemon https://github.com/FlaviuPopescu/CVE-2022-28986 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/FlaviuPopescu/CVE-2022-28986"], ["2022", "CVE-2022-42256", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow in index validation may lead to denial of service, information disclosure, or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-35737", "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.", "https://github.com/ARPSyndicate/cvemon https://github.com/gmh5225/CVE-2022-35737 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rvermeulen/codeql-cve-2022-35737 https://github.com/trailofbits/publications https://github.com/whoforget/CVE-POC https://github.com/wunused/divergent-representations-artifacts https://github.com/youwizard/CVE-POC", "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/"], ["2022", "CVE-2022-3245", "HTML injection attack is closely related to Cross-site Scripting (XSS). HTML injection uses HTML to deface the page. XSS, as the name implies, injects JavaScript into the page. Both attacks exploit insufficient validation of user input.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/747c2924-95ca-4311-9e69-58ee0fb440a0"], ["2022", "CVE-2022-1340", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4746f149-fc55-48a1-a7ab-fd7c7412c05a"], ["2022", "CVE-2022-23223", "On Apache ShenYu versions 2.4.0 and 2.4.1, and endpoint existed that disclosed the passwords of all users. Users are recommended to upgrade to version 2.4.2 or later.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-45436", "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all platforms, allows Cross-Site Scripting (XSS). As a manager privilege user , create a network map containing name as xss payload. Once created, admin user must click on the edit network maps and XSS payload will be executed, which could be used for stealing admin users cookie value.", "https://github.com/ARPSyndicate/cvemon https://github.com/damodarnaik/CVE-2022-45436 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-2129", "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352"], ["2022", "CVE-2022-28454", "Limbas 4.3.36.1319 is vulnerable to Cross Site Scripting (XSS).", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS- https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-21326", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30052", "In Home Clean Service System 1.0, the password parameter is vulnerable to SQL injection attacks.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System"], ["2022", "CVE-2022-44948", "Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Entities Group feature at/index.php?module=entities/entities_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking \"Add\".", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/rukovoditel/issues/8"], ["2022", "CVE-2022-32046", "TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc parameter in the function FUN_0041880c.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules"], ["2022", "CVE-2022-35925", "BookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/"], ["2022", "CVE-2022-23332", "Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field.", "https://github.com/ARPSyndicate/cvemon https://github.com/kyl3song/CVE", "https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332"], ["2022", "CVE-2022-45527", "File upload vulnerability in Future-Depth Institutional Management Website (IMS) 1.0, allows unauthorized attackers to directly upload malicious files to the courseimg directory.", "No PoCs found on GitHub currently.", "https://github.com/Future-Depth/IMS/issues/2"], ["2022", "CVE-2022-37820", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the ddnsEn parameter in the function formSetSysToolDDNS.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8"], ["2022", "CVE-2022-3354", "A vulnerability has been found in Open5GS up to 2.4.10 and classified as problematic. This vulnerability affects unknown code in the library lib/core/ogs-tlv-msg.c of the component UDP Packet Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-209686 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.209686"], ["2022", "CVE-2022-1251", "The Ask me WordPress theme before 6.8.4 does not perform nonce checks when processing POST requests to the Edit Profile page, allowing an attacker to trick a user to change their profile information by sending a crafted request.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349"], ["2022", "CVE-2022-27978", "Tooljet v1.6 does not properly handle missing values in the API, allowing attackers to arbitrarily reset passwords via a crafted HTTP request.", "https://github.com/fourcube/security-advisories", "https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md"], ["2022", "CVE-2022-40302", "An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.", "https://github.com/Forescout/bgp_boofuzzer", "No PoCs from references."], ["2022", "CVE-2022-28794", "Sensitive information exposure in low-battery dumpstate log prior to SMR Jun-2022 Release 1 allows local attackers to get SIM card information.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-21377", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web API). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30003", "Sourcecodester Online Market Place Site 1.0 is vulnerable to Cross Site Scripting (XSS), allowing attackers to register as a Seller then create new products containing XSS payloads in the 'Product Title' and 'Short Description' fields.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168250/omps10-xss.txt"], ["2022", "CVE-2022-4474", "The Easy Social Feed WordPress plugin before 6.4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543"], ["2022", "CVE-2022-44808", "A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-3036", "The Gettext override translations WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa"], ["2022", "CVE-2022-40120", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the search_term parameter at /net-banking/customer_transactions.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection7.md https://github.com/zakee94/online-banking-system/issues/14"], ["2022", "CVE-2022-28924", "An information disclosure vulnerability in UniverSIS-Students before v1.5.0 allows attackers to obtain sensitive information via a crafted GET request to the endpoint /api/students/me/courses/.", "No PoCs found on GitHub currently.", "https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis"], ["2022", "CVE-2022-45645", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceMac parameter in the addWifiMacFilter function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md"], ["2022", "CVE-2022-23050", "ManageEngine AppManager15 (Build No:15510) allows an authenticated admin user to upload a DLL file to perform a DLL hijack attack inside the 'working' folder through the 'Upload Files / Binaries' functionality.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/cerati/"], ["2022", "CVE-2022-32324", "PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-30221", "Windows Graphics Component Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4656", "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.5 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391"], ["2022", "CVE-2022-4716", "The WP Popups WordPress plugin before 2.1.4.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd"], ["2022", "CVE-2022-4487", "The Easy Accordion WordPress plugin before 2.2.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e"], ["2022", "CVE-2022-24770", "`gradio` is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, `gradio` suffers from Improper Neutralization of Formula Elements in a CSV File. The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer. The problem has been patched as of `2.8.11`, which escapes the saved csv with single quotes. As a workaround, avoid opening csv files generated by `gradio` with Excel or similar spreadsheet programs.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42165", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md"], ["2022", "CVE-2022-28864", "An issue was discovered in Nokia NetAct 22 through the Administration of Measurements website section. A malicious user can edit or add the templateName parameter in order to include malicious code, which is then downloaded as a .csv or .xlsx file and executed on a victim machine. Here, the /aom/html/EditTemplate.jsf and /aom/html/ViewAllTemplatesPage.jsf templateName parameter is used.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-3176", "There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-33108", "XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284 https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286 https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287"], ["2022", "CVE-2022-1073", "A vulnerability was found in Automatic Question Paper Generator 1.0. It has been declared as critical. An attack leads to privilege escalation. The attack can be launched remotely.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.194839"], ["2022", "CVE-2022-37781", "fdkaac v1.0.3 was discovered to contain a heap buffer overflow via __interceptor_memcpy.part.46 at /sanitizer_common/sanitizer_common_interceptors.inc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/nu774/fdkaac/issues/54"], ["2022", "CVE-2022-28975", "A stored cross-site scripting (XSS) vulnerability in Infoblox NIOS v8.5.2-409296 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the VLAN View Name field.", "No PoCs found on GitHub currently.", "https://piotrryciak.com/posts/xss-infoblox/"], ["2022", "CVE-2022-45917", "ILIAS before 7.16 has an Open Redirect.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html http://seclists.org/fulldisclosure/2022/Dec/7 https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/"], ["2022", "CVE-2022-4904", "A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.", "https://github.com/seal-community/patches", "No PoCs from references."], ["2022", "CVE-2022-1162", "A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/DarkFunct/CVE_Exploits https://github.com/Greenwolf/CVE-2022-1162 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/ipsBruno/CVE-2022-1162 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/toowoxx/gitlab-password-reset-script https://github.com/trganda/dockerv https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html"], ["2022", "CVE-2022-34679", "NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an unhandled return value can lead to a null-pointer dereference, which may lead to denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-4596", "A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191.", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Dec/11"], ["2022", "CVE-2022-28676", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16643.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-45614", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-4228. Reason: This candidate is a reservation duplicate of CVE-2022-4228. Notes: All CVE users should reference CVE-2022-4228 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "No PoCs found on GitHub currently.", "https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash"], ["2022", "CVE-2022-23001", "When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities"], ["2022", "CVE-2022-23390", "An issue in the getType function of BBS Forum v5.3 and below allows attackers to upload arbitrary files.", "No PoCs found on GitHub currently.", "https://github.com/diyhi/bbs/issues/51"], ["2022", "CVE-2022-21295", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30270", "The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-28736", "There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.", "https://github.com/ARPSyndicate/cvemon https://github.com/EuroLinux/shim-review https://github.com/Jurij-Ivastsuk/WAXAR-shim-review https://github.com/NaverCloudPlatform/shim-review https://github.com/Rodrigo-NR/shim-review https://github.com/coreyvelan/shim-review https://github.com/ctrliq/ciq-shim-build https://github.com/ctrliq/shim-review https://github.com/lenovo-lux/shim-review https://github.com/neppe/shim-review https://github.com/ozun215/shim-review https://github.com/puzzleos/uefi-shim_review https://github.com/rhboot/shim-review https://github.com/vathpela/shim-review", "No PoCs from references."], ["2022", "CVE-2022-32235", "When a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-30330", "In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.", "https://github.com/etheralpha/dailydoots-com", "https://blog.inhq.net/posts/keepkey-CVE-2022-30330/"], ["2022", "CVE-2022-26927", "Windows Graphics Component Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/CrackerCat/CVE-2022-26927 https://github.com/Exploitables/CVE-2022-26927 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4747", "The Post Category Image With Grid and Slider WordPress plugin before 1.4.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc"], ["2022", "CVE-2022-3127", "Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 20.2.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6cea89d1-39dc-4023-82fa-821f566b841a"], ["2022", "CVE-2022-4844", "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3"], ["2022", "CVE-2022-1022", "Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2e4ac6b5-7357-415d-9633-65c636b20e94"], ["2022", "CVE-2022-47952", "lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may allow local users to infer whether any file exists, even within a protected directory tree, because \"Failed to open\" often indicates that a file does not exist, whereas \"does not refer to a network namespace path\" often indicates that a file exists. NOTE: this is different from CVE-2018-6556 because the CVE-2018-6556 fix design was based on the premise that \"we will report back to the user that the open() failed but the user has no way of knowing why it failed\"; however, in many realistic cases, there are no plausible reasons for failing except that the file does not exist.", "https://github.com/MaherAzzouzi/CVE-2022-47952 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-26624", "Bootstrap v3.1.11 and v3.3.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the Title parameter in /vendor/views/add_product.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing"], ["2022", "CVE-2022-42233", "Tenda 11N with firmware version V5.07.33_cn suffers from an Authentication Bypass vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "No PoCs from references."], ["2022", "CVE-2022-25849", "The package joyqi/hyper-down from 0.0.0 are vulnerable to Cross-site Scripting (XSS) because the module of parse markdown does not filter the href attribute very well.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544"], ["2022", "CVE-2022-3220", "The Advanced Comment Form WordPress plugin before 1.2.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef"], ["2022", "CVE-2022-1325", "A flaw was found in Clmg, where with the help of a maliciously crafted pandore or bmp file with modified dx and dy header field values it is possible to trick the application into allocating huge buffer sizes like 64 Gigabyte upon reading the file from disk or from a virtual buffer.", "https://github.com/7unn3l/CImg-fuzzer https://github.com/ARPSyndicate/cvemon", "https://github.com/GreycLab/CImg/issues/343 https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/"], ["2022", "CVE-2022-28431", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&social=remove&sid=2.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-30037", "XunRuiCMS v4.3.3 to v4.5.1 vulnerable to PHP file write and CMS PHP file inclusion, allows attackers to execute arbitrary php code, via the add function in cron.php.", "No PoCs found on GitHub currently.", "https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/"], ["2022", "CVE-2022-35911", "** DISPUTED ** On Patlite NH-FB series devices through 1.46, remote attackers can cause a denial of service by omitting the query string. NOTE: the vendor's perspective is that \"omitting the query string does not cause a denial of service and the indicated event can not be reproduced.\"", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html"], ["2022", "CVE-2022-28571", "D-link 882 DIR882A1_FW130B06 was discovered to contain a command injection vulnerability in`/usr/bin/cli.", "https://github.com/ARPSyndicate/cvemon https://github.com/F0und-icu/CVE-2022-28571-28573 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/F0und-icu/TempName/tree/main/Dlink-882 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-45513", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md"], ["2022", "CVE-2022-37814", "Tenda AC1206 V15.03.06.23 was discovered to contain multiple stack overflows via the deviceMac and the device_id parameters in the function addWifiMacFilter.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14"], ["2022", "CVE-2022-21192", "All versions of the package serve-lite are vulnerable to Directory Traversal due to missing input sanitization or other checks and protections employed to the req.url passed as-is to path.join().", "No PoCs found on GitHub currently.", "https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0 https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916"], ["2022", "CVE-2022-46879", "Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4691", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f"], ["2022", "CVE-2022-48668", "In the Linux kernel, the following vulnerability has been resolved:smb3: fix temporary data corruption in collapse rangecollapse range doesn't discard the affected cached regionso can risk temporarily corrupting the file data. Thisfixes xfstest generic/031I also decided to merge a minor cleanup to this into the same patch(avoiding rereading inode size repeatedly unnecessarily) to make itclearer.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-38569", "Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow in the function formDelAd.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd"], ["2022", "CVE-2022-3360", "The LearnPress WordPress plugin before 4.1.7.2 unserialises user input in a REST API endpoint available to unauthenticated users, which could lead to PHP Object Injection when a suitable gadget is present, leadint to remote code execution (RCE). To successfully exploit this vulnerability attackers must have knowledge of the site secrets, allowing them to generate a valid hash via the wp_hash() function.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3"], ["2022", "CVE-2022-1265", "The BulletProof Security WordPress plugin before 6.1 does not sanitize and escape some of its CAPTCHA settings, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758"], ["2022", "CVE-2022-35612", "A cross-site scripting (XSS) vulnerability in MQTTRoute v3.3 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the dashboard name text field.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35612.html"], ["2022", "CVE-2022-35583", "wkhtmlTOpdf 0.12.6 is vulnerable to SSRF which allows an attacker to get initial access into the target's system by injecting iframe tag with initial asset IP address on it's source. This allows the attacker to takeover the whole infrastructure by accessing their internal assets.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing"], ["2022", "CVE-2022-25818", "Improper boundary check in UWB stack prior to SMR Mar-2022 Release 1 allows arbitrary code execution.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3"], ["2022", "CVE-2022-4883", "A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.", "https://github.com/1g-v/DevSec_Docker_lab https://github.com/L-ivan7/-.-DevSec_Docker", "No PoCs from references."], ["2022", "CVE-2022-45890", "In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter).", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-42262", "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where an input index is not validated, which may lead to buffer overrun, which in turn may cause data tampering, information disclosure, or denial of service.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-39817", "In NOKIA 1350 OMS R14.2, multiple SQL Injection vulnerabilities occurs. Exploitation requires an authenticated attacker. Through the injection of arbitrary SQL statements, a potential authenticated attacker can modify query syntax and perform unauthorized (and unexpected) operations against the remote database.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-35703", "Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-47696", "An issue was discovered Binutils objdump before 2.39.3 allows attackers to cause a denial of service or other unspecified impacts via function compare_symbols.", "No PoCs found on GitHub currently.", "https://sourceware.org/bugzilla/show_bug.cgi?id=29677"], ["2022", "CVE-2022-0389", "The WP Time Slots Booking Form WordPress plugin before 1.1.63 does not sanitise and escape Calendar names, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b"], ["2022", "CVE-2022-21312", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-46968", "A stored cross-site scripting (XSS) vulnerability in /index.php?page=help of Revenue Collection System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into sent messages.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html"], ["2022", "CVE-2022-46828", "In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible.", "https://github.com/punggawacybersecurity/CVE-List", "No PoCs from references."], ["2022", "CVE-2022-4551", "The Rich Table of Contents WordPress plugin before 1.3.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659"], ["2022", "CVE-2022-23357", "mozilo2.0 was discovered to be vulnerable to directory traversal attacks via the parameter curent_dir.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE-1 https://github.com/truonghuuphuc/CVE", "No PoCs from references."], ["2022", "CVE-2022-45542", "EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter \"filename\" when editing any file.", "https://github.com/Srpopty/Corax", "https://github.com/weng-xianhu/eyoucms/issues/33"], ["2022", "CVE-2022-0158", "vim is vulnerable to Heap-based Buffer Overflow", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b"], ["2022", "CVE-2022-30126", "In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21252", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/binganao/vulns-2022 https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-1234", "XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior to 3.97. This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user\u2019s device.", "https://github.com/ARPSyndicate/cvemon https://github.com/BugBlocker/lotus-scripts https://github.com/CVEDB/cvelib https://github.com/CVELab/cvelib https://github.com/Cavid370/CVE_Report https://github.com/RedHatProductSecurity/cvelib https://github.com/Symbolexe/SHIFU https://github.com/andrescl94/vuln-management-api https://github.com/briandfoy/cpan-security-advisory https://github.com/clearbluejar/cve-markdown-charts https://github.com/khulnasoft-lab/vulnmap-ls https://github.com/khulnasoft/khulnasoft-ls https://github.com/kwalsh-rz/github-action-ecr-scan-test https://github.com/rusty-sec/lotus-scripts https://github.com/snyk/snyk-ls https://github.com/trickest/find-gh-poc", "No PoCs from references."], ["2022", "CVE-2022-32201", "In libjpeg 1.63, there is a NULL pointer dereference in Component::SubXOf in component.hpp.", "No PoCs found on GitHub currently.", "https://github.com/thorfdbg/libjpeg/issues/73"], ["2022", "CVE-2022-32190", "JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath(\"https://go.dev\", \"../go\") returns the URL \"https://go.dev/../go\", despite the JoinPath documentation stating that ../ path elements are removed from the result.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrKsey/AdGuardHome https://github.com/chair6/test-go-container-images https://github.com/cokeBeer/go-cves https://github.com/finnigja/test-go-container-images", "No PoCs from references."], ["2022", "CVE-2022-24816", "JAI-EXT is an open-source project which aims to extend the Java Advanced Imaging (JAI) API. Programs allowing Jiffle script to be provided via network request can lead to a Remote Code Execution as the Jiffle script is compiled into Java code via Janino, and executed. In particular, this affects the downstream GeoServer project. Version 1.2.22 will contain a patch that disables the ability to inject malicious code into the resulting script. Users unable to upgrade may negate the ability to compile Jiffle scripts from the final application, by removing janino-x.y.z.jar from the classpath.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-26913", "Windows Authentication Information Disclosure Vulnerability", "https://github.com/aapooksman/certmitm", "No PoCs from references."], ["2022", "CVE-2022-47665", "Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int)", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/369"], ["2022", "CVE-2022-47966", "Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).", "https://github.com/20142995/Goby https://github.com/ACE-Responder/CVE-2022-47966_checker https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Inplex-sys/CVE-2022-47966 https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Threekiii/CVE https://github.com/UNC1739/awesome-vulnerability-research https://github.com/aneasystone/github-trending https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/horizon3ai/CVE-2022-47966 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/p33d/CVE-2022-47966 https://github.com/santosomar/kev_checker https://github.com/shameem-testing/PoC-for-ME-SAML-Vulnerability https://github.com/stalker3343/diplom https://github.com/tanjiti/sec_profile https://github.com/vonahisec/CVE-2022-47966-Scan https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zhiqingfeng/H2-Goat https://github.com/zhiqingff/H2-Goat https://github.com/zhiqingfff/H2-Goat", "http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis https://github.com/horizon3ai/CVE-2022-47966 https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/"], ["2022", "CVE-2022-40005", "Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute.", "No PoCs found on GitHub currently.", "https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/ https://seclists.org/fulldisclosure/2022/Dec/13"], ["2022", "CVE-2022-26581", "PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an unauthorized attacker to perform privileged actions through the execution of specific binaries listed in ADB daemon. The attacker must have physical USB access to the device in order to exploit this vulnerability.", "https://github.com/fkie-cad/nvd-json-data-feeds", "https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/"], ["2022", "CVE-2022-24715", "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.", "https://github.com/0xsyr0/OSCP https://github.com/ARPSyndicate/cvemon https://github.com/JacobEbben/CVE-2022-24715 https://github.com/SirElmard/ethical_hacking https://github.com/cxdxnt/CVE-2022-24715 https://github.com/d4rkb0n3/CVE-2022-24715-go https://github.com/hheeyywweellccoommee/CVE-2022-24715-crrxa https://github.com/karimhabush/cyberowl https://github.com/kgwanjala/oscp-cheatsheet https://github.com/nomi-sec/PoC-in-GitHub https://github.com/oscpname/OSCP_cheat https://github.com/revanmalang/OSCP https://github.com/txuswashere/OSCP https://github.com/xhref/OSCP", "http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html"], ["2022", "CVE-2022-42100", "KLiK SocialMediaWebsite Version 1.0.1 has XSS vulnerabilities that allow attackers to store XSS via location input reply-form.", "No PoCs found on GitHub currently.", "https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-reply-form-b189147c1f93"], ["2022", "CVE-2022-3282", "The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.5 does not properly check for the upload size limit set in forms, taking the value from user input sent when submitting the form. As a result, attackers could control the file length limit and bypass the limit set by admins in the contact form.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c"], ["2022", "CVE-2022-3113", "An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.", "No PoCs found on GitHub currently.", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0"], ["2022", "CVE-2022-1387", "The No Future Posts WordPress plugin through 1.4 does not escape its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347"], ["2022", "CVE-2022-1016", "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/ndk191/linux-kernel-exploitation https://github.com/ssr-111/linux-kernel-exploitation https://github.com/xairy/linux-kernel-exploitation https://github.com/yaobinwen/robin_on_rails https://github.com/zanezhub/CVE-2022-1015-1016", "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"], ["2022", "CVE-2022-46698", "A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may disclose sensitive user information.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/23 http://seclists.org/fulldisclosure/2022/Dec/26 http://seclists.org/fulldisclosure/2022/Dec/27 http://seclists.org/fulldisclosure/2022/Dec/28"], ["2022", "CVE-2022-1156", "The Books & Papers WordPress plugin through 0.20210223 does not escape its Custom DB prefix settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac"], ["2022", "CVE-2022-37424", "Files or Directories Accessible to External Parties vulnerability in OpenNebula on Linux allows File Discovery.", "No PoCs found on GitHub currently.", "https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/"], ["2022", "CVE-2022-24655", "A stack overflow vulnerability exists in the upnpd service in Netgear EX6100v1 201.0.2.28, CAX80 2.1.2.6, and DC112A 1.0.0.62, which may lead to the execution of arbitrary code without authentication.", "No PoCs found on GitHub currently.", "https://kb.netgear.com/000064615/Security-Advisory-for-Pre-Authentication-Command-Injection-on-EX6100v1-and-Pre-Authentication-Stack-Overflow-on-Multiple-Products-PSV-2021-0282-PSV-2021-0288"], ["2022", "CVE-2022-35521", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi"], ["2022", "CVE-2022-45923", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Common Gateway Interface (CGI) program cs.exe allows an attacker to increase/decrease an arbitrary memory address by 1 and trigger a call to a method of a vftable with a vftable pointer value chosen by the attacker.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2023/Jan/10 https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/"], ["2022", "CVE-2022-24956", "An issue was discovered in Shopware B2B-Suite through 4.4.1. The sort-by parameter of the search functionality of b2border and b2borderlist allows SQL injection. Possible techniques are boolean-based blind, time-based blind, and potentially stacked queries. The vulnerability allows a remote authenticated attacker to dump the underlying database.", "No PoCs found on GitHub currently.", "https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt"], ["2022", "CVE-2022-30244", "Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.", "No PoCs found on GitHub currently.", "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security"], ["2022", "CVE-2022-39427", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", "https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-32250", "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", "https://github.com/ARPSyndicate/cvemon https://github.com/Decstor5/2022-32250LPE https://github.com/EGI-Federation/SVG-advisories https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/Trickhish/automated_privilege_escalation https://github.com/WhooAmii/POC_to_review https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/felixfu59/kernel-hack https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhdz-06/linux-kernel-exploitation https://github.com/khanhdz191/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/khanhnd123/linux-kernel-exploitation https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/substing/internal_ctf https://github.com/theori-io/CVE-2022-32250-exploit https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/ysanatomic/CVE-2022-32250-LPE https://github.com/zecool/cve", "http://www.openwall.com/lists/oss-security/2022/06/03/1 http://www.openwall.com/lists/oss-security/2022/08/25/1 http://www.openwall.com/lists/oss-security/2022/09/02/9 https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/ https://bugzilla.redhat.com/show_bug.cgi?id=2092427 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd https://www.openwall.com/lists/oss-security/2022/05/31/1"], ["2022", "CVE-2022-23124", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15870.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-26942", "The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-25428", "Tenda AC9 v15.03.2.21 was discovered to contain a stack overflow via the deviceId parameter in the saveparentcontrolinfo function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3"], ["2022", "CVE-2022-4722", "Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58"], ["2022", "CVE-2022-3142", "The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.", "https://github.com/ARPSyndicate/cvemon https://github.com/Carmofrasao/TCC https://github.com/ehtec/nex-forms-exploit", "http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5 https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328"], ["2022", "CVE-2022-1047", "The Themify Post Type Builder Search Addon WordPress plugin before 1.4.0 does not properly escape the current page URL before reusing it in a HTML attribute, leading to a reflected cross site scripting vulnerability.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b"], ["2022", "CVE-2022-26641", "TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the httpRemotePort parameter.", "No PoCs found on GitHub currently.", "https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf"], ["2022", "CVE-2022-47877", "A Stored cross-site scripting vulnerability in Jedox 2020.2.5 allows remote, authenticated users to inject arbitrary web script or HTML in the Logs page via the log module 'log'.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html"], ["2022", "CVE-2022-40114", "Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/edit_customer.php.", "No PoCs found on GitHub currently.", "https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection5.md https://github.com/zakee94/online-banking-system/issues/16"], ["2022", "CVE-2022-26490", "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "https://github.com/ARPSyndicate/cvemon https://github.com/evdenis/cvehound", "No PoCs from references."], ["2022", "CVE-2022-26701", "A race condition was addressed with improved locking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24595", "Automotive Grade Linux Kooky Koi 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, and 11.0.5 is affected by Incorrect Access Control in usr/bin/afb-daemon. To exploit the vulnerability, an attacker should send a well-crafted HTTP (or WebSocket) request to the socket listened by the afb-daemon process. No credentials nor user interactions are required.", "No PoCs found on GitHub currently.", "https://youtu.be/E-ZTuWSg-JU"], ["2022", "CVE-2022-42011", "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.", "https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-28910", "TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the devicename parameter in /setting/setDeviceName.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/9"], ["2022", "CVE-2022-3393", "The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e"], ["2022", "CVE-2022-3002", "Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d213d7ea-fe92-40b2-a1f9-2ba32dec50f5"], ["2022", "CVE-2022-1296", "Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0"], ["2022", "CVE-2022-36488", "TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10"], ["2022", "CVE-2022-25568", "MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ArrestX/--POC https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/Threekiii/Awesome-POC https://github.com/d4n-sec/d4n-sec.github.io", "https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/"], ["2022", "CVE-2022-45671", "Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the appData parameter in the formSetAppFilterRule function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md"], ["2022", "CVE-2022-28582", "It is found that there is a command injection vulnerability in the setWiFiSignalCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6"], ["2022", "CVE-2022-23064", "In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.", "No PoCs found on GitHub currently.", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064"], ["2022", "CVE-2022-32310", "An access control issue in Ingredient Stock Management System v1.0 allows attackers to take over user accounts via a crafted POST request to /isms/classes/Users.php.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html"], ["2022", "CVE-2022-32081", "MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26420"], ["2022", "CVE-2022-22994", "A remote code execution vulnerability was discovered on Western Digital My Cloud devices where an attacker could trick a NAS device into loading through an unsecured HTTP call. This was a result insufficient verification of calls to the device. The vulnerability was addressed by disabling checks for internet connectivity using HTTP.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-36117", "An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for an authenticated user to reverse engineer the Blue Prism software and circumvent access controls for an administrative function. If credential access is configured to be accessible by a machine or the runtime resource security group, using further reverse engineering, an attacker can spoof a known machine and request known encrypted credentials to decrypt later.", "No PoCs found on GitHub currently.", "https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise"], ["2022", "CVE-2022-31874", "ASUS RT-N53 3.0.0.4.376.3754 has a command injection vulnerability in the SystemCmd parameter of the apply.cgi interface.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md"], ["2022", "CVE-2022-27263", "An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.", "No PoCs found on GitHub currently.", "https://github.com/strapi/strapi"], ["2022", "CVE-2022-0465", "Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20792", "A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-1709", "The Throws SPAM Away WordPress plugin before 3.3.1 does not have CSRF checks in place when deleting comments (either all, spam, or pending), allowing attackers to make a logged in admin delete comments via a CSRF attack", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc"], ["2022", "CVE-2022-44313", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceUnsignedInteger function in expression.c when called from ExpressionParseFunctionCall.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-1649", "Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449"], ["2022", "CVE-2022-0525", "Out-of-bounds Read in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e19e109f-acf0-4048-8ee8-1b10a870f1e9"], ["2022", "CVE-2022-40959", "During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1782211"], ["2022", "CVE-2022-2420", "A vulnerability was found in URVE Web Manager. It has been rated as critical. This issue affects some unknown processing of the file _internal/uploader.php. The manipulation leads to unrestricted upload. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md"], ["2022", "CVE-2022-25226", "ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/sinatra/"], ["2022", "CVE-2022-0434", "The Page View Count WordPress plugin before 2.4.15 does not sanitise and escape the post_ids parameter before using it in a SQL statement via a REST endpoint, available to both unauthenticated and authenticated users. As a result, unauthenticated attackers could perform SQL injection attacks", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1"], ["2022", "CVE-2022-2531", "An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab was not performing correct authentication on Grafana API under specific conditions allowing unauthenticated users to perform queries through a path traversal vulnerability.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/364252"], ["2022", "CVE-2022-41427", "Bento4 v1.6.0-639 was discovered to contain a memory leak in the AP4_AvcFrameParser::Feed function in mp4mux.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/772"], ["2022", "CVE-2022-36146", "SWFMill commit 53d7690 was discovered to contain a memory allocation issue via operator new[](unsigned long) at asan_new_delete.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/65"], ["2022", "CVE-2022-20452", "In initializeFromParcelLocked of BaseBundle.java, there is a possible method arbitrary code execution due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240138318", "https://github.com/ARPSyndicate/cvemon https://github.com/aneasystone/github-trending https://github.com/gmh5225/awesome-game-security https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/michalbednarski/LeakValue https://github.com/nanaroam/kaditaroam https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tanjiti/sec_profile https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1758", "The Genki Pre-Publish Reminder WordPress plugin through 1.4.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and lead to Stored XSS as well as RCE when custom code is added via the plugin settings.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b"], ["2022", "CVE-2022-38054", "In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29320", "MiniTool Partition Wizard v12.0 contains an unquoted service path which allows attackers to escalate privileges to the system level.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50859"], ["2022", "CVE-2022-23878", "seacms V11.5 is affected by an arbitrary code execution vulnerability in admin_config.php.", "No PoCs found on GitHub currently.", "https://blog.csdn.net/miuzzx/article/details/122249953"], ["2022", "CVE-2022-30998", "Multiple Authenticated (subscriber or higher user role) SQL Injection (SQLi) vulnerabilities in WooPlugins.co's Homepage Product Organizer for WooCommerce plugin <= 1.1 at WordPress.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-1618", "The Coru LFMember WordPress plugin through 1.0.2 does not have CSRF check in place when adding a new game, and is lacking sanitisation as well as escaping in their settings, allowing attacker to make a logged in admin add an arbitrary game with XSS payloads", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/"], ["2022", "CVE-2022-46096", "A Cross site scripting (XSS) vulnerability in Sourcecodester Online Covid-19 Directory on Vaccination System v1.0 allows attackers to execute arbitrary code via the txtfullname parameter or txtphone parameter to register.php without logging in.", "No PoCs found on GitHub currently.", "https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc2/covid-19-vaccination2.md"], ["2022", "CVE-2022-1589", "The Change wp-admin login WordPress plugin before 1.1.0 does not properly check for authorisation and is also missing CSRF check when updating its settings, which could allow unauthenticated users to change the settings. The attacked could also be performed via a CSRF vector", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633"], ["2022", "CVE-2022-44202", "D-Link DIR878 1.02B04 and 1.02B05 are vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-22885", "Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.", "https://github.com/ARPSyndicate/cvemon https://github.com/miguelc49/CVE-2022-22885-1 https://github.com/miguelc49/CVE-2022-22885-2 https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-34292", "Docker Desktop for Windows before 4.6.0 allows attackers to overwrite any file through a symlink attack on the hyperv/create dockerBackendV2 API by controlling the DataFolder parameter for DockerDesktop.vhdx, a similar issue to CVE-2022-31647.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2"], ["2022", "CVE-2022-0574", "Improper Access Control in GitHub repository publify/publify prior to 9.2.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/6f322c84-9e20-4df6-97e8-92bc271ede3f"], ["2022", "CVE-2022-2471", "Stack-based Buffer Overflow vulnerability in the EZVIZ Motion Detection component as used in camera models CS-CV248, CS-C6N-A0-1C2WFR, CS-DB1C-A0-1E2W2FR, CS-C6N-B0-1G2WF, CS-C3W-A0-3H4WFRL allows a remote attacker to execute remote code on the device. This issue affects: EZVIZ CS-CV248 versions prior to 5.2.3 build 220725. EZVIZ CS-C6N-A0-1C2WFR versions prior to 5.3.0 build 220428. EZVIZ CS-DB1C-A0-1E2W2FR versions prior to 5.3.0 build 220802. EZVIZ CS-C6N-B0-1G2WF versions prior to 5.3.0 build 220712. EZVIZ CS-C3W-A0-3H4WFRL versions prior to 5.3.5 build 220723.", "No PoCs found on GitHub currently.", "https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams"], ["2022", "CVE-2022-39278", "Istio is an open platform-independent service mesh that provides traffic management, policy enforcement, and telemetry collection. Prior to versions 1.15.2, 1.14.5, and 1.13.9, the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message which results in the control plane crashing when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially external istiod topologies, this port is exposed over the public internet. Versions 1.15.2, 1.14.5, and 1.13.9 contain patches for this issue. There are no effective workarounds, beyond upgrading. This bug is due to an error in `regexp.Compile` in Go.", "https://github.com/ARPSyndicate/cvemon https://github.com/ssst0n3/docker_archive", "No PoCs from references."], ["2022", "CVE-2022-2950", "Altair HyperView Player versions 2021.1.0.27 and prior are vulnerable to the use of uninitialized memory vulnerability during parsing of H3D files. A DWORD is extracted from an uninitialized buffer and, after sign extension, is used as an index into a stack variable to increment a counter leading to memory corruption.", "No PoCs found on GitHub currently.", "https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01"], ["2022", "CVE-2022-24339", "JetBrains TeamCity before 2021.2.1 was vulnerable to stored XSS.", "https://github.com/ARPSyndicate/cvemon https://github.com/yuriisanin/whoami https://github.com/yuriisanin/yuriisanin", "No PoCs from references."], ["2022", "CVE-2022-41846", "An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/342 https://github.com/axiomatic-systems/Bento4/issues/770"], ["2022", "CVE-2022-22635", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4. An application may be able to gain elevated privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44020", "An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an \"unsupported, production-like configuration.\"", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22936", "An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/saltstack/salt/releases,"], ["2022", "CVE-2022-36224", "XunRuiCMS V4.5.6 is vulnerable to Cross Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://github.com/dayrui/xunruicms/issues/1"], ["2022", "CVE-2022-0756", "Missing Authorization in GitHub repository salesagility/suitecrm prior to 7.12.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/55164a63-62e4-4fb6-b4ca-87eca14f6f31"], ["2022", "CVE-2022-30728", "Information exposure vulnerability in ScanPool prior to SMR Jun-2022 Release 1 allows local attackers to get MAC address information.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6"], ["2022", "CVE-2022-2653", "With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70"], ["2022", "CVE-2022-0587", "Improper Authorization in Packagist librenms/librenms prior to 22.2.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/faisalfs10x/CVE-IDs", "https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469"], ["2022", "CVE-2022-0616", "The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0"], ["2022", "CVE-2022-2713", "Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3080fc96-75d7-4868-84de-9fc8c9b90290"], ["2022", "CVE-2022-25115", "A remote code execution (RCE) vulnerability in the Avatar parameter under /admin/?page=user/manage_user of Home Owners Collection Management System v1.0 allows attackers to execute arbitrary code via a crafted PNG file.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management"], ["2022", "CVE-2022-48177", "X2CRM Open Source Sales CRM 6.6 and 6.9 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the adin/importModels Import Records Model field (model parameter). This vulnerability allows attackers to create malicious JavaScript that will be executed by the victim user's browser.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html"], ["2022", "CVE-2022-31504", "The ChangeWeDer/BaiduWenkuSpider_flaskWeb repository before 2021-11-29 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-24279", "The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572"], ["2022", "CVE-2022-46174", "efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer\u2019s local mount points to that customer\u2019s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31415", "Online Fire Reporting System v1.0 was discovered to contain a SQL injection vulnerability via the GET parameter in /report/list.php.", "No PoCs found on GitHub currently.", "https://researchinthebin.org/posts/ofrs-sql-injection/"], ["2022", "CVE-2022-22664", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Logic Pro 10.7.3, GarageBand 10.4.6, macOS Monterey 12.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/brandonprry/apple_midi https://github.com/koronkowy/koronkowy", "No PoCs from references."], ["2022", "CVE-2022-33681", "Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before verifying the server\u2019s TLS certificate matches the hostname, which means authentication data could be exposed to an attacker. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. Because the client sends authentication data before performing hostname verification, an attacker could gain access to the client\u2019s authentication data. The client eventually closes the connection when it verifies the hostname and identifies the targeted hostname does not match a hostname on the certificate. Because the client eventually closes the connection, the value of the intercepted authentication data depends on the authentication method used by the client. Token based authentication and username/password authentication methods are vulnerable because the authentication data can be used to impersonate the client in a separate session. This issue affects Apache Pulsar Java Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29013", "A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html https://www.exploit-db.com/exploits/50865"], ["2022", "CVE-2022-2901", "Improper Authorization in GitHub repository chatwoot/chatwoot prior to 2.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cf46e0a6-f1b5-4959-a952-be9e4bac03fe"], ["2022", "CVE-2022-24368", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16115.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-0496", "A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import().", "No PoCs found on GitHub currently.", "https://github.com/openscad/openscad/issues/4037"], ["2022", "CVE-2022-47189", "Generex UPS CS141 below 2.06 version, allows an attacker toupload a firmware file containing an incorrect configuration, in order to disrupt the normal functionality of the device.", "https://github.com/JoelGMSec/Thunderstorm", "No PoCs from references."], ["2022", "CVE-2022-0707", "The Easy Digital Downloads WordPress plugin before 2.11.6 does not have CSRF check in place when inserting payment notes, which could allow attackers to make a logged admin insert arbitrary notes via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117"], ["2022", "CVE-2022-30779", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "No PoCs found on GitHub currently.", "https://github.com/1nhann/vulns/issues/2"], ["2022", "CVE-2022-2593", "The Better Search Replace WordPress plugin before 1.4.1 does not properly sanitise and escape table data before inserting it into a SQL query, which could allow high privilege users to perform SQL Injection attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41"], ["2022", "CVE-2022-2602", "io_uring UAF, Unix SCM garbage collection", "https://github.com/ARPSyndicate/cvemon https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits https://github.com/LukeGix/CVE-2022-2602 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Snoopy-Sec/Localroot-ALL-CVE https://github.com/XiaozaYa/CVE-Recording https://github.com/bsauce/kernel-exploit-factory https://github.com/bsauce/kernel-security-learning https://github.com/felixfu59/kernel-hack https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/k0mi-tg/CVE-POC https://github.com/kdn111/linux-kernel-exploitation https://github.com/khanhdn111/linux-kernel-exploitation https://github.com/khanhhdz/linux-kernel-exploitation https://github.com/khanhhdz06/linux-kernel-exploitation https://github.com/kiks7/CVE-2022-2602-Kernel-Exploit https://github.com/knd06/linux-kernel-exploitation https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/ndk191/linux-kernel-exploitation https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ssr-111/linux-kernel-exploitation https://github.com/th3-5had0w/CVE-2022-2602-Study https://github.com/whoforget/CVE-POC https://github.com/xairy/linux-kernel-exploitation https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html https://ubuntu.com/security/notices/USN-5693-1"], ["2022", "CVE-2022-25395", "Cosmetics and Beauty Product Online Store v1.0 was discovered to contain multiple reflected cross-site scripting (XSS) attacks via the search parameter under the /cbpos/ app.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store"], ["2022", "CVE-2022-25004", "Hospital Patient Record Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/doctors/manage_doctor.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004/"], ["2022", "CVE-2022-27290", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formSetWanDhcpplus. This vulnerability allows attackers to cause a Denial of Service (DoS) via the curTime parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-31887", "Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover"], ["2022", "CVE-2022-48126", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the username parameter in the setting/setOpenVpnCertGenerationCfg function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/12"], ["2022", "CVE-2022-22827", "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/fokypoky/places-list https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nanopathi/external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27041", "Due to lack of protection, parameter student_id in OpenSIS Classic 8.0 /modules/eligibility/Student.php can be used to inject SQL queries to extract information from databases.", "No PoCs found on GitHub currently.", "https://github.com/OS4ED/openSIS-Classic/issues/248"], ["2022", "CVE-2022-41654", "An authentication bypass vulnerability exists in the newsletter subscription functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624"], ["2022", "CVE-2022-0647", "The Bulk Creator WordPress plugin through 1.0.1 does not sanitize and escape the post_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a"], ["2022", "CVE-2022-2841", "A vulnerability was found in CrowdStrike Falcon 6.31.14505.0/6.42.15610/6.44.15806. It has been classified as problematic. Affected is an unknown function of the component Uninstallation Handler. The manipulation leads to missing authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.40.15409, 6.42.15611 and 6.44.15807 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-206880.", "https://github.com/ARPSyndicate/cvemon https://github.com/gmh5225/CVE-2022-44721-CsFalconUninstaller", "https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html https://youtu.be/3If-Fqwx-4s"], ["2022", "CVE-2022-37059", "Cross Site Scripting (XSS) in Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via Login Field", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/RashidKhanPathan/Security-Research https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit", "No PoCs from references."], ["2022", "CVE-2022-0944", "Template injection in connection test endpoint leads to RCE in GitHub repository sqlpad/sqlpad prior to 6.10.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/46630727-d923-4444-a421-537ecd63e7fb"], ["2022", "CVE-2022-31555", "The romain20100/nursequest repository through 2018-02-22 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-38227", "XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-29153", "HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cokeBeer/go-cves", "No PoCs from references."], ["2022", "CVE-2022-0540", "A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.", "https://github.com/20142995/Goby https://github.com/20142995/pocsuite3 https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AdamCrosser/awesome-vuln-writeups https://github.com/HimmelAward/Goby_POC https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Pear1y/CVE-2022-0540-RCE https://github.com/SYRTI/POC_to_review https://github.com/StarCrossPortal/scalpel https://github.com/UGF0aWVudF9aZXJv/Atlassian-Jira-pentesting https://github.com/UNC1739/awesome-vulnerability-research https://github.com/Wang-yuyang/Vulnerabilit-Exploit-Library https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/alveraboquet/Vulnerabilit-Exploit-Library https://github.com/anonymous364872/Rapier_Tool https://github.com/anquanscan/sec-tools https://github.com/apif-review/APIF_tool_2024 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pipiscrew/timeline https://github.com/trganda/dockerv https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/wuerror/pocsuite3_pocs https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youcans896768/APIV_Tool https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27346", "Ecommece-Website v1.1.0 was discovered to contain an arbitrary file upload vulnerability via /admin/index.php?slides. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC"], ["2022", "CVE-2022-25303", "The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinja.palletsprojects.com/en/3.1.x/templates/working-with-automatic-escaping), meaning the user input is not escaped.", "https://github.com/dellalibera/dellalibera", "https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306"], ["2022", "CVE-2022-4398", "Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2"], ["2022", "CVE-2022-41413", "perfSONAR v4.x <= v4.4.5 was discovered to contain a Cross-Site Request Forgery (CSRF) which is triggered when an attacker injects crafted input into the Search function.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/renmizo/CVE-2022-41413 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html https://github.com/renmizo/CVE-2022-41413"], ["2022", "CVE-2022-27206", "Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe", "No PoCs from references."], ["2022", "CVE-2022-2505", "Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-42979", "Information disclosure due to an insecure hostname validation in the RYDE application 5.8.43 for Android and iOS allows attackers to take over an account via a deep link.", "https://github.com/ARPSyndicate/cvemon", "https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8"], ["2022", "CVE-2022-2694", "A vulnerability was found in SourceCodester Company Website CMS and classified as critical. This issue affects some unknown processing. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205817 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205817"], ["2022", "CVE-2022-28078", "Home Owners Collection Management v1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Admin panel via the $_GET['page'] parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/ColordStudio/CVE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigzooooz/CVE-2022-28078 https://github.com/bigzooooz/XSScanner https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2997", "Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c09bf21b-50d2-49f0-8c92-49f6b3c358d8"], ["2022", "CVE-2022-0892", "The Export All URLs WordPress plugin before 4.2 does not sanitise and escape the CSV filename before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435"], ["2022", "CVE-2022-21809", "A file write vulnerability exists in the httpd upload.cgi functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary file upload. An attacker can upload a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468"], ["2022", "CVE-2022-41881", "Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, a StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion. This issue is patched in version 4.1.86.Final. There is no workaround, except using a custom HaProxyMessageDecoder.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3669", "A vulnerability was found in Axiomatic Bento4 and classified as problematic. This issue affects the function AP4_AvccAtom::Create of the component mp4edit. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212009 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip https://github.com/axiomatic-systems/Bento4/issues/776"], ["2022", "CVE-2022-38060", "A privilege escalation vulnerability exists in the sudo functionality of OpenStack Kolla git master 05194e7618. A misconfiguration in /etc/sudoers within a container can lead to increased privileges.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589"], ["2022", "CVE-2022-2886", "A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206688"], ["2022", "CVE-2022-21918", "DirectX Graphics Kernel File Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31592", "The application SAP Enterprise Extension Defense Forces & Public Security - versions 605, 606, 616,617,618, 802, 803, 804, 805, 806, does not perform necessary authorization checks for an authenticated user over the network, resulting in escalation of privileges leading to a limited impact on confidentiality.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-29205", "TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-38171", "Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).", "https://github.com/ARPSyndicate/cvemon https://github.com/zmanion/Xpdf", "https://github.com/jeffssh/CVE-2021-30860"], ["2022", "CVE-2022-44267", "ImageMagick 7.1.0-49 is vulnerable to Denial of Service. When it parses a PNG image (e.g., for resize), the convert process could be left waiting for stdin input.", "https://github.com/ARPSyndicate/cvemon https://github.com/agathanon/cve-2022-44268 https://github.com/seal-community/patches", "https://www.metabaseq.com/imagemagick-zero-days/"], ["2022", "CVE-2022-4118", "The Bitcoin / AltCoin Payment Gateway for WooCommerce & Multivendor store / shop WordPress plugin through 1.7.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by authenticated users", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4"], ["2022", "CVE-2022-36063", "Azure RTOS USBx is a USB host, device, and on-the-go (OTG) embedded stack, fully integrated with Azure RTOS ThreadX and available for all Azure RTOS ThreadX\u2013supported processors. Azure RTOS USBX implementation of host support for USB CDC ECM includes an integer underflow and a buffer overflow in the `_ux_host_class_cdc_ecm_mac_address_get` function which may be potentially exploited to achieve remote code execution or denial of service. Setting mac address string descriptor length to a `0` or `1` allows an attacker to introduce an integer underflow followed (string_length) by a buffer overflow of the `cdc_ecm -> ux_host_class_cdc_ecm_node_id` array. This may allow one to redirect the code execution flow or introduce a denial of service. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround.", "https://github.com/szymonh/szymonh", "No PoCs from references."], ["2022", "CVE-2022-0511", "Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-0680", "The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded"], ["2022", "CVE-2022-2414", "Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.", "https://github.com/0day404/vulnerability-poc https://github.com/20142995/Goby https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/JoshMorrison99/my-nuceli-templates https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept https://github.com/d4n-sec/d4n-sec.github.io https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/satyasai1460/CVE-2022-2414 https://github.com/strikersatya/CVE-2022-2414 https://github.com/superhac/CVE-2022-2414-POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2785", "There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-28029", "Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Master.php?f=delete_type.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md"], ["2022", "CVE-2022-42928", "Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.4, and Thunderbird < 102.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/googleprojectzero/fuzzilli https://github.com/zhangjiahui-buaa/MasterThesis", "No PoCs from references."], ["2022", "CVE-2022-2554", "The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9"], ["2022", "CVE-2022-25352", "The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117"], ["2022", "CVE-2022-4058", "The Photo Gallery by 10Web WordPress plugin before 1.8.3 does not validate and escape some parameters before outputting them back in in JS code later on in another page, which could lead to Stored XSS issue when an attacker makes a logged in admin open a malicious URL or page under their control.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4"], ["2022", "CVE-2022-36123", "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13 https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md https://sick.codes/sick-2022-128"], ["2022", "CVE-2022-31743", "Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox < 101.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1747388"], ["2022", "CVE-2022-20437", "In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242258929", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22532", "In SAP NetWeaver Application Server Java - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, an unauthenticated attacker could submit a crafted HTTP server request which triggers improper shared memory buffer handling. This could allow the malicious payload to be executed and hence execute functions that could be impersonating the victim or even steal the victim's logon session.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-21579", "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2776", "A vulnerability classified as problematic has been found in SourceCodester Gym Management System. Affected is an unknown function of the file delete_user.php. The manipulation of the argument delete_user leads to denial of service. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-206172.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206172"], ["2022", "CVE-2022-31561", "The varijkapil13/Sphere_ImageBackend repository through 2019-10-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20615", "Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-29167", "Hawk is an HTTP authentication scheme providing mechanisms for making authenticated HTTP requests with partial cryptographic verification of the request and response, covering the HTTP method, request URI, host, and optionally the request payload. Hawk used a regular expression to parse `Host` HTTP header (`Hawk.utils.parseHost()`), which was subject to regular expression DoS attack - meaning each added character in the attacker's input increases the computation time exponentially. `parseHost()` was patched in `9.0.1` to use built-in `URL` class to parse hostname instead. `Hawk.authenticate()` accepts `options` argument. If that contains `host` and `port`, those would be used instead of a call to `utils.parseHost()`.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-35168", "Due to improper input sanitization of XML input in SAP Business One - version 10.0, an attacker can perform a denial-of-service attack rendering the system temporarily inoperative.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-26088", "An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the \"number of recipients\" field. NOTE: the vendor's position is that \"no real impact is demonstrated.\"", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html http://seclists.org/fulldisclosure/2022/Nov/10 https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/"], ["2022", "CVE-2022-26319", "An installer search patch element vulnerability in Trend Micro Portable Security 3.0 Pro, 3.0 and 2.0 could allow a local attacker to place an arbitrarily generated DLL file in an installer folder to elevate local privileges. Please note: an attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-0970", "Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.", "https://github.com/416e6e61/My-CVEs https://github.com/ARPSyndicate/cvemon https://github.com/iohehe/awesome-xss", "https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec"], ["2022", "CVE-2022-35028", "OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x4fbbb6.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35028.md"], ["2022", "CVE-2022-0830", "The FormBuilder WordPress plugin through 1.08 does not have CSRF checks in place when creating/updating and deleting forms, and does not sanitise as well as escape its form field values. As a result, attackers could make logged in admin update and delete arbitrary forms via a CSRF attack, and put Cross-Site Scripting payloads in them.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7"], ["2022", "CVE-2022-22650", "This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. A plug-in may be able to inherit the application's permissions and access user data.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-27135", "xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232 https://github.com/verf1sh/Poc/blob/master/pic_ppm.png https://github.com/verf1sh/Poc/blob/master/poc_ppm"], ["2022", "CVE-2022-41720", "On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS(\"C:/tmp\").Open(\"COM1\") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS(\"\") has changed. Previously, an empty root was treated equivalently to \"/\", so os.DirFS(\"\").Open(\"tmp\") would open the path \"/tmp\". This now returns an error.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21439", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2636", "Improper Control of Generation of Code ('Code Injection') in GitHub repository hestiacp/hestiacp prior to 1.6.6.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/357c0390-631c-4684-b6e1-a6d8b2453d66"], ["2022", "CVE-2022-45329", "AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the Search parameter. This vulnerability allows attackers to access database information.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/search_sql_injection/search_sql_injection.md"], ["2022", "CVE-2022-36350", "Stored cross-site scripting vulnerability in PukiWiki versions 1.3.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21528", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2824", "Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1ccb2d1c-6881-4813-a5bc-1603d29b7141"], ["2022", "CVE-2022-0921", "Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622"], ["2022", "CVE-2022-46051", "The approve parameter from the AeroCMS-v0.0.1 CMS system is vulnerable to SQL injection attacks.", "No PoCs found on GitHub currently.", "https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/view_all_comments_update/view_all_comments_update.MD"], ["2022", "CVE-2022-31530", "The csm-aut/csm repository through 3.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46280", "A use of uninitialized pointer vulnerability exists in the PQS format pFormat functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670"], ["2022", "CVE-2022-20704", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-20495", "In getEnabledAccessibilityServiceList of AccessibilityManager.java, there is a possible way to hide an accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-243849844", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20495 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-31470", "An XSS vulnerability in the index_mobile_changepass.hsp reset-password section of Axigen Mobile WebMail before 10.2.3.12 and 10.3.x before 10.3.3.47 allows attackers to run arbitrary Javascript code that, using an active end-user session (for a logged-in user), can access and retrieve mailbox content.", "https://github.com/amirzargham/CVE-2023-08-21-exploit", "http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html"], ["2022", "CVE-2022-22601", "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 13.3. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22590", "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44014", "An issue was discovered in Simmeth Lieferantenmanager before 5.6. In the design of the API, a user is inherently able to fetch arbitrary SQL tables. This leaks all user passwords and MSSQL hashes via /DS/LM_API/api/SelectionService/GetPaggedTab.", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/"], ["2022", "CVE-2022-2964", "A flaw was found in the Linux kernel\u2019s driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-26208", "Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setWebWlanIdx, via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-0762", "Incorrect Authorization in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48"], ["2022", "CVE-2022-21468", "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Popups). Supported versions that are affected are 12.2.4-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-32588", "An out-of-bounds write vulnerability exists in the PICT parsing pctwread_14841 functionality of Accusoft ImageGear 20.0. A specially-crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544"], ["2022", "CVE-2022-2667", "A vulnerability was found in SourceCodester Loan Management System and classified as critical. This issue affects some unknown processing of the file delete_lplan.php. The manipulation of the argument lplan_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205619.", "https://github.com/ARPSyndicate/cvemon https://github.com/cxaqhq/cxaqhq", "https://vuldb.com/?id.205619"], ["2022", "CVE-2022-3999", "The DPD Baltic Shipping WordPress plugin before 1.2.57 does not have authorisation and CSRF in an AJAX action, which could allow any authenticated users, such as subscriber to delete arbitrary options from the blog, which could make the blog unavailable.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643"], ["2022", "CVE-2022-25061", "TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_setIp6DefaultRoute.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/exploitwritter/CVE-2022-25061 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0871", "Missing Authorization in GitHub repository gogs/gogs prior to 0.12.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62"], ["2022", "CVE-2022-26189", "TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via the langType parameter in the login interface.", "No PoCs found on GitHub currently.", "https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/"], ["2022", "CVE-2022-35069", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b544e.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md"], ["2022", "CVE-2022-44004", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to insecure design or lack of authentication, unauthenticated attackers can complete the password-reset process for any account and set a new password.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-38312", "Tenda AC18 router v15.03.05.19 and v15.03.05.05 was discovered to contain a stack overflow via the list parameter at /goform/SetIpMacBind.", "No PoCs found on GitHub currently.", "https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3"], ["2022", "CVE-2022-22611", "An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46290", "Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.The loop that stores the coordinates does not check its index against nAtoms", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665"], ["2022", "CVE-2022-41862", "In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.", "https://github.com/ARPSyndicate/cvemon https://github.com/au-abd/python-stuff https://github.com/au-abddakkak/python-stuff", "No PoCs from references."], ["2022", "CVE-2022-41761", "An issue was discovered in NOKIA NFM-T R19.9. An Absolute Path Traversal vulnerability exists under /cgi-bin/R19.9/viewlog.pl of the VM Manager WebUI via the logfile parameter, allowing a remote authenticated attacker to read arbitrary files.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-36200", "In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/afaq1337/CVE-2022-36200 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/afaq1337/CVE-2022-36200"], ["2022", "CVE-2022-36191", "A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2218"], ["2022", "CVE-2022-48013", "Opencats v0.9.7 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /opencats/index.php?m=calendar. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description or Title text fields.", "No PoCs found on GitHub currently.", "https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md"], ["2022", "CVE-2022-34305", "In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 and 8.5.50 to 8.5.81 the Form authentication example in the examples web application displayed user provided data without filtering, exposing a XSS vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/Hurricane672/smap https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/brunorozendo/simple-app https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zeroc00I/CVE-2022-34305", "No PoCs from references."], ["2022", "CVE-2022-34094", "Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wagnerdracha/ProofOfConcept", "https://github.com/edmarmoretti/i3geo/issues/5 https://github.com/saladesituacao/i3geo/issues/5 https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65"], ["2022", "CVE-2022-43664", "A use-after-free vulnerability exists within the way Ichitaro Word Processor 2022, version 1.0.1.57600, processes protected documents. A specially crafted document can trigger reuse of freed memory, which can lead to further memory corruption and potentially result in arbitrary code execution. An attacker can provide a malicious document to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673"], ["2022", "CVE-2022-3989", "The Motors WordPress plugin before 1.4.4 does not properly validate uploaded files for dangerous file types (such as .php) in an AJAX action, allowing an attacker to sign up on a victim's WordPress instance, upload a malicious PHP file and attempt to launch a brute-force attack to discover the uploaded payload.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091"], ["2022", "CVE-2022-2677", "A vulnerability was found in SourceCodester Apartment Visitor Management System 1.0. It has been classified as critical. This affects an unknown part of the file index.php. The manipulation of the argument username with the input ' AND (SELECT 4955 FROM (SELECT(SLEEP(5)))RSzF) AND 'htiy'='htiy leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205665 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md https://vuldb.com/?id.205665"], ["2022", "CVE-2022-21478", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-2737", "The WP STAGING WordPress plugin before 2.9.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12"], ["2022", "CVE-2022-32749", "Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21538", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0632", "NULL Pointer Dereference in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3e5bb8f6-30fd-4553-86dd-761e9459ce1b"], ["2022", "CVE-2022-22852", "A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the description parameter in room_list.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Sant268/CVE-2022-22852 https://github.com/WhooAmii/POC_to_review https://github.com/binganao/vulns-2022 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-25131", "A command injection vulnerability in the function recvSlaveCloudCheckStatus of TOTOLINK Technology routers T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 and T10 V2_Firmware V4.1.8cu.5207_B20210320 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md"], ["2022", "CVE-2022-22751", "Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31520", "The Luxas98/logstash-management-api repository through 2020-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-26358", "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, \"RMRR\") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2834", "The Helpful WordPress plugin before 4.5.26 puts the exported logs and feedbacks in a publicly accessible location and guessable names, which could allow attackers to download them and retrieve sensitive information such as IP, Names and Email Address depending on the plugin's settings", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae"], ["2022", "CVE-2022-22640", "A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-35038", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b064d.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35038.md"], ["2022", "CVE-2022-2925", "Cross-site Scripting (XSS) - Stored in GitHub repository appwrite/appwrite prior to 1.0.0-RC1.", "https://github.com/ARPSyndicate/cvemon https://github.com/miko550/CVE-2022-27925", "https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc"], ["2022", "CVE-2022-2626", "Incorrect Privilege Assignment in GitHub repository hestiacp/hestiacp prior to 1.6.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/704aacc9-edff-4da5-90a6-4adf8dbf36fe"], ["2022", "CVE-2022-32658", "In Wi-Fi driver, there is a possible undefined behavior due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220705059; Issue ID: GN20220705059.", "https://github.com/ARPSyndicate/cvemon https://github.com/efchatz/WPAxFuzz", "No PoCs from references."], ["2022", "CVE-2022-21429", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Billing Care). Supported versions that are affected are 12.0.0.4.0-12.0.0.6.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0723", "Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5"], ["2022", "CVE-2022-27125", "zbzcms v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the neirong parameter at /php/ajax.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-36251", "Clinic's Patient Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via patients.php.", "No PoCs found on GitHub currently.", "https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md"], ["2022", "CVE-2022-25020", "A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the thumbnail path of a blog post.", "https://github.com/ARPSyndicate/cvemon https://github.com/MoritzHuppert/CVE-2022-25020 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://youtu.be/TsGp-QB5XWI"], ["2022", "CVE-2022-43635", "This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N 6_211111 3.20.1(US) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17332.", "https://github.com/IamAlch3mist/Awesome-Embedded-Systems-Vulnerability-Research", "No PoCs from references."], ["2022", "CVE-2022-41670", "A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior).", "No PoCs found on GitHub currently.", "https://www.se.com/ww/en/download/document/SEVD-2022-284-01/"], ["2022", "CVE-2022-43775", "The HICT_Loop class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that could allow an attacker to gain code execution on a remote system.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-33"], ["2022", "CVE-2022-2766", "A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-206162 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206162"], ["2022", "CVE-2022-21569", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0663", "The Print, PDF, Email by PrintFriendly WordPress plugin before 5.2.3 does not sanitise and escape the Custom Button Text settings, which could allow high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e"], ["2022", "CVE-2022-0960", "Stored XSS viva .properties file upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e"], ["2022", "CVE-2022-26098", "Heap-based buffer overflow vulnerability in sheifd_create function of libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attackers.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-29177", "Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.", "https://github.com/ARPSyndicate/cvemon https://github.com/VPRLab/BlkVulnReport https://github.com/demining/Solidity-Forcibly-Send-Ether-Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-44284", "Dinstar FXO Analog VoIP Gateway DAG2000-16O is vulnerable to Cross Site Scripting (XSS).", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html"], ["2022", "CVE-2022-22700", "CyberArk Identity versions up to and including 22.1 in the 'StartAuthentication' resource, exposes the response header 'X-CFY-TX-TM'. In certain configurations, that response header contains different, predictable value ranges which can be used to determine whether a user exists in the tenant.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/porter/"], ["2022", "CVE-2022-31571", "The akashtalole/python-flask-restful-api repository through 2019-09-16 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-46381", "Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/JoshMorrison99/my-nuceli-templates https://github.com/amitlttwo/CVE-2022-46381 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt"], ["2022", "CVE-2022-41973", "multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/CVE-2022-3328 https://github.com/fkie-cad/nvd-json-data-feeds", "http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"], ["2022", "CVE-2022-25342", "An issue was discovered on Olivetti d-COLOR MF3555 2XD_S000.002.271 devices. The Web Application is affected by Broken Access Control. It does not properly validate requests for access to data and functionality under the /mngset/authset path. By not verifying permissions for access to resources, it allows a potential attacker to view pages that are not allowed.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-2544", "The Ninja Job Board WordPress plugin before 1.3.3 does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053"], ["2022", "CVE-2022-0441", "The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some parameters given when registering a new account, allowing unauthenticated users to register as an admin", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Enes4xd/Enes4xd https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SDragon1205/cve-2022-0441 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/biulove0x/CVE-2022-0441 https://github.com/cr0ss2018/cr0ss2018 https://github.com/enesamaafkolan/enesamaafkolan https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/ezelnur6327/ezelnur6327 https://github.com/k0mi-tg/CVE-POC https://github.com/kyukazamiqq/CVE-2022-0441 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tegal1337/CVE-2022-0441 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed"], ["2022", "CVE-2022-3628", "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/defgsus/good-github", "No PoCs from references."], ["2022", "CVE-2022-3768", "The WPSmartContracts WordPress plugin before 1.3.12 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as author", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/WhatTheFuzz/openssl-fuzz", "https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/ https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3"], ["2022", "CVE-2022-29184", "GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where \"pipelines-as-code\" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.", "https://github.com/dellalibera/dellalibera", "No PoCs from references."], ["2022", "CVE-2022-38161", "The Gumstix Overo SBC on the VSKS board through 2022-08-09, as used on the Orlan-10 and other platforms, allows unrestricted remapping of the NOR flash memory containing the bitstream for the FPGA.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31582", "The shaolo1/VideoServer repository through 2019-09-21 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0993", "The SiteGround Security plugin for WordPress is vulnerable to authentication bypass that allows unauthenticated users to log in as administrative users due to missing identity verification on the 2FA back-up code implementation that logs users in upon success. This affects versions up to, and including, 1.2.5.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2896", "Measuresoft ScadaPro Server (All Versions) allows use after free while processing a specific project file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2795", "By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.", "https://github.com/ARPSyndicate/cvemon https://github.com/DButter/whitehat_public https://github.com/Dokukin1/Metasploitable https://github.com/Iknowmyname/Nmap-Scans-M2 https://github.com/Ivashka80/13-01_Osnova https://github.com/NikulinMS/13-01-hw https://github.com/SergeyM90/Atack1 https://github.com/Zhivarev/13-01-hw https://github.com/fokypoky/places-list https://github.com/karimhabush/cyberowl https://github.com/ovchdmitriy01/13-1 https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems https://github.com/zzzWTF/db-13-01", "No PoCs from references."], ["2022", "CVE-2022-2404", "The WP Popup Builder WordPress plugin before 1.2.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98"], ["2022", "CVE-2022-0690", "Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9"], ["2022", "CVE-2022-4108", "The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470"], ["2022", "CVE-2022-4299", "The Metricool WordPress plugin before 1.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303"], ["2022", "CVE-2022-2684", "A vulnerability has been found in SourceCodester Apartment Visitor Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /manage-apartment.php. The manipulation of the argument Apartment Number with the input leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205672.", "No PoCs found on GitHub currently.", "https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-XSS.md"], ["2022", "CVE-2022-42969", "** DISPUTED ** The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/opeco17/poetry-audit-plugin https://github.com/seal-community/patches", "https://github.com/pytest-dev/py/issues/287"], ["2022", "CVE-2022-2515", "The Simple Banner plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `pro_version_activation_code` parameter in versions up to, and including, 2.11.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, including those without administrative capabilities when access is granted to those users, to inject arbitrary web scripts in page that will execute whenever a user role having access to \"Simple Banner\" accesses the plugin's settings.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e"], ["2022", "CVE-2022-0781", "The Nirweb support WordPress plugin before 2.8.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161"], ["2022", "CVE-2022-0410", "The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.6 does not sanitise and escape the id parameter before using it in a SQL statement via the refUrlDetails AJAX action, available to any authenticated user, leading to a SQL injection", "https://github.com/superlink996/chunqiuyunjingbachang", "https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20"], ["2022", "CVE-2022-27216", "Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon https://github.com/jenkinsci-cert/nvd-cwe https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41403", "OpenCart 3.x Newsletter Custom Popup was discovered to contain a SQL injection vulnerability via the email parameter at index.php?route=extension/module/so_newletter_custom_popup/newsletter.", "https://github.com/IP-CAM/Opencart-v.3.x-Newsletter-Custom-Popup-contain-SQL-injection", "https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html"], ["2022", "CVE-2022-4019", "A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints.", "No PoCs found on GitHub currently.", "https://mattermost.com/security-updates/"], ["2022", "CVE-2022-34067", "Warehouse Management System v1.0 was discovered to contain a SQL injection vulnerability via the cari parameter.", "No PoCs found on GitHub currently.", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System"], ["2022", "CVE-2022-25082", "TOTOLink A950RG V5.9c.4050_B20190424 and V4.1.2cu.5204_B20210112 were discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A950RG/README.md"], ["2022", "CVE-2022-25313", "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griggorii/Ubuntu-20.04.2-desktop-amd64_By_Griggorii_linux-image-kernel-5.6.0-oem https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/ShaikUsaf/external_expact_AOSP10_r33_CVE-2022-25313 https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-25313 https://github.com/WhooAmii/POC_to_review https://github.com/fokypoky/places-list https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/expat_2.1.0_G2_CVE-2022-25313 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/libexpat/libexpat/pull/558 https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-44366", "Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setDiagnoseInfo.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md"], ["2022", "CVE-2022-3679", "The Starter Templates by Kadence WP WordPress plugin before 1.2.17 unserialises the content of an imported file, which could lead to PHP object injection issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760"], ["2022", "CVE-2022-31493", "LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php acl_id XSS.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-21819", "NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4lo/awesome-IoT-security-article https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/xairy/dma-attacks", "No PoCs from references."], ["2022", "CVE-2022-2987", "The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67"], ["2022", "CVE-2022-33747", "Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29244", "npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3739", "The WP Best Quiz WordPress plugin through 1.0 does not sanitize and escape some parameters, which could allow users with a role as low as Author to perform Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/"], ["2022", "CVE-2022-4159", "The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.", "No PoCs found on GitHub currently.", "https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8 https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965"], ["2022", "CVE-2022-34127", "The Managentities plugin before 4.0.2 for GLPI allows reading local files via directory traversal in the inc/cri.class.php file parameter.", "No PoCs found on GitHub currently.", "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/"], ["2022", "CVE-2022-28128", "Untrusted search path vulnerability in AttacheCase ver.3.6.1.0 and earlier allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2752", "A vulnerability in the web server of Secomea GateManager allows a local user to impersonate as the previous user under some failed login conditions. This issue affects: Secomea GateManager versions from 9.4 through 9.7.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory"], ["2022", "CVE-2022-23458", "Toast UI Grid is a component to display and edit data. Versions prior to 4.21.3 are vulnerable to cross-site scripting attacks when pasting specially crafted content into editable cells. This issue was fixed in version 4.21.3. There are no known workarounds.", "No PoCs found on GitHub currently.", "https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/"], ["2022", "CVE-2022-30629", "Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.", "https://github.com/ARPSyndicate/cvemon https://github.com/henriquebesing/container-security https://github.com/kb5fls/container-security https://github.com/ruzickap/malware-cryptominer-container", "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"], ["2022", "CVE-2022-0657", "The 5 Stars Rating Funnel WordPress Plugin | RRatingg WordPress plugin before 1.2.54 does not properly sanitise, validate and escape lead ids before using them in a SQL statement via the rrtngg_delete_leads AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue. There is an attempt to sanitise the input, using sanitize_text_field(), however such function is not intended to prevent SQL injections.", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6"], ["2022", "CVE-2022-38237", "XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readScan() at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-22734", "The Simple Quotation WordPress plugin through 1.3.2 does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251"], ["2022", "CVE-2022-31545", "The ml-inory/ModelConverter repository through 2021-04-26 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-0954", "Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11.", "https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26"], ["2022", "CVE-2022-37049", "The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. NOTE: this is different from CVE-2022-27942.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/appneta/tcpreplay/issues/736"], ["2022", "CVE-2022-0814", "The Ubigeo de Per\u00fa para Woocommerce WordPress plugin before 3.6.4 does not properly sanitise and escape some parameters before using them in SQL statements via various AJAX actions, some of which are available to unauthenticated users, leading to SQL Injections", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269"], ["2022", "CVE-2022-40468", "Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.", "https://github.com/ARPSyndicate/cvemon https://github.com/yikesoftware/yikesoftware", "No PoCs from references."], ["2022", "CVE-2022-37109", "patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.", "https://github.com/ARPSyndicate/cvemon https://github.com/ehtec/camp-exploit", "http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html https://medium.com/@elias.hohl/authentication-bypass-vulnerability-in-camp-a-raspberry-pi-camera-server-477e5d270904"], ["2022", "CVE-2022-37298", "Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server.", "https://github.com/ARPSyndicate/cvemon https://github.com/dbyio/cve-2022-37298 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/dbyio/cve-2022-37298"], ["2022", "CVE-2022-29392", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_00418c24.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules"], ["2022", "CVE-2022-22674", "An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Monterey 12.3.1, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. A local user may be able to read kernel memory.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-20771", "On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-31794", "An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.", "No PoCs found on GitHub currently.", "https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/"], ["2022", "CVE-2022-46164", "NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/star-sg/CVE https://github.com/stephenbradshaw/CVE-2022-46164-poc https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-41704", "A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16.", "https://github.com/4ra1n/4ra1n https://github.com/ARPSyndicate/cvemon https://github.com/yycunhua/4ra1n", "No PoCs from references."], ["2022", "CVE-2022-41495", "ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the rss_url_news parameter at /manager/index.php.", "No PoCs found on GitHub currently.", "https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md"], ["2022", "CVE-2022-27280", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the web_exec parameter at /apply.cgi.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "No PoCs from references."], ["2022", "CVE-2022-31897", "SourceCodester Zoo Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via public_html/register_visitor?msg=.", "https://github.com/ARPSyndicate/cvemon https://github.com/AngeloPioAmirante/CVE-2022-31897 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/angelopioamirante/CVE-2022-31897 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html"], ["2022", "CVE-2022-25014", "Ice Hrm 30.0.0.OS was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the \"m\" parameter in the Dashboard of the current user. This vulnerability allows attackers to compromise session credentials via user interaction with a crafted link.", "https://github.com/cooliscool/Advisories", "https://github.com/gamonoid/icehrm/issues/283"], ["2022", "CVE-2022-22977", "VMware Tools for Windows(12.0.0, 11.x.y and 10.x.y) contains an XML External Entity (XXE) vulnerability. A malicious actor with non-administrative local user privileges in the Windows guest OS, where VMware Tools is installed, may exploit this issue leading to a denial-of-service condition or unintended information disclosure.", "https://github.com/ARPSyndicate/cvemon https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-43601", "Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656"], ["2022", "CVE-2022-43590", "A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649"], ["2022", "CVE-2022-2612", "Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/IAIK/LayeredBinaryTemplating", "No PoCs from references."], ["2022", "CVE-2022-30769", "Session fixation exists in ZoneMinder through 1.36.12 as an attacker can poison a session cookie to the next logged-in user.", "No PoCs found on GitHub currently.", "https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3"], ["2022", "CVE-2022-0717", "Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9"], ["2022", "CVE-2022-0486", "Improper file permissions in the CommandPost, Collector, Sensor, and Sandbox components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected files and enable escalation of privileges equivalent to the root user. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/henryreed/CVE-2022-0486 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27000", "Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-2703", "A vulnerability was found in SourceCodester Gym Management System. It has been classified as critical. This affects an unknown part of the component Exercises Module. The manipulation of the argument exer leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205827.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205827"], ["2022", "CVE-2022-2492", "A vulnerability was found in SourceCodester Library Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /index.php. The manipulation of the argument RollNo with the input admin' AND (SELECT 2625 FROM (SELECT(SLEEP(5)))MdIL) AND 'KXmq'='KXmq&Password=1231312312 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", "No PoCs found on GitHub currently.", "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md#index.php https://vuldb.com/?id.204575"], ["2022", "CVE-2022-23409", "The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html https://sec-consult.com/vulnerability-lab/"], ["2022", "CVE-2022-47088", "GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2340"], ["2022", "CVE-2022-0606", "Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-0597", "Open Redirect in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/68c22eab-cc69-4e9f-bcb6-2df3db626813"], ["2022", "CVE-2022-0905", "Missing Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb"], ["2022", "CVE-2022-38266", "An issue in the Leptonica linked library (v1.79.0) allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29112", "Windows Graphics Component Information Disclosure Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-31514", "The Caoyongqi912/Fan_Platform repository through 2021-04-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20660", "A vulnerability in the information storage architecture of several Cisco IP Phone models could allow an unauthenticated, physical attacker to obtain confidential information from an affected device. This vulnerability is due to unencrypted storage of confidential information on an affected device. An attacker could exploit this vulnerability by physically extracting and accessing one of the flash memory chips. A successful exploit could allow the attacker to obtain confidential information from the device, which could be used for subsequent attacks.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html http://seclists.org/fulldisclosure/2022/Jan/34"], ["2022", "CVE-2022-41916", "Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-38326", "Tenda AC15 WiFi Router V15.03.05.19_multi and AC18 WiFi Router V15.03.05.19_multi were discovered to contain a buffer overflow via the page parameter at /goform/NatStaticSetting.", "https://github.com/1160300418/Vuls", "https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md"], ["2022", "CVE-2022-22625", "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46135", "In AeroCms v0.0.1, there is an arbitrary file upload vulnerability at /admin/posts.php?source=edit_post , through which we can upload webshell and control the web server.", "No PoCs found on GitHub currently.", "https://github.com/MegaTKC/AeroCMS/issues/5"], ["2022", "CVE-2022-40439", "An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/750"], ["2022", "CVE-2022-0845", "Code Injection in GitHub repository pytorchlightning/pytorch-lightning prior to 1.6.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a"], ["2022", "CVE-2022-24329", "In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.", "https://github.com/ARPSyndicate/cvemon https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-2643", "A vulnerability has been found in SourceCodester Online Admission System and classified as critical. This vulnerability affects unknown code of the component POST Parameter Handler. The manipulation of the argument shift leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this entry is VDB-205564.", "https://github.com/ARPSyndicate/cvemon https://github.com/badboycxcc/Student-Admission-Sqlinjection https://github.com/badboycxcc/badboycxcc", "https://vuldb.com/?id.205564"], ["2022", "CVE-2022-0746", "Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd"], ["2022", "CVE-2022-36234", "SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVE-2022-36234 https://github.com/Halcy0nic/Trophies https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/skinnyrad/Trophies https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/kashimAstro/SimpleNetwork/issues/22"], ["2022", "CVE-2022-25045", "Home Owners Collection Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.", "No PoCs found on GitHub currently.", "https://github.com/VivekPanday12/CVE-/issues/6 https://www.linkedin.com/in/vivek-panday-796768149/"], ["2022", "CVE-2022-29270", "In Nagios XI through 5.8.5, it is possible for a user without password verification to change his e-mail address.", "https://github.com/ARPSyndicate/cvemon https://github.com/sT0wn-nl/CVEs", "https://github.com/4LPH4-NL/CVEs https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi"], ["2022", "CVE-2022-38295", "Cuppa CMS v1.0 was discovered to contain a cross-site scripting vulnerability at /table_manager/view/cu_user_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Add New Group function.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/CuppaCMS/CuppaCMS/issues/34"], ["2022", "CVE-2022-44183", "Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic.", "https://github.com/FuHaoPing/CVE-2022-44183 https://github.com/flagqaz/CVE-2022-44183 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1599", "The Admin Management Xtended WordPress plugin before 2.4.5 does not have CSRF checks in some of its AJAX actions, allowing attackers to make a logged users with the right capabilities to call them. This can lead to changes in post status (draft, published), slug, post date, comment status (enabled, disabled) and more.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6"], ["2022", "CVE-2022-1608", "The OnePress Social Locker WordPress plugin through 5.6.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f"], ["2022", "CVE-2022-31676", "VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.", "https://github.com/ARPSyndicate/cvemon https://github.com/johnwvmw/open-vm-tools https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2461", "The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrTuxracer/advisories", "https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt https://www.exploitalert.com/view-details.html?id=38891"], ["2022", "CVE-2022-40918", "Buffer overflow in firmware lewei_cam binary version 2.0.10 in Force 1 Discovery Wifi U818A HD+ FPV Drone allows attacker to gain remote code execution as root user via a specially crafted UDP packet. Please update the Reference section to these links > http://thiscomputer.com/ > https://www.bostoncyber.org/ > https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368", "No PoCs found on GitHub currently.", "https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368"], ["2022", "CVE-2022-22895", "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c.", "No PoCs found on GitHub currently.", "https://github.com/jerryscript-project/jerryscript/issues/4882"], ["2022", "CVE-2022-34113", "An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin.", "No PoCs found on GitHub currently.", "https://github.com/dataease/dataease/issues/2431"], ["2022", "CVE-2022-48194", "TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/otsmr/internet-of-vulnerable-things https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html"], ["2022", "CVE-2022-0424", "The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f"], ["2022", "CVE-2022-22547", "Simple Diagnostics Agent - versions 1.0 (up to version 1.57.), allows an attacker to access information which would otherwise be restricted via a random port 9000-65535. This allows information gathering which could be used exploit future open-source security exploits.", "https://github.com/ARPSyndicate/cvemon https://github.com/Onapsis/vulnerability_advisories", "http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html"], ["2022", "CVE-2022-1748", "Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite, and uaGate are affected by a NULL pointer dereference vulnerability.", "https://github.com/claroty/opcua-exploit-framework", "No PoCs from references."], ["2022", "CVE-2022-31736", "A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1735923"], ["2022", "CVE-2022-29221", "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sbani/CVE-2022-29221-PoC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1659", "Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in the sub_action parameter. This can be used to view site configuration and logged-in users, modify post conditions, or perform a denial of service attack.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31627", "In PHP versions 8.1.x below 8.1.8, when fileinfo functions, such as finfo_buffer, due to incorrect patch applied to the third party code from libmagic, incorrect function may be used to free allocated memory, which may lead to heap corruption.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-25236", "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.", "https://github.com/ARGOeu-Metrics/secmon-probes https://github.com/ARGOeu/secmon-probes https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-25236 https://github.com/fokypoky/places-list https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0535", "The E2Pdf WordPress plugin before 1.16.45 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985"], ["2022", "CVE-2022-27273", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_12168. This vulnerability is triggered via a crafted packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing"], ["2022", "CVE-2022-48085", "Softr v2.0 was discovered to contain a HTML injection vulnerability via the Work Space Name parameter.", "No PoCs found on GitHub currently.", "http://google.com"], ["2022", "CVE-2022-34393", "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.", "No PoCs found on GitHub currently.", "https://www.dell.com/support/kbdoc/000204686"], ["2022", "CVE-2022-34002", "The \u2018document\u2019 parameter of PDS Vista 7\u2019s /application/documents/display.aspx page is vulnerable to a Local File Inclusion vulnerability which allows an low-privileged authenticated attacker to leak the configuration files and source code of the web application.", "No PoCs found on GitHub currently.", "https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion"], ["2022", "CVE-2022-22984", "The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the package @snyk/snyk-hex-plugin before 1.1.6 are vulnerable to Command Injection due to an incomplete fix for [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342). A successful exploit allows attackers to run arbitrary commands on the host system where the Snyk CLI is installed by passing in crafted command line flags. In order to exploit this vulnerability, a user would have to execute the snyk test command on untrusted files. In most cases, an attacker positioned to control the command line arguments to the Snyk CLI would already be positioned to execute arbitrary commands. However, this could be abused in specific scenarios, such as continuous integration pipelines, where developers can control the arguments passed to the Snyk CLI to leverage this component as part of a wider attack against an integration/build pipeline. This issue has been addressed in the latest Snyk Docker images available at https://hub.docker.com/r/snyk/snyk as of 2022-11-29. Images downloaded and built prior to that date should be updated. The issue has also been addressed in the Snyk TeamCity CI/CD plugin as of version v20221130.093605.", "https://github.com/ARPSyndicate/cvemon https://github.com/PenteraIO/CVE-2022-22948", "https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680"], ["2022", "CVE-2022-22516", "The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.", "https://github.com/ARPSyndicate/cvemon https://github.com/hfiref0x/KDU", "No PoCs from references."], ["2022", "CVE-2022-22687", "Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in Authentication functionality in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-29361", "** DISPUTED ** Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project.", "https://github.com/HotDB-Community/HotDB-Engine https://github.com/kevin-mizu/Werkzeug-CVE-2022-29361-PoC https://github.com/l3ragio/CVE-2022-29361_Werkzeug_Client-Side-Desync-to-XSS https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-1719", "Reflected XSS on ticket filter function in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability is capable of executing a malicious javascript code in web page", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/790ba3fd-41e9-4393-8e2f-71161b56279b"], ["2022", "CVE-2022-20413", "In start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235850634", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pazhanivel07/frameworks_av-r33_CVE-2022-20413 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-30899", "A Cross Site Scripting vulnerabilty exists in PartKeepr 1.4.0 via the 'name' field in /api/part_categories.", "https://github.com/ARPSyndicate/cvemon https://github.com/tuando243/tuando243", "No PoCs from references."], ["2022", "CVE-2022-1117", "A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker, a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-46408", "Ericsson Network Manager (ENM), versions prior to 22.1, contains a vulnerability in the application Network Connectivity Manager (NCM) where improper Neutralization of Formula Elements in a CSV File can lead to remote code execution or data leakage via maliciously injected hyperlinks. The attacker would need admin/elevated access to exploit the vulnerability.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-1286", "heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189"], ["2022", "CVE-2022-3012", "A vulnerability was found in oretnom23 Fast Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file ffos/admin/reports/index.php. The manipulation of the argument date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207422 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.207422"], ["2022", "CVE-2022-45962", "Open Solutions for Education, Inc openSIS Community Edition v8.0 and earlier is vulnerable to SQL Injection via CalendarModal.php.", "No PoCs found on GitHub currently.", "https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli"], ["2022", "CVE-2022-24614", "When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/drewnoakes/metadata-extractor/issues/561"], ["2022", "CVE-2022-24585", "A stored cross-site scripting (XSS) vulnerability in the component /core/admin/comment.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the author parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/Nguyen-Trung-Kien/CVE", "No PoCs from references."], ["2022", "CVE-2022-35560", "A stack overflow vulnerability exists in /goform/wifiSSIDset in Tenda W6 V1.0.0.9(4122) version, which can be exploited by attackers to cause a denial of service (DoS) via the index parameter.", "https://github.com/zhefox/IOT_Vul", "No PoCs from references."], ["2022", "CVE-2022-40104", "Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDget function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.", "https://github.com/splashsc/IOT_Vulnerability_Discovery", "No PoCs from references."], ["2022", "CVE-2022-23074", "In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the \u2018Name\u2019 field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-23074"], ["2022", "CVE-2022-45661", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the time parameter in the setSmartPowerManagement function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md"], ["2022", "CVE-2022-4672", "The WordPress Simple Shopping Cart WordPress plugin before 4.6.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d"], ["2022", "CVE-2022-25578", "taocms v3.0.2 allows attackers to execute code injection via arbitrarily editing the .htaccess file.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0xx11/Vulscve https://github.com/superlink996/chunqiuyunjingbachang", "No PoCs from references."], ["2022", "CVE-2022-36498", "H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Asp_SetTimingtimeWifiAndLed.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3"], ["2022", "CVE-2022-41268", "In some SAP standard roles in SAP Business Planning and Consolidation - versions - SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, DWCORE 200, 300, CPMBPC 810, a transaction code reserved for the customer is used. By implementing such transaction code, a malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4732", "Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa"], ["2022", "CVE-2022-25438", "Tenda AC9 v15.03.2.21 was discovered to contain a remote command execution (RCE) vulnerability via the SetIPTVCfg function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/11"], ["2022", "CVE-2022-41328", "A improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/karimhabush/cyberowl https://github.com/tadmaddad/fortidig", "No PoCs from references."], ["2022", "CVE-2022-26952", "Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.", "No PoCs found on GitHub currently.", "https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md"], ["2022", "CVE-2022-32240", "When a user opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-23134", "After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Awrrays/FrameVul https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/superlink996/chunqiuyunjingbachang https://github.com/xinyisleep/pocscan", "No PoCs from references."], ["2022", "CVE-2022-24857", "django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users from accessing the admin login view. The issue has been fixed in django-mfa3 0.5.0. It is possible to work around the issue by overwriting the admin login route, e.g. by adding the following URL definition *before* the admin routes: url('admin/login/', lambda request: redirect(settings.LOGIN_URL)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-45721", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the picName parameter in the formDelWewifiPic function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJUfyuABo"], ["2022", "CVE-2022-42141", "Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.", "No PoCs found on GitHub currently.", "https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/"], ["2022", "CVE-2022-26651", "An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html"], ["2022", "CVE-2022-40044", "Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the esc_name (Escalation Name) parameter at Configuration/Notifications/Escalations. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload.", "No PoCs found on GitHub currently.", "https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/"], ["2022", "CVE-2022-46548", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the page parameter at /goform/DhcpListClient.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md"], ["2022", "CVE-2022-1057", "The Pricing Deals for WooCommerce WordPress plugin through 2.0.2.02 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to an unauthenticated SQL injection", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Marcuccio/kevin", "https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243"], ["2022", "CVE-2022-4831", "The Custom User Profile Fields for User Registration WordPress plugin before 1.8.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c"], ["2022", "CVE-2022-3152", "Unverified Password Change in GitHub repository phpfusion/phpfusion prior to 9.10.20.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b3f888d2-5c71-4682-8287-42613401fd5a"], ["2022", "CVE-2022-45933", "KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a \"fun side project and a learning exercise,\" and not \"very secure.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS", "No PoCs from references."], ["2022", "CVE-2022-37434", "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).", "https://github.com/ARPSyndicate/cvemon https://github.com/FairwindsOps/bif https://github.com/JtMotoX/docker-trivy https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/RenderKit/openvkl https://github.com/SYRTI/POC_to_review https://github.com/Trinadh465/external_zlib_CVE-2022-37434 https://github.com/WhooAmii/POC_to_review https://github.com/a23au/awe-base-images https://github.com/adegoodyer/kubernetes-admin-toolkit https://github.com/adegoodyer/ubuntu https://github.com/bollwarm/SecToolSet https://github.com/fivexl/aws-ecr-client-golang https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc https://github.com/ivd38/zlib_overflow https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/maxim12z/ECommerce https://github.com/neo9/fluentd https://github.com/nidhi7598/external_zlib-1.2.11_AOSP_10_r33_CVE-2022-37434 https://github.com/nidhi7598/external_zlib-1.2.7_CVE-2022-37434 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/openvkl/openvkl https://github.com/stkcat/awe-base-images https://github.com/teresaweber685/book_list https://github.com/trhacknon/Pocingit https://github.com/vulnersCom/vulners-sbom-parser https://github.com/whoforget/CVE-POC https://github.com/xen0bit/CVE-2022-37434_poc https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://seclists.org/fulldisclosure/2022/Oct/37 http://seclists.org/fulldisclosure/2022/Oct/38 http://seclists.org/fulldisclosure/2022/Oct/41 http://seclists.org/fulldisclosure/2022/Oct/42 https://github.com/ivd38/zlib_overflow"], ["2022", "CVE-2022-40155", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.", "https://github.com/mosaic-hgw/WildFly", "No PoCs from references."], ["2022", "CVE-2022-31138", "mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch for this issue. As a temporary workaround, the Syncjob ACL can be removed from all mailbox users, preventing changes to those settings.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/ly1g3/Mailcow-CVE-2022-31138 https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/ly1g3/Mailcow-CVE-2022-31138"], ["2022", "CVE-2022-4623", "The ND Shortcodes WordPress plugin before 7.0 does not validate and escape numerous of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d"], ["2022", "CVE-2022-30314", "Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-45770", "Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation.", "https://github.com/Marsel-marsel/CVE-2022-45770 https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://hackmag.com/security/aguard-cve/ https://xakep.ru/2023/01/27/aguard-cve/"], ["2022", "CVE-2022-28712", "A cross-site scripting (xss) vulnerability exists in the videoAddNew functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540"], ["2022", "CVE-2022-4763", "The Icon Widget WordPress plugin before 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5"], ["2022", "CVE-2022-1006", "The Advanced Booking Calendar WordPress plugin before 1.7.1 does not sanitise and escape the id parameter when editing Calendars, which could allow high privilege users such as admin to perform SQL injection attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68"], ["2022", "CVE-2022-1397", "API Privilege Escalation in GitHub repository alextselegidis/easyappointments prior to 1.5.0. Full system takeover.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/5f69e094-ab8c-47a3-b01d-8c12a3b14c61"], ["2022", "CVE-2022-3292", "Use of Cache Containing Sensitive Information in GitHub repository ikus060/rdiffweb prior to 2.4.8.", "https://github.com/ARPSyndicate/cvemon https://github.com/ikus060/minarca https://github.com/ikus060/rdiffweb", "https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d"], ["2022", "CVE-2022-42110", "A Cross-site scripting (XSS) vulnerability in the Announcements module in Liferay Portal 7.1.0 through 7.4.2, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17403"], ["2022", "CVE-2022-42281", "NVIDIA DGX A100 contains a vulnerability in SBIOS in the FsRecovery, which may allow a highly privileged local attacker to cause an out-of-bounds write, which may lead to code execution, denial of service, compromised integrity, and information disclosure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-24705", "The rad_packet_recv function in radius/packet.c suffers from a memcpy buffer overflow, resulting in an overly-large recvfrom into a fixed buffer that causes a buffer overflow and overwrites arbitrary memory. If the server connects with a malicious client, crafted client requests can remotely trigger this vulnerability.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-24494", "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/vportal/AFD https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-30136", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Awrrays/Pentest-Tips https://github.com/VEEXH/CVE-2022-30136 https://github.com/atong28/ridgepoc https://github.com/fortra/CVE-2022-30136 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pipiscrew/timeline https://github.com/ycdxsb/WindowsPrivilegeEscalation", "No PoCs from references."], ["2022", "CVE-2022-21242", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0148", "The All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs WordPress plugin before 2.0.4 was vulnerable to reflected XSS on the my-sticky-elements-leads admin page.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Marcuccio/kevin", "https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd"], ["2022", "CVE-2022-28530", "Sourcecodester Covid-19 Directory on Vaccination System 1.0 is vulnerable to SQL Injection via cmdcategory.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-32033", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the function formSetVirtualSer.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer"], ["2022", "CVE-2022-23347", "BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/Z0fhack/Goby_POC", "https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347"], ["2022", "CVE-2022-1224", "Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cd9e1508-5682-427e-a921-14b4f520b85a"], ["2022", "CVE-2022-38528", "Open Asset Import Library (assimp) commit 3c253ca was discovered to contain a segmentation violation via the component Assimp::XFileImporter::CreateMeshes.", "No PoCs found on GitHub currently.", "https://github.com/assimp/assimp/issues/4662"], ["2022", "CVE-2022-35653", "A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/luukverhoeven/luukverhoeven", "No PoCs from references."], ["2022", "CVE-2022-24527", "Microsoft Endpoint Configuration Manager Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows", "No PoCs from references."], ["2022", "CVE-2022-39947", "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.2, FortiADC version 6.2.0 through 6.2.3, FortiADC version version 6.1.0 through 6.1.6, FortiADC version 6.0.0 through 6.0.4, FortiADC version 5.4.0 through 5.4.5 may allow an attacker to execute unauthorized code or commands via specifically crafted HTTP requests.", "https://github.com/Threekiii/CVE", "No PoCs from references."], ["2022", "CVE-2022-39807", "Due to lack of proper memory management, when a victim opens manipulated SolidWorks Drawing (.sldasm, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-42272", "NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can cause a buffer overflow, which may lead to code execution, denial of service or escalation of privileges.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5435"], ["2022", "CVE-2022-26562", "An issue in provider/libserver/ECKrbAuth.cpp of Kopano Core <= v11.0.2.51 contains an issue which allows attackers to authenticate even if the user account or password is expired. It also exists in the predecessor Zarafa Collaboration Platform (ZCP) in provider/libserver/ECPamAuth.cpp of Zarafa >= 6.30 (introduced between 6.30.0 RC1e and 6.30.8 final).", "No PoCs found on GitHub currently.", "https://kopano.com/"], ["2022", "CVE-2022-37616", "A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states \"we are in the process of marking this report as invalid\"; however, some third parties takes the position that \"A prototype injection/Prototype pollution is not just when global objects are polluted with recursive merge or deep cloning but also when a target object is polluted.\"", "https://github.com/ARPSyndicate/cvemon https://github.com/Tolam-Earth/marketplace-ui", "https://github.com/xmldom/xmldom/issues/436 https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826 https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560"], ["2022", "CVE-2022-1364", "Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/A1Lin/cve-2022-1364 https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/anvbis/chrome_v8_ndays https://github.com/davidboukari/yum-rpm-dnf https://github.com/nomi-sec/PoC-in-GitHub https://github.com/wh1ant/vulnjs", "No PoCs from references."], ["2022", "CVE-2022-4790", "The WP Google My Business Auto Publish WordPress plugin before 3.4 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1"], ["2022", "CVE-2022-21302", "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30076", "ENTAB ERP 1.0 allows attackers to discover users' full names via a brute force attack with a series of student usernames such as s10000 through s20000. There is no rate limiting.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html"], ["2022", "CVE-2022-37915", "A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an unauthenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to a complete system compromise of Aruba EdgeConnect Enterprise Orchestration with versions 9.1.x branch only, Any 9.1.x Orchestrator instantiated as a new machine with a release prior to 9.1.3.40197, Orchestrators upgraded to 9.1.x were not affected.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0399", "The Advanced Product Labels for WooCommerce WordPress plugin before 1.2.3.7 does not sanitise and escape the tax_color_set_type parameter before outputting it back in the berocket_apl_color_listener AJAX action's response, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164"], ["2022", "CVE-2022-32173", "In OrchardCore rc1-11259 to v1.2.2 vulnerable to HTML injection, allow an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32173"], ["2022", "CVE-2022-4510", "A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction,\u00a0would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py.This issue affects binwalk from 2.1.2b through 2.3.3 included.", "https://github.com/ARPSyndicate/cvemon https://github.com/Aledangelo/Pilgrimage_Writeup https://github.com/Kalagious/BadPfs https://github.com/MattiaCossu/Pilgrimage-HackTheBox-CTF https://github.com/adhikara13/CVE-2022-4510-WalkingPath https://github.com/electr0sm0g/CVE-2022-4510 https://github.com/hheeyywweellccoommee/CVE-2022-4510-yjrvc https://github.com/k0mi-tg/CVE-POC https://github.com/linuskoester/writeups https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/yj94/Yj_learning https://github.com/youwizard/CVE-POC", "https://github.com/ReFirmLabs/binwalk/pull/617"], ["2022", "CVE-2022-4681", "The Hide My WP WordPress plugin before 6.2.9 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689"], ["2022", "CVE-2022-37804", "Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3"], ["2022", "CVE-2022-21213", "This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544).", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622 https://snyk.io/vuln/SNYK-JS-MOUT-2342654"], ["2022", "CVE-2022-21182", "A privilege escalation vulnerability exists in the router configuration import functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to increased privileges. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472"], ["2022", "CVE-2022-0288", "The Ad Inserter WordPress plugin before 2.7.10, Ad Inserter Pro WordPress plugin before 2.7.10 do not sanitise and escape the html_element_selection parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42"], ["2022", "CVE-2022-45503", "Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the linkEn parameter at /goform/setAutoPing.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md"], ["2022", "CVE-2022-28561", "There is a stack overflow vulnerability in the /goform/setMacFilterCfg function in the httpd service of Tenda ax12 22.03.01.21_cn router. An attacker can obtain a stable shell through a carefully constructed payload", "No PoCs found on GitHub currently.", "https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12"], ["2022", "CVE-2022-23316", "An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.", "https://github.com/superlink996/chunqiuyunjingbachang", "https://github.com/taogogo/taocms/issues/15"], ["2022", "CVE-2022-23087", "The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload (\"TSO\"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets.When checksum offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to specify the checksum offset in the on-stack buffer. The offset was not validated for certain packet types.A misbehaving bhyve guest could overwrite memory in the bhyve process on the host, possibly leading to code execution in the host context.The bhyve process runs in a Capsicum sandbox, which (depending on the FreeBSD version and bhyve configuration) limits the impact of exploiting this issue.", "https://github.com/StonerJoe420/StonerJoe.io https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/synacktiv/bhyve", "No PoCs from references."], ["2022", "CVE-2022-35602", "A SQL injection vulnerability in UserDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter user.", "No PoCs found on GitHub currently.", "https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-24576", "GPAC 1.0.1 is affected by Use After Free through MP4Box.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2061 https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/"], ["2022", "CVE-2022-1275", "The BannerMan WordPress plugin through 0.2.4 does not sanitize or escape its settings, which could allow high-privileged users to perform Cross-Site Scripting attacks when the unfiltered_html is disallowed (such as in multisite)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092"], ["2022", "CVE-2022-3370", "Use after free in Custom Elements in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1335", "The Slideshow CK WordPress plugin before 1.4.10 does not sanitize and escape Slide's descriptions, which could allow high-privileged users such as admin to perform Cross-Site Scripting attacks when unfiltered_html is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e"], ["2022", "CVE-2022-24436", "Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.", "https://github.com/ARPSyndicate/cvemon https://github.com/bollwarm/SecToolSet https://github.com/teresaweber685/book_list", "No PoCs from references."], ["2022", "CVE-2022-21353", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28421", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin.php?id=posts&action=display&value=1&postid=.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-35841", "Windows Enterprise App Management Service Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Wack0/CVE-2022-35841 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4450", "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses anddecodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data.If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments arepopulated with pointers to buffers containing the relevant decoded data. Thecaller is responsible for freeing those buffers. It is possible to construct aPEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex()will return a failure code but will populate the header argument with a pointerto a buffer that has already been freed. If the caller also frees this bufferthen a double free will occur. This will most likely lead to a crash. Thiscould be exploited by an attacker who has the ability to supply malicious PEMfiles for parsing to achieve a denial of service attack.The functions PEM_read_bio() and PEM_read() are simple wrappers aroundPEM_read_bio_ex() and therefore these functions are also directly affected.These functions are also called indirectly by a number of other OpenSSLfunctions including PEM_X509_INFO_read_bio_ex() andSSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internaluses of these functions are not vulnerable because the caller does not free theheader argument if PEM_read_bio_ex() returns a failure code. These locationsinclude the PEM_read_bio_TYPE() functions as well as the decoders introduced inOpenSSL 3.0.The OpenSSL asn1parse command line application is also impacted by this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/FairwindsOps/bif https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/Tuttu7/Yum-command https://github.com/a23au/awe-base-images https://github.com/bluesentinelsec/landing-zone https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/neo9/fluentd https://github.com/nidhi7598/OPENSSL_1.1.1g_G3_CVE-2022-4450 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/peng-hui/CarpetFuzz https://github.com/rootameen/vulpine https://github.com/stkcat/awe-base-images https://github.com/tnishiox/kernelcare-playground https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "No PoCs from references."], ["2022", "CVE-2022-4757", "The List Pages Shortcode WordPress plugin before 1.7.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1"], ["2022", "CVE-2022-43248", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_weighted_pred_avg_16_fallback in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/349"], ["2022", "CVE-2022-34729", "Windows GDI Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/MagicPwnrin/CVE-2022-34729 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Pwnrin/CVE-2022-34729 https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-30320", "Saia Burgess Controls (SBC) PCD through 2022-05-06 uses a Broken or Risky Cryptographic Algorithm. According to FSCT-2022-0063, there is a Saia Burgess Controls (SBC) PCD S-Bus weak credential hashing scheme issue. The affected components are characterized as: S-Bus (5050/UDP) authentication. The potential impact is: Authentication bypass. The Saia Burgess Controls (SBC) PCD controllers utilize the S-Bus protocol (5050/UDP) for a variety of engineering purposes. It is possible to configure a password in order to restrict access to sensitive engineering functionality. Authentication is done by using the S-Bus 'write byte' message to a specific address and supplying a hashed version of the password. The hashing algorithm used is based on CRC-16 and as such not cryptographically secure. An insecure hashing algorithm is used. An attacker capable of passively observing traffic can intercept the hashed credentials and trivially find collisions allowing for authentication without having to bruteforce a keyspace defined by the actual strength of the password. This allows the attacker access to sensitive engineering functionality such as uploading/downloading control logic and manipulating controller configuration.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-26937", "Windows Network File System Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Ascotbe/Kernelhub https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows https://github.com/Malwareman007/CVE-2022-26937 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/corelight/CVE-2022-26937 https://github.com/i6c/CVE-2022-26937 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/omair2084/CVE-2022-26937 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-42124", "ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17435 https://issues.liferay.com/browse/LPE-17535"], ["2022", "CVE-2022-24731", "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.5.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal vulnerability, allowing a malicious user with read/write access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `create` or `update` access to Applications can leak the contents of any text file on the repo-server. By crafting a malicious Helm chart and using it in an Application, the attacker can retrieve the sensitive file's contents either as part of the generated manifests or in an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from another Application's source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The problem can be mitigated by avoiding storing secrets in git, avoiding mounting secrets as files on the repo-server, avoiding decrypting secrets into files on the repo-server, and carefully limiting who can `create` or `update` Applications.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-26634", "HMA VPN v5.3.5913.0 contains an unquoted service path which allows attackers to escalate privileges to the system level.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50765"], ["2022", "CVE-2022-47942", "An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.", "https://github.com/helgerod/ksmb-check", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2"], ["2022", "CVE-2022-40021", "QVidium Technologies Amino A140 (prior to firmware version 1.0.0-283) was discovered to contain a command injection vulnerability.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/CVE-2022-40021/"], ["2022", "CVE-2022-1032", "Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622"], ["2022", "CVE-2022-20338", "In HierarchicalUri.readFrom of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to a local escalation of privilege, preventing processes from validating URIs correctly, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-171966843", "https://github.com/Satheesh575555/frameworks_base_AOSP_06_r22_CVE-2022-20338 https://github.com/Trinadh465/frameworks_base_AOSP_10_r33_CVE-2022-20338 https://github.com/nidhi7598/frameworks_base_AOSP_06_r22_CVE-2022-20338 https://github.com/nidhi7598/frameworks_base_AOSP_10_r33_CVE-2022-20338 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-33149", "A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the CloneSite plugin, allowing an attacker to inject SQL by manipulating the url parameter.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551"], ["2022", "CVE-2022-3137", "The Taskbuilder WordPress plugin before 1.0.8 does not validate and sanitise task's attachments, which could allow any authenticated user (such as subscriber) creating a task to perform Stored Cross-Site Scripting by attaching a malicious SVG file", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8"], ["2022", "CVE-2022-1172", "Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264"], ["2022", "CVE-2022-3077", "A buffer overflow vulnerability was found in the Linux kernel Intel\u2019s iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-42064", "Online Diagnostic Lab Management System version 1.0 remote exploit that bypasses login with SQL injection and then uploads a shell.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html"], ["2022", "CVE-2022-45907", "In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.", "https://github.com/mangoding71/AGNC", "No PoCs from references."], ["2022", "CVE-2022-35505", "A segmentation fault in TripleCross v0.1.0 occurs when sending a control command from the client to the server. This occurs because there is no limit to the length of the output of the executed command.", "https://github.com/firmianay/security-issues", "https://github.com/h3xduck/TripleCross/issues/40"], ["2022", "CVE-2022-37400", "Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice", "No PoCs found on GitHub currently.", "https://www.openoffice.org/security/cves/CVE-2022-37400.html"], ["2022", "CVE-2022-21285", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26877", "Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.", "No PoCs found on GitHub currently.", "https://asana.com"], ["2022", "CVE-2022-35997", "TensorFlow is an open source platform for machine learning. If `tf.sparse.cross` receives an input `separator` that is not a scalar, it gives a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 83dcb4dbfa094e33db084e97c4d0531a559e0ebf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-43308", "INTELBRAS SG 2404 MR 20180928-rel64938 allows authenticated attackers to arbitrarily create Administrator accounts via crafted user cookies.", "No PoCs found on GitHub currently.", "https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt"], ["2022", "CVE-2022-4617", "Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df"], ["2022", "CVE-2022-34669", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can access or modify system files or other files that are critical to the application, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-21394", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26966", "An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062"], ["2022", "CVE-2022-35886", "Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` and `key` HTTP parameters, as used within the `/action/wirelessConnect` handler.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585"], ["2022", "CVE-2022-32274", "The Transition Scheduler add-on 6.5.0 for Atlassian Jira is prone to stored XSS via the project name to the creation function.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt"], ["2022", "CVE-2022-24863", "http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the \"GET\" method as a workaround.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves https://github.com/karimhabush/cyberowl https://github.com/leveryd/go-sec-code", "No PoCs from references."], ["2022", "CVE-2022-23100", "OX App Suite through 7.10.6 allows OS Command Injection via Documentconverter (e.g., through an email attachment).", "No PoCs found on GitHub currently.", "https://seclists.org/fulldisclosure/2022/Jul/11"], ["2022", "CVE-2022-39403", "Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Shell accessible data as well as unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 3.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).", "https://github.com/ycdxsb/ycdxsb", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-45715", "IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pLanPortRange and pWanPortRange parameters in the formSetPortMapping function.", "No PoCs found on GitHub currently.", "https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HkJ_o8Arj"], ["2022", "CVE-2022-29889", "A hard-coded password vulnerability exists in the telnet functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z. Use of a hard-coded root password can lead to arbitrary command execution. An attacker can authenticate with hard-coded credentials to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569"], ["2022", "CVE-2022-4497", "The Jetpack CRM WordPress plugin before 5.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86"], ["2022", "CVE-2022-4706", "The Genesis Columns Advanced WordPress plugin before 2.0.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c"], ["2022", "CVE-2022-1063", "The Thank Me Later WordPress plugin through 3.3.4 does not sanitise and escape the Message Subject field before outputting it in the Messages list, which could allow high privileges users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082"], ["2022", "CVE-2022-20369", "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-4805", "Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873"], ["2022", "CVE-2022-35414", "** DISPUTED ** softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., \"Bugs affecting the non-virtualization use case are not considered security bugs at this time.\"", "No PoCs found on GitHub currently.", "https://sick.codes/sick-2022-113"], ["2022", "CVE-2022-24760", "Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/tuo4n8/CVE-2022-24760 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/"], ["2022", "CVE-2022-40070", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via bin/httpd, function: formSetFirewallCfg.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8"], ["2022", "CVE-2022-45956", "Boa Web Server versions 0.94.13 through 0.94.14 fail to validate the correct security constraint on the HEAD HTTP method allowing everyone to bypass the Basic Authorization mechanism.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html"], ["2022", "CVE-2022-24620", "Piwigo version 12.2.0 is vulnerable to stored cross-site scripting (XSS), which can lead to privilege escalation. In this way, admin can steal webmaster's cookies to get the webmaster's access.", "No PoCs found on GitHub currently.", "https://github.com/Piwigo/Piwigo/issues/1605"], ["2022", "CVE-2022-37451", "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.", "https://github.com/ARPSyndicate/cvemon https://github.com/firatesatoglu/shodanSearch https://github.com/ivd38/exim_invalid_free", "No PoCs from references."], ["2022", "CVE-2022-47853", "TOTOlink A7100RU V7.4cu.2313_B20191024 is vulnerable to Command Injection Vulnerability in the httpd service. An attacker can obtain a stable root shell through a specially constructed payload.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/16"], ["2022", "CVE-2022-1123", "The Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) WordPress plugin before 3.12.5 does not properly sanitize some parameters before inserting them into SQL queries. As a result, high privilege users could perform SQL injection attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812"], ["2022", "CVE-2022-20229", "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4646", "Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.5.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10"], ["2022", "CVE-2022-27449", "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.", "https://github.com/ARPSyndicate/cvemon https://github.com/Griffin-2022/Griffin", "https://jira.mariadb.org/browse/MDEV-28089"], ["2022", "CVE-2022-21145", "A stored cross-site scripting vulnerability exists in the WebUserActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442"], ["2022", "CVE-2022-26826", "Windows DNS Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-23040", "Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-28637", "A local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.", "No PoCs found on GitHub currently.", "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us"], ["2022", "CVE-2022-45655", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the timeZone parameter in the form_fast_setting_wifi_set function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md"], ["2022", "CVE-2022-24402", "The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-28887", "Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash.", "https://github.com/ARPSyndicate/cvemon https://github.com/Team-BT5/WinAFL-RDP https://github.com/bacon-tomato-spaghetti/WinAFL-RDP https://github.com/googleprojectzero/winafl https://github.com/ssumachai/CS182-Project https://github.com/yrime/WinAflCustomMutate", "No PoCs from references."], ["2022", "CVE-2022-40083", "Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF).", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Henry4E36/POCS https://github.com/cokeBeer/go-cves", "No PoCs from references."], ["2022", "CVE-2022-26696", "This issue was addressed with improved environment sanitization. This issue is fixed in macOS Monterey 12.4. A sandboxed process may be able to circumvent sandbox restrictions.", "https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-26507", "** UNSUPPORTED WHEN ASSIGNED ** A heap-based buffer overflow exists in XML Decompression DecodeTreeBlock in AT&T Labs Xmill 0.7. A crafted input file can lead to remote code execution. This is not the same as any of: CVE-2021-21810, CVE-2021-21811, CVE-2021-21812, CVE-2021-21815, CVE-2021-21825, CVE-2021-21826, CVE-2021-21828, CVE-2021-21829, or CVE-2021-21830. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "No PoCs found on GitHub currently.", "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-02"], ["2022", "CVE-2022-1090", "The Good & Bad Comments WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19"], ["2022", "CVE-2022-1301", "The WP Contact Slider WordPress plugin before 2.4.7 does not sanitize and escape the Text to Display settings of sliders, which could allow high privileged users such as editor and above to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8"], ["2022", "CVE-2022-3195", "Out of bounds write in Storage in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29779", "Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/485"], ["2022", "CVE-2022-4464", "Themify Portfolio Post WordPress plugin before 1.2.1 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high privileged users such as admin.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c"], ["2022", "CVE-2022-26995", "Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pptp (wan_pptp.html) function via the pptp_fix_ip, pptp_fix_mask, pptp_fix_gw, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-21367", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-30013", "A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-45477", "Telepad allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "https://github.com/ARPSyndicate/cvemon https://github.com/M507/nmap-vulnerability-scan-scripts https://github.com/nomi-sec/PoC-in-GitHub", "https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/"], ["2022", "CVE-2022-2168", "The Download Manager WordPress plugin before 3.2.44 does not escape a generated URL before outputting it back in an attribute of the history dashboard, leading to Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010"], ["2022", "CVE-2022-28784", "Path traversal vulnerability in Galaxy Themes prior to SMR May-2022 Release 1 allows attackers to list file names in arbitrary directory as system user. The patch addresses incorrect implementation of file path validation check logic.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-28415", "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_collection.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-35875", "Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `wpapsk` configuration parameter, as used within the `testWifiAP` XCMD handler", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581"], ["2022", "CVE-2022-21227", "The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.", "No PoCs found on GitHub currently.", "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470 https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645"], ["2022", "CVE-2022-2028", "Cross-site Scripting (XSS) - Generic in GitHub repository kromitgmbh/titra prior to 0.77.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/588fb241-bc8f-40fc-82a4-df249956d69f"], ["2022", "CVE-2022-45537", "EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie \"ENV_LIST_URL\".", "https://github.com/Srpopty/Corax", "https://github.com/weng-xianhu/eyoucms/issues/34"], ["2022", "CVE-2022-35935", "TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-32056", "Online Accreditation Management v1.0 was discovered to contain a SQL injection vulnerability via the USERNAME parameter at process.php.", "No PoCs found on GitHub currently.", "https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi"], ["2022", "CVE-2022-27828", "Improper validation vulnerability in MediaMonitorEvent prior to SMR Apr-2022 Release 1 allows attackers to launch certain activities.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4"], ["2022", "CVE-2022-1241", "The Ask me WordPress theme before 6.8.2 does not properly sanitise and escape several of the fields in the Edit Profile page, leading to Reflected Cross-Site Scripting issues", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b"], ["2022", "CVE-2022-26447", "In BT firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784478; Issue ID: ALPS06784478.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-27939", "tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6 in common/get.c.", "No PoCs found on GitHub currently.", "https://github.com/appneta/tcpreplay/issues/717"], ["2022", "CVE-2022-1350", "A vulnerability classified as problematic was found in GhostPCL 9.55.0. This vulnerability affects the function chunk_free_object of the file gsmchunk.c. The manipulation with a malicious file leads to a memory corruption. The attack can be initiated remotely but requires user interaction. The exploit has been disclosed to the public as a POC and may be used. It is recommended to apply the patches to fix this issue.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-3255", "If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can: Perform any action within the application that the user can perform. View any information that the user is able to view. Modify any information that the user is able to modify. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902"], ["2022", "CVE-2022-39833", "FileCloud Versions 20.2 and later allows remote attackers to potentially cause unauthorized remote code execution and access to reported API endpoints via a crafted HTTP request.", "No PoCs found on GitHub currently.", "https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c"], ["2022", "CVE-2022-42246", "Doufox 0.0.4 contains a CSRF vulnerability that can add system administrator account.", "No PoCs found on GitHub currently.", "https://github.com/farliy-hacker/Doufoxcms/issues/1"], ["2022", "CVE-2022-21336", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28444", "UCMS v1.6 was discovered to contain an arbitrary file read vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-2139", "The affected product is vulnerable to directory traversal, which may allow an attacker to access unauthorized files and execute arbitrary code.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-30293", "In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "No PoCs found on GitHub currently.", "https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0"], ["2022", "CVE-2022-37861", "There is a remote code execution (RCE) vulnerability in Tenhot TWS-100 V4.0-201809201424 router device. It is necessary to know that the device account password is allowed to escape the execution system command through the network tools in the network diagnostic component.", "https://github.com/ARPSyndicate/cvemon https://github.com/ox01024/ox01024", "No PoCs from references."], ["2022", "CVE-2022-21276", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-2079", "Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to 0.91.7+.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a"], ["2022", "CVE-2022-32007", "Complete Online Job Search System v1.0 is vulnerable to SQL Injection via /eris/admin/company/index.php?view=edit&id=.", "https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-32396", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/visits/manage_visit.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md"], ["2022", "CVE-2022-24682", "An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/rxerium/CVE-2022-24086 https://github.com/v-p-b/xss-reflections", "No PoCs from references."], ["2022", "CVE-2022-42097", "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.' .", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/CVE-2022-42097 https://github.com/bypazs/bypazs https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1"], ["2022", "CVE-2022-1181", "Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.2.", "https://github.com/zn9988/publications", "No PoCs from references."], ["2022", "CVE-2022-1210", "A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.", "https://github.com/ARPSyndicate/cvemon https://github.com/adegoodyer/kubernetes-admin-toolkit", "https://gitlab.com/libtiff/libtiff/-/issues/402 https://vuldb.com/?id.196363"], ["2022", "CVE-2022-34999", "JPEGDEC commit be4843c was discovered to contain a FPE via DecodeJPEG at /src/jpeg.inl.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-4415", "A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.", "https://github.com/ARPSyndicate/cvemon https://github.com/PajakAlexandre/wik-dps-tp02 https://github.com/cdupuis/image-api", "https://www.openwall.com/lists/oss-security/2022/12/21/3"], ["2022", "CVE-2022-4784", "The Hueman Addons WordPress plugin through 2.3.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9"], ["2022", "CVE-2022-32167", "Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.", "No PoCs found on GitHub currently.", "https://www.mend.io/vulnerability-database/CVE-2022-32167"], ["2022", "CVE-2022-35804", "SMB Client and Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/phrara/FGV50", "No PoCs from references."], ["2022", "CVE-2022-2288", "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad"], ["2022", "CVE-2022-45406", "If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.", "https://github.com/ARPSyndicate/cvemon https://github.com/googleprojectzero/fuzzilli https://github.com/zhangjiahui-buaa/MasterThesis", "No PoCs from references."], ["2022", "CVE-2022-45797", "An arbitrary file deletion vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges and delete files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", "https://github.com/SafeBreach-Labs/aikido_wiper", "No PoCs from references."], ["2022", "CVE-2022-21316", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-40363", "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.", "https://github.com/ARPSyndicate/cvemon https://github.com/Olafdaf/CVE-2022-40363 https://github.com/V33RU/IoTSecurity101 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/flipperdevices/flipperzero-firmware/pull/1697"], ["2022", "CVE-2022-39813", "Italtel NetMatch-S CI 5.2.0-20211008 allows Multiple Reflected/Stored XSS issues under NMSCIWebGui/j_security_check via the j_username parameter, or NMSCIWebGui/actloglineview.jsp via the name or actLine parameter. An attacker leveraging this vulnerability could inject arbitrary JavaScript. The payload would then be triggered every time an authenticated user browses the page containing it.", "No PoCs found on GitHub currently.", "https://www.gruppotim.it/it/footer/red-team.html"], ["2022", "CVE-2022-45894", "GetFile.aspx in Planet eStream before 6.72.10.07 allows ..\\ directory traversal to read arbitrary local files.", "https://github.com/ARPSyndicate/cvemon", "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/"], ["2022", "CVE-2022-42266", "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can cause exposure of sensitive information to an actor that is not explicitly authorized to have access to that information, which may lead to limited information disclosure.", "No PoCs found on GitHub currently.", "https://nvidia.custhelp.com/app/answers/detail/a_id/5415"], ["2022", "CVE-2022-35707", "Adobe Bridge version 12.0.2 (and earlier) and 11.1.3 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-29499", "The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "No PoCs from references."], ["2022", "CVE-2022-3335", "The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d"], ["2022", "CVE-2022-39953", "A improper privilege management in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.6, FortiNAC version 9.1.0 through 9.1.8, FortiNAC all versions 8.8, FortiNAC all versions 8.7, FortiNAC all versions 8.6, FortiNAC all versions 8.5, FortiNAC version 8.3.7 allows attacker to escalation of privilege via specially crafted commands.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-35944", "October is a self-hosted Content Management System (CMS) platform based on the Laravel PHP Framework. This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the \"Editor\" section, they can bypass the Safe Mode (`cms.safe_mode`) restriction to introduce new PHP code in a CMS template using a specially crafted request. The issue has been patched in versions 2.2.34 and 3.0.66.", "https://github.com/cyllective/CVEs", "No PoCs from references."], ["2022", "CVE-2022-45546", "Information Disclosure in Authentication Component of ScreenCheck BadgeMaker 2.6.2.0 application allows internal attacker to obtain credentials for authentication via network sniffing.", "No PoCs found on GitHub currently.", "https://lgnas.gitbook.io/cve-2022-45546/"], ["2022", "CVE-2022-21256", "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37841", "In TOTOLINK A860R V4.1.2cu.5182_B20201027 there is a hard coded password for root in /etc/shadow.sample.", "https://github.com/1759134370/iot", "No PoCs from references."], ["2022", "CVE-2022-30122", "A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.", "https://github.com/holmes-py/reports-summary", "No PoCs from references."], ["2022", "CVE-2022-44929", "An access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated attackers to escalate privileges via arbitrarily editing VoIP SIB profiles.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44929"], ["2022", "CVE-2022-23242", "TeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted connection password.", "https://github.com/ARPSyndicate/cvemon https://github.com/WildZarek/WildZarek https://github.com/mongodb/vuln-mgt-without-agents", "No PoCs from references."], ["2022", "CVE-2022-2148", "The LinkedIn Company Updates WordPress plugin through 1.5.3 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f"], ["2022", "CVE-2022-28435", "Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/siteoptions.php&action=displaygoal&value=1&roleid=1.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-30033", "Tenda TX9 Pro V22.03.02.10 is vulnerable to Buffer Overflow via the functtion setIPv6Status() in httpd module.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4niz/Vulnerability https://github.com/zhefox/Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-21347", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-3224", "Misinterpretation of Input in GitHub repository ionicabizau/parse-url prior to 8.1.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3587a567-7fcd-4702-b7c9-d9ca565e3c62"], ["2022", "CVE-2022-1321", "The miniOrange's Google Authenticator WordPress plugin before 5.5.6 does not sanitise and escape some of its settings, leading to malicious users with administrator privileges to store malicious Javascript code leading to Cross-Site Scripting attacks when unfiltered_html is disallowed (for example in multisite setup)", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c"], ["2022", "CVE-2022-26527", "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets\u2019 reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-42237", "A SQL Injection issue in Merchandise Online Store v.1.0 allows an attacker to log in to the admin account.", "No PoCs found on GitHub currently.", "https://github.com/draco1725/sqlinj/blob/main/poc"], ["2022", "CVE-2022-39842", "** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19"], ["2022", "CVE-2022-35756", "Windows Kerberos Elevation of Privilege Vulnerability", "https://github.com/tyranid/blackhat-usa-2022-demos", "No PoCs from references."], ["2022", "CVE-2022-24422", "Dell iDRAC9 versions 5.00.00.00 and later but prior to 5.10.10.00, contain an improper authentication vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to gain access to the VNC Console.", "https://github.com/ARPSyndicate/cvemon https://github.com/chnzzh/iDRAC-CVE-lib", "No PoCs from references."], ["2022", "CVE-2022-24562", "In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/tomerpeled92/CVE https://github.com/vishnusomank/GoXploitDB", "http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d"], ["2022", "CVE-2022-35587", "A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the \"publish_on_date\" Parameter", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6-other-forkcms/"], ["2022", "CVE-2022-3364", "Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a3.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720"], ["2022", "CVE-2022-29588", "Konica Minolta bizhub MFP devices before 2022-04-14 use cleartext password storage for the /var/log/nginx/html/ADMINPASS and /etc/shadow files.", "No PoCs found on GitHub currently.", "http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html"], ["2022", "CVE-2022-29619", "Under certain conditions SAP BusinessObjects Business Intelligence Platform 4.x - versions 420,430 allows user Administrator to view, edit or modify rights of objects it doesn't own and which would otherwise be restricted.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-4504", "Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/f50538cb-99d3-411d-bd1a-5f36d1fa9f5d"], ["2022", "CVE-2022-4695", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789"], ["2022", "CVE-2022-23302", "JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/GavinStevensHoboken/log4j https://github.com/HynekPetrak/log4shell-finder https://github.com/RihanaDave/logging-log4j1-main https://github.com/Schnitker/log4j-min https://github.com/albert-liu435/logging-log4j-1_2_17 https://github.com/apache/logging-log4j1 https://github.com/averemee-si/oracdc https://github.com/davejwilson/azure-spark-pools-log4j https://github.com/logpresso/CVE-2021-44228-Scanner https://github.com/ltslog/ltslog https://github.com/thl-cmk/CVE-log4j-check_mk-plugin https://github.com/trhacknon/CVE-2021-44228-Scanner https://github.com/trhacknon/log4shell-finder https://github.com/whitesource/log4j-detect-distribution", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-23093", "ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to\u00a0reconstruct the IP header, the ICMP header and if present a \"quoted\u00a0packet,\" which represents the packet that generated an ICMP error. The\u00a0quoted packet again has an IP header and an ICMP header.The pr_pack() copies received IP and ICMP headers into stack buffers\u00a0for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes.The memory safety bugs described above can be triggered by a remote\u00a0host, causing the ping program to crash.The ping process runs in a capability mode sandbox on all affected\u00a0versions of FreeBSD and is thus very constrained in how it can interact\u00a0with the rest of the system at the point where the bug can occur.", "https://github.com/H4lo/awesome-IoT-security-article https://github.com/Inplex-sys/CVE-2022-23093 https://github.com/Symbolexe/DrayTek-Exploit https://github.com/fkie-cad/nvd-json-data-feeds https://github.com/k0imet/pyfetch", "No PoCs from references."], ["2022", "CVE-2022-45517", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/VirtualSer.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md"], ["2022", "CVE-2022-2008", "Double free in WebGL in Google Chrome prior to 102.0.5005.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/Live-Hack-CVE/CVE-2022-2008", "No PoCs from references."], ["2022", "CVE-2022-28575", "It is found that there is a command injection vulnerability in the setopenvpnclientcfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows attackers to execute arbitrary commands through a carefully constructed payload", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1"], ["2022", "CVE-2022-37810", "Tenda AC1206 V15.03.06.23 was discovered to contain a command injection vulnerability via the mac parameter in the function formWriteFacMac.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19"], ["2022", "CVE-2022-35434", "jpeg-quantsmooth before commit 8879454 contained a floating point exception (FPE) via /jpeg-quantsmooth/jpegqs+0x4f5d6c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-4825", "The WP-ShowHide WordPress plugin before 1.05 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a"], ["2022", "CVE-2022-1043", "A flaw was found in the Linux kernel\u2019s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html"], ["2022", "CVE-2022-34758", "A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. Affected Products: Easergy P5 (V01.401.102 and prior)", "No PoCs found on GitHub currently.", "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf"], ["2022", "CVE-2022-43239", "Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_chroma in motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/341"], ["2022", "CVE-2022-39423", "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.38. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-23120", "A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.", "https://github.com/0xStrygwyr/OSCP-Guide https://github.com/0xZipp0/OSCP https://github.com/0xsyr0/OSCP https://github.com/ARPSyndicate/cvemon https://github.com/Ly0nt4r/OSCP https://github.com/SirElmard/ethical_hacking https://github.com/e-hakson/OSCP https://github.com/eljosep/OSCP-Guide https://github.com/kgwanjala/oscp-cheatsheet https://github.com/modzero/MZ-21-02-Trendmicro https://github.com/nitishbadole/oscp-note-3 https://github.com/oscpname/OSCP_cheat https://github.com/revanmalang/OSCP https://github.com/txuswashere/OSCP https://github.com/xhref/OSCP", "https://success.trendmicro.com/solution/000290104 https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt"], ["2022", "CVE-2022-32254", "A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). A customized HTTP POST request could force the application to write the status of a given user to a log file, exposing sensitive user information that could provide valuable guidance to an attacker.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-47630", "Trusted Firmware-A through 2.8 has an out-of-bounds read in the X.509 parser for parsing boot certificates. This affects downstream use of get_ext and auth_nvctr. Attackers might be able to trigger dangerous read side effects or obtain sensitive information about microarchitectural state.", "https://github.com/karimhabush/cyberowl", "https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html"], ["2022", "CVE-2022-28586", "XSS in edit page of Hoosk 1.8.0 allows attacker to execute javascript code in user browser via edit page with XSS payload bypass filter some special chars.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhienit2010/Vulnerability", "https://github.com/havok89/Hoosk/issues/63"], ["2022", "CVE-2022-32085", "MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26407"], ["2022", "CVE-2022-24903", "Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories", "No PoCs from references."], ["2022", "CVE-2022-23060", "A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0, where a privileged user (attacker) can inject malicious JavaScript in the filename under the \u201cManage files\u201d tab", "https://github.com/karimhabush/cyberowl", "https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23060"], ["2022", "CVE-2022-26806", "Microsoft Office Graphics Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21165", "All versions of package font-converter are vulnerable to Arbitrary Command Injection due to missing sanitization of input that potentially flows into the child_process.exec() function.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194"], ["2022", "CVE-2022-47770", "Serenissima Informatica Fast Checkin version v1.0 is vulnerable to Unauthenticated SQL Injection.", "No PoCs found on GitHub currently.", "https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/"], ["2022", "CVE-2022-34618", "A stored cross-site scripting (XSS) vulnerability in Mealie 1.0.0beta3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the recipe description text field.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/"], ["2022", "CVE-2022-4666", "The Markup (JSON-LD) structured in schema.org WordPress plugin through 4.8.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d"], ["2022", "CVE-2022-1103", "The Advanced Uploader WordPress plugin through 4.2 allows any authenticated users like subscriber to upload arbitrary files, such as PHP, which could lead to RCE", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18"], ["2022", "CVE-2022-1292", "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/alcaparra/CVE-2022-1292 https://github.com/backloop-biz/CVE_checks https://github.com/chnzzh/OpenSSL-CVE-lib https://github.com/fdl66/openssl-1.0.2u-fix-cve https://github.com/greek0x0/CVE-2022-1292 https://github.com/jntass/TASSL-1.1.1 https://github.com/k0mi-tg/CVE-POC https://github.com/li8u99/CVE-2022-1292 https://github.com/manas3c/CVE-POC https://github.com/mawinkler/c1-cs-scan-result https://github.com/nidhi7598/openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/rama291041610/CVE-2022-1292 https://github.com/shubhamkulkarni97/CVE-Presentations https://github.com/tianocore-docs/ThirdPartySecurityAdvisories https://github.com/trhacknon/CVE-2022-1292 https://github.com/trhacknon/Pocingit https://github.com/und3sc0n0c1d0/CVE-2022-1292 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-40110", "TOTOLINK A3002R TOTOLINK-A3002R-He-V1.1.1-B20200824.0128 is vulnerable to Buffer Overflow via /bin/boa.", "https://github.com/1759134370/iot", "https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md"], ["2022", "CVE-2022-47873", "Netcad KEOS 1.0 is vulnerable to XML External Entity (XXE) resulting in SSRF with XXE (remote).", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/waspthebughunter/CVE-2022-47873 https://github.com/waspthebughunter/waspthebughunter", "https://fordefence.com/cve-2022-47873-keos-software-xx/"], ["2022", "CVE-2022-24600", "Luocms v2.0 is affected by SQL Injection through /admin/login.php. An attacker can log in to the background through SQL injection statements.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-1012", "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "https://github.com/ARPSyndicate/cvemon https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1383", "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9"], ["2022", "CVE-2022-28805", "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.", "https://github.com/lengjingzju/cbuild https://github.com/lengjingzju/cbuild-ng", "https://lua-users.org/lists/lua-l/2022-02/msg00001.html https://lua-users.org/lists/lua-l/2022-02/msg00070.html https://lua-users.org/lists/lua-l/2022-04/msg00009.html"], ["2022", "CVE-2022-32205", "A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on `foo.example.com` can set cookies that also would match for `bar.example.com`, making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.", "https://github.com/ARPSyndicate/cvemon https://github.com/holmes-py/reports-summary", "http://seclists.org/fulldisclosure/2022/Oct/41"], ["2022", "CVE-2022-26917", "Windows Fax Compose Form Remote Code Execution Vulnerability", "https://github.com/VulnerabilityResearchCentre/patch-diffing-in-the-dark", "No PoCs from references."], ["2022", "CVE-2022-47661", "GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2358"], ["2022", "CVE-2022-34709", "Windows Defender Credential Guard Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html"], ["2022", "CVE-2022-4777", "The Bootstrap Shortcodes WordPress plugin through 3.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e"], ["2022", "CVE-2022-27438", "Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/gerr-re/cve-2022-27438 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://gerr.re/posts/cve-2022-27438/"], ["2022", "CVE-2022-24952", "Several denial of service vulnerabilities exist in Eternal Terminal prior to version 6.2.0, including a DoS triggered remotely by an invalid sequence number and a local bug triggered by invalid input sent directly to the IPC socket.", "No PoCs found on GitHub currently.", "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw"], ["2022", "CVE-2022-30240", "An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift JDBC Driver 1.2.40 through 1.2.55 may allow a local user to execute code. NOTE: this is different from CVE-2022-29972.", "No PoCs found on GitHub currently.", "https://www.magnitude.com/products/data-connectivity"], ["2022", "CVE-2022-21134", "A firmware update vulnerability exists in the "update" firmware checks functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to firmware update. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1447"], ["2022", "CVE-2022-26857", "Dell OpenManage Enterprise Versions 3.8.3 and prior contain an improper authorization vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass blocked functionalities and perform unauthorized actions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-35525", "WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.", "No PoCs found on GitHub currently.", "https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi"], ["2022", "CVE-2022-45927", "An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Java application server can be used to bypass the authentication of the QDS endpoints of the Content Server. These endpoints can be used to create objects and execute arbitrary code.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2023/Jan/13 https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/"], ["2022", "CVE-2022-1152", "The Menubar WordPress plugin before 5.8 does not sanitise and escape the command parameter before outputting it back in the response via the menubar AJAX action (available to any authenticated users), leading to a Reflected Cross-Site Scripting", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3"], ["2022", "CVE-2022-3350", "The Contact Bank WordPress plugin through 3.0.30 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9"], ["2022", "CVE-2022-1255", "The Import and export users and customers WordPress plugin before 1.19.2.1 does not sanitise and escaped imported CSV data, which could allow high privilege users to import malicious javascript code and lead to Stored Cross-Site Scripting issues", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82"], ["2022", "CVE-2022-42343", "Adobe Campaign version 7.3.1 (and earlier) and 8.3.9 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A low-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/FelixMartel/FelixMartel", "No PoCs from references."], ["2022", "CVE-2022-45523", "Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/L7Im.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md"], ["2022", "CVE-2022-28541", "Uncontrolled search path element vulnerability in Samsung Update prior to version 3.0.77.0 allows attackers to execute arbitrary code as Samsung Update permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/DNSLab-Advisories/Security-Issue https://github.com/dlehgus1023/dlehgus1023 https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0139", "Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0"], ["2022", "CVE-2022-21233", "Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.", "https://github.com/ARPSyndicate/cvemon https://github.com/codexlynx/hardware-attacks-state-of-the-art", "No PoCs from references."], ["2022", "CVE-2022-37824", "Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGusetBasic.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5"], ["2022", "CVE-2022-48658", "In the Linux kernel, the following vulnerability has been resolved:mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.Commit 5a836bf6b09f (\"mm: slub: move flush_cpu_slab() invocations__free_slab() invocations out of IRQ context\") moved all flush_cpu_slab()invocations to the global workqueue to avoid a problem relatedwith deactivate_slab()/__free_slab() being called from an IRQ contexton PREEMPT_RT kernels.When the flush_all_cpu_locked() function is called from a task contextit may happen that a workqueue with WQ_MEM_RECLAIM bit set ends upflushing the global workqueue, this will cause a dependency issue. workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core] is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637 check_flush_dependency+0x10a/0x120 Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core] RIP: 0010:check_flush_dependency+0x10a/0x120[ 453.262125] Call Trace: __flush_work.isra.0+0xbf/0x220 ? __queue_work+0x1dc/0x420 flush_all_cpus_locked+0xfb/0x120 __kmem_cache_shutdown+0x2b/0x320 kmem_cache_destroy+0x49/0x100 bioset_exit+0x143/0x190 blk_release_queue+0xb9/0x100 kobject_cleanup+0x37/0x130 nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc] nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]Fix this bug by creating a workqueue for the flush operation withthe WQ_MEM_RECLAIM bit set.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-4470", "The Widgets for Google Reviews WordPress plugin before 9.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7"], ["2022", "CVE-2022-0079", "showdoc is vulnerable to Generation of Error Message Containing Sensitive Information", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee"], ["2022", "CVE-2022-37964", "Windows Kernel Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21373", "Vulnerability in the Oracle Partner Management product of Oracle E-Business Suite (component: Reseller Locator). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Partner Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Partner Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Partner Management accessible data as well as unauthorized read access to a subset of Oracle Partner Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26981", "Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationTable.c (called, indirectly, by tools/lou_checktable.c).", "No PoCs found on GitHub currently.", "https://github.com/liblouis/liblouis/issues/1171"], ["2022", "CVE-2022-40306", "The login form /Login in ECi Printanista Hub (formerly FMAudit Printscout) through 2022-06-27 performs expensive RSA key-generation operations, which allows attackers to cause a denial of service (DoS) by requesting that form repeatedly.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt"], ["2022", "CVE-2022-28893", "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a"], ["2022", "CVE-2022-38788", "An issue was discovered in Nokia FastMile 5G Receiver 5G14-B 1.2104.00.0281. Bluetooth on the Nokia ODU uses outdated pairing mechanisms, allowing an attacker to passively intercept a paring handshake and (after offline cracking) retrieve the PIN and LTK (long-term key).", "https://github.com/ARPSyndicate/cvemon https://github.com/ProxyStaffy/Nokia-FastMile-5G-Receiver-5G14-B", "No PoCs from references."], ["2022", "CVE-2022-1084", "A vulnerability classified as critical was found in SourceCodester One Church Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /one_church/userregister.php. The manipulation leads to authentication bypass. The attack can be launched remotely.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.195643"], ["2022", "CVE-2022-40186", "An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3301", "Improper Cleanup on Thrown Exception in GitHub repository ikus060/rdiffweb prior to 2.4.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a"], ["2022", "CVE-2022-1195", "A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e"], ["2022", "CVE-2022-1204", "A use-after-free flaw was found in the Linux kernel\u2019s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-48598", "A SQL injection vulnerability exists in the \u201creporter events type date\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48598/"], ["2022", "CVE-2022-23367", "Fulusso v1.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in /BindAccount/SuccessTips.js. This vulnerability allows attackers to inject malicious code into a victim user's device via open redirection.", "No PoCs found on GitHub currently.", "https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1"], ["2022", "CVE-2022-24995", "Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the time parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7"], ["2022", "CVE-2022-32013", "Complete Online Job Search System v1.0 is vulnerable to SQL Injection via eris/admin/category/index.php?view=edit&id=.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/heavenswill/CVE-2022-32013 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-28681", "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deletePages method. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16825.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-0168", "A denial of service (DOS) issue was found in the Linux kernel\u2019s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d6f5e358452479fa8a773b5c6ccc9e4ec5a20880"], ["2022", "CVE-2022-21262", "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "https://github.com/ARPSyndicate/cvemon https://github.com/r00t4dm/r00t4dm", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-23227", "NUUO NVRmini2 through 3.11 allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users because of the lack of handle_import_user.php authentication. When combined with another flaw (CVE-2011-5325), it is possible to overwrite arbitrary files under the web root and achieve code execution as root.", "No PoCs found on GitHub currently.", "https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd https://github.com/rapid7/metasploit-framework/pull/16044 https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device"], ["2022", "CVE-2022-0028", "A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.", "https://github.com/ARPSyndicate/cvemon https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/karimhabush/cyberowl https://github.com/murchie85/twitterCyberMonitor", "No PoCs from references."], ["2022", "CVE-2022-21322", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-3241", "The Build App Online WordPress plugin before 1.0.19 does not properly sanitise and escape some parameters before using them in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection", "https://github.com/ARPSyndicate/cvemon https://github.com/dipa96/my-days-and-not https://github.com/mrnfrancesco/GreedyForSQLi", "https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c"], ["2022", "CVE-2022-1344", "Stored XSS due to no sanitization in the filename in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/35f66966-af13-4f07-9734-0c50fdfc3a8c"], ["2022", "CVE-2022-40357", "A security issue was discovered in Z-BlogPHP <= 1.7.2. A Server-Side Request Forgery (SSRF) vulnerability in the zb_users/plugin/UEditor/php/action_crawler.php file allows remote attackers to force the application to make arbitrary requests via injection of arbitrary URLs into the source parameter.", "No PoCs found on GitHub currently.", "https://github.com/zblogcn/zblogphp/issues/336"], ["2022", "CVE-2022-42252", "If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.", "https://github.com/ARPSyndicate/cvemon https://github.com/fernandoreb/dependency-check-springboot https://github.com/sr-monika/sprint-rest https://github.com/tanjiti/sec_profile", "No PoCs from references."], ["2022", "CVE-2022-28672", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/fastmo/CVE-2022-28672 https://github.com/hacksysteam/CVE-2022-28672 https://github.com/k0mi-tg/CVE-POC https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/seleniumpdf/pdf-exploit https://github.com/tronghieu220403/Common-Vulnerabilities-and-Exposures-Reports https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-23005", "Western Digital has identified a weakness in the UFS standard that could result in a security vulnerability. This vulnerability may exist in some systems where the Host boot ROM code implements the UFS Boot feature to boot from UFS compliant storage devices. The UFS Boot feature, as specified in the UFS standard, is provided by UFS devices to support platforms that need to download the system boot loader from external non-volatile storage locations. Several scenarios have been identified in which adversaries may disable the boot capability, or revert to an old boot loader code, if the host boot ROM code is improperly implemented. UFS Host Boot ROM implementers may be impacted by this vulnerability. UFS devices are only impacted when connected to a vulnerable UFS Host and are not independently impacted by this vulnerability. When present, the vulnerability is in the UFS Host implementation and is not a vulnerability in Western Digital UFS Devices. Western Digital has provided details of the vulnerability to the JEDEC standards body, multiple vendors of host processors, and software solutions providers.", "No PoCs found on GitHub currently.", "https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature"], ["2022", "CVE-2022-30274", "The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcoded key. Similarly, the ACE1000 RTU can route MDLC traffic over Extended Command and Management Protocol (XCMP) and Network Layer (XNL) networks via the MDLC driver. Authentication to the XNL port is protected by TEA in ECB mode using a hardcoded key.", "No PoCs found on GitHub currently.", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-21291", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47715", "In Last Yard 22.09.8-1, the cookie can be stolen via via unencrypted traffic.", "https://github.com/l00neyhacker/CVE-2022-47715", "No PoCs from references."], ["2022", "CVE-2022-41188", "Due to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1166", "The JobMonster Theme was vulnerable to Directory Listing in the /wp-content/uploads/jobmonster/ folder, as it did not include a default PHP file, or .htaccess file. This could expose personal data such as people's resumes. Although Directory Listing can be prevented by securely configuring the web server, vendors can also take measures to make it less likely to happen.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189"], ["2022", "CVE-2022-42070", "Online Birth Certificate Management System version 1.0 is vulnerable to Cross Site Request Forgery (CSRF).", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html"], ["2022", "CVE-2022-28971", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function fromSetIpMacBind. This vulnerability allows attackers to cause a Denial of Service (DoS).", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md"], ["2022", "CVE-2022-24725", "Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, \"\\\\~\")`.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42130", "The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17447"], ["2022", "CVE-2022-4840", "Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01"], ["2022", "CVE-2022-3123", "Cross-site Scripting (XSS) - Reflected in GitHub repository splitbrain/dokuwiki prior to 2022-07-31a.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d72a979b-57db-4201-9500-66b49a5c1345"], ["2022", "CVE-2022-46539", "Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the security_5g parameter at /goform/WifiBasicSet.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md"], ["2022", "CVE-2022-1026", "Kyocera multifunction printers running vulnerable versions of Net View unintentionally expose sensitive user information, including usernames and passwords, through an insufficiently protected address book export function.", "https://github.com/ARPSyndicate/cvemon https://github.com/ac3lives/kyocera-cve-2022-1026 https://github.com/flamebarke/nmap-printer-nse-scripts https://github.com/nomi-sec/PoC-in-GitHub https://github.com/zanezhub/CVE-2022-1015-1016", "https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/"], ["2022", "CVE-2022-36638", "An access control issue in the component print.php of Garage Management System v1.0 allows unauthenticated attackers to access data for all existing orders.", "No PoCs found on GitHub currently.", "https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/"], ["2022", "CVE-2022-25449", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the deviceId parameter in the saveParentControlInfo function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/5"], ["2022", "CVE-2022-38829", "Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setMacFilterCfg.", "https://github.com/ARPSyndicate/cvemon https://github.com/whiter6666/CVE", "https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md"], ["2022", "CVE-2022-28732", "A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.", "https://github.com/muneebaashiq/MBProjects", "No PoCs from references."], ["2022", "CVE-2022-24826", "On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repository contains files named `..exe` and `cygpath.exe`, and `cygpath.exe` is not found in `PATH`, the `..exe` program will be executed when certain Git LFS commands are run. More generally, if the current working directory contains any file with a base name of `.` and a file extension from `PATHEXT` (except `.bat` and `.cmd`), and also contains another file with the same base name as a program Git LFS intends to execute (such as `git`, `cygpath`, or `uname`) and any file extension from `PATHEXT` (including `.bat` and `.cmd`), then, on Windows, when Git LFS attempts to execute the intended program the `..exe`, `..com`, etc., file will be executed instead, but only if the intended program is not found in any directory listed in `PATH`. The vulnerability occurs because when Git LFS detects that the program it intends to run does not exist in any directory listed in `PATH` then Git LFS passes an empty string as the executable file path to the Go `os/exec` package, which contains a bug such that, on Windows, it prepends the name of the current working directory (i.e., `.`) to the empty string without adding a path separator, and as a result searches in that directory for a file with the base name `.` combined with any file extension from `PATHEXT`, executing the first one it finds. (The reason `..bat` and `..cmd` files are not executed in the same manner is that, although the Go `os/exec` package tries to execute them just as it does a `..exe` file, the Microsoft Win32 API `CreateProcess()` family of functions have an undocumented feature in that they apparently recognize when a caller is attempting to execute a batch script file and instead run the `cmd.exe` command interpreter, passing the full set of command line arguments as parameters. These are unchanged from the command line arguments set by Git LFS, and as such, the intended program's name is the first, resulting in a command line like `cmd.exe /c git`, which then fails.) Git LFS has resolved this vulnerability by always reporting an error when a program is not found in any directory listed in `PATH` rather than passing an empty string to the Go `os/exec` package in this case. The bug in the Go `os/exec` package has been reported to the Go project and is expected to be patched after this security advisory is published. The problem was introduced in version 2.12.1 and is patched in version 3.1.3. Users of affected versions should upgrade to version 3.1.3. There are currently no known workarounds at this time.", "https://github.com/9069332997/session-1-full-stack", "No PoCs from references."], ["2022", "CVE-2022-26923", "Active Directory Domain Services Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/AleHelp/Windows-Pentesting-cheatsheet https://github.com/Gh-Badr/CVE-2022-26923 https://github.com/GibzB/THM-Captured-Rooms https://github.com/HackingCost/AD_Pentest https://github.com/HadessCS/Awesome-Privilege-Escalation https://github.com/JDArmy/GetDomainAdmin https://github.com/Jean-Francois-C/Windows-Penetration-Testing https://github.com/LudovicPatho/CVE-2022-26923_AD-Certificate-Services https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/RayRRT/Active-Directory-Certificate-Services-abuse https://github.com/ReAbout/web-sec https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/aniqfakhrul/certifried.py https://github.com/arth0sz/Practice-AD-CS-Domain-Escalation https://github.com/atong28/ridgepoc https://github.com/crac-learning/CVE-analysis-reports https://github.com/evilashz/PIGADVulnScanner https://github.com/filipposfwt/Pentest-Handbook https://github.com/goddemondemongod/Sec-Interview https://github.com/hangchuanin/Intranet_penetration_history https://github.com/iamramahibrah/AD-Attacks-and-Defend https://github.com/k0mi-tg/CVE-POC https://github.com/kas0n/RedTeam-Articles https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest https://github.com/lsecqt/CVE-2022-26923-Powershell-POC https://github.com/ly4k/Certipy https://github.com/makoto56/penetration-suite-toolkit https://github.com/manas3c/CVE-POC https://github.com/murchie85/twitterCyberMonitor https://github.com/nomi-sec/PoC-in-GitHub https://github.com/orgTestCodacy11KRepos110MB/repo-3423-Pentest_Note https://github.com/outflanknl/C2-Tool-Collection https://github.com/pwnlog/PAD https://github.com/pwnlog/PuroAD https://github.com/pwnlog/PurpAD https://github.com/r1skkam/TryHackMe-CVE-2022-26923 https://github.com/rasmus-leseberg/security-labs https://github.com/select-ldl/word_select https://github.com/suzi007/RedTeam_Note https://github.com/svbjdbk123/ReadTeam https://github.com/trhacknon/Pocingit https://github.com/txuswashere/Cybersecurity-Handbooks https://github.com/voker2311/Infra-Security-101 https://github.com/vvmdx/Sec-Interview-4-2023 https://github.com/whoforget/CVE-POC https://github.com/xiaoy-sec/Pentest_Note https://github.com/ycdxsb/WindowsPrivilegeEscalation https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-30334", "Brave before 1.34, when a Private Window with Tor Connectivity is used, leaks .onion URLs in Referer and Origin headers. NOTE: although this was fixed by Brave, the Brave documentation still advises \"Note that Private Windows with Tor Connectivity in Brave are just regular private windows that use Tor as a proxy. Brave does NOT implement most of the privacy protections from Tor Browser.\"", "https://github.com/KirtiRamchandani/KirtiRamchandani", "No PoCs from references."], ["2022", "CVE-2022-47655", "Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_qpel_fallback", "No PoCs found on GitHub currently.", "https://github.com/strukturag/libde265/issues/367"], ["2022", "CVE-2022-25558", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetProvince. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ProvinceCode parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13"], ["2022", "CVE-2022-4652", "The Video Background WordPress plugin before 2.7.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc"], ["2022", "CVE-2022-45641", "Tenda AC6V1.0 V15.03.05.19 is vulnerable to Buffer Overflow via formSetMacFilterCfg.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md"], ["2022", "CVE-2022-26731", "A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious website may be able to track users in Safari private browsing mode.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-35540", "Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.", "No PoCs found on GitHub currently.", "https://github.com/dotnetcore/AgileConfig/issues/91"], ["2022", "CVE-2022-45942", "A Remote Code Execution (RCE) vulnerability was found in includes/baijiacms/common.inc.php in baijiacms v4.", "No PoCs found on GitHub currently.", "https://github.com/This-is-Y/baijiacms-RCE https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/"], ["2022", "CVE-2022-31149", "ActivityWatch open-source automated time tracker. Versions prior to 0.12.0b2 are vulnerable to DNS rebinding attacks. This vulnerability impacts everyone running ActivityWatch and gives the attacker full access to the ActivityWatch REST API. Users should upgrade to v0.12.0b2 or later to receive a patch. As a workaround, block DNS lookups that resolve to 127.0.0.1.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-46428", "TP-Link TL-WR1043ND V1 3.13.15 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.", "No PoCs found on GitHub currently.", "https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1hP34Hvj"], ["2022", "CVE-2022-1137", "Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-3172", "A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as forwarding the client's API server credentials to third parties.", "https://github.com/UgOrange/CVE-2022-3172 https://github.com/noirfate/k8s_debug", "No PoCs from references."], ["2022", "CVE-2022-4811", "Authorization Bypass Through User-Controlled Key vulnerability in usememos usememos/memos.This issue affects usememos/memos before 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c"], ["2022", "CVE-2022-31398", "A cross-site scripting (XSS) vulnerability in /staff/tools/custom-fields of Helpdeskz v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email name field.", "No PoCs found on GitHub currently.", "https://youtu.be/OungdOub18c"], ["2022", "CVE-2022-1077", "A vulnerability was found in TEM FLEX-1080 and FLEX-1085 1.6.0. It has been declared as problematic. This vulnerability log.cgi of the component Log Handler. A direct request leads to information disclosure of hardware information. The attack can be initiated remotely and does not require any form of authentication.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrEmpy/CVE-2022-1077 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://vuldb.com/?id.194848"], ["2022", "CVE-2022-46568", "D-Link DIR-882 DIR882A1_FW130B06, DIR-878 DIR_878_FW1.30B08 was discovered to contain a stack overflow via the AccountPassword parameter in the SetSysEmailSettings module.", "No PoCs found on GitHub currently.", "https://hackmd.io/@0dayResearch/B1SZP0aIo https://hackmd.io/@0dayResearch/SetSysEmailSettings https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-42161", "D-Link COVR 1200,1202,1203 v1.08 was discovered to contain a command injection vulnerability via the /SetTriggerWPS/PIN parameter at function SetTriggerWPS.", "No PoCs found on GitHub currently.", "https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-39417", "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-45701", "Arris TG2482A firmware through 9.1.103GEM9 allow Remote Code Execution (RCE) via the ping utility feature.", "https://github.com/nomi-sec/PoC-in-GitHub https://github.com/yerodin/CVE-2022-45701", "https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701"], ["2022", "CVE-2022-23114", "Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21380", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-47604", "Missing Authorization vulnerability in junkcoder, ristoniinemets AJAX Thumbnail Rebuild.This issue affects AJAX Thumbnail Rebuild: from n/a through 1.13.", "https://github.com/NaInSec/CVE-LIST", "No PoCs from references."], ["2022", "CVE-2022-41099", "BitLocker Security Feature Bypass Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/MHimken/WinRE-Customization https://github.com/Wack0/bitlocker-attacks https://github.com/dsn1321/KB5025175-CVE-2022-41099 https://github.com/fscorrupt/awesome-stars https://github.com/g-gill24/WinRE-Patch https://github.com/halsey51013/UpdateWindowsRE-CVE-2022-41099 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/o0MattE0o/CVE-2022-41099-Fix https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-36669", "Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html"], ["2022", "CVE-2022-25418", "Tenda AC9 V15.03.2.21_cn was discovered to contain a stack overflow via the function openSchedWifi.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2"], ["2022", "CVE-2022-4483", "The Insert Pages WordPress plugin before 3.7.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179"], ["2022", "CVE-2022-0684", "The WP Home Page Menu WordPress plugin before 3.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec"], ["2022", "CVE-2022-0515", "Cross-Site Request Forgery (CSRF) in GitHub repository crater-invoice/crater prior to 6.0.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "https://huntr.dev/bounties/efb93f1f-1896-4a4c-a059-9ecadac1c4de"], ["2022", "CVE-2022-40969", "An os command injection vulnerability exists in the httpd delfile.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607"], ["2022", "CVE-2022-2410", "The mTouch Quiz WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18"], ["2022", "CVE-2022-39188", "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", "https://github.com/ARPSyndicate/cvemon", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19"], ["2022", "CVE-2022-25187", "Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.", "https://github.com/eslerm/nvd-api-client", "No PoCs from references."], ["2022", "CVE-2022-25216", "An absolute path traversal vulnerability allows a remote attacker to download any file on the Windows file system for which the user account running DVDFab 12 Player (recently renamed PlayerFab) has read-access, by means of an HTTP GET request to :32080/download/.\">http://:32080/download/.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://www.tenable.com/security/research/tra-2022-07"], ["2022", "CVE-2022-43403", "A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.", "No PoCs found on GitHub currently.", "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/"], ["2022", "CVE-2022-41697", "A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625"], ["2022", "CVE-2022-36067", "vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.", "https://github.com/0x1nsomnia/CVE-2022-36067-vm2-POC-webapp https://github.com/ARPSyndicate/cvemon https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067 https://github.com/fardeen-ahmed/Bug-bounty-Writeups https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/patriksimek/vm2/issues/467 https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067"], ["2022", "CVE-2022-27313", "An arbitrary file deletion vulnerability in Gitea v1.16.3 allows attackers to cause a Denial of Service (DoS) via deleting the configuration file.", "https://github.com/ARPSyndicate/cvemon https://github.com/cokeBeer/go-cves", "No PoCs from references."], ["2022", "CVE-2022-31596", "Under certain conditions, an attacker authenticated as a CMS administrator and with high privileges access to the Network in SAP BusinessObjects Business Intelligence Platform (Monitoring DB) - version 430, can access BOE Monitoring database to retrieve and modify (non-personal) system data which would otherwise be restricted. Also, a potential attack could be used to leave the CMS's scope and impact the database. A successful attack could have a low impact on confidentiality, a high impact on integrity, and a low impact on availability.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-46366", "** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.", "https://github.com/Live-Hack-CVE/CVE-2022-46366 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/wh-gov/CVE-2022-46366 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-1679", "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "https://github.com/ARPSyndicate/cvemon https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-0987", "A flaw was found in PackageKit in the way some of the methods exposed by the Transaction interface examines files. This issue allows a local user to measure the time the methods take to execute and know whether a file owned by root or other users exists.", "https://github.com/ARPSyndicate/cvemon https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io", "No PoCs from references."], ["2022", "CVE-2022-23959", "In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-20433", "There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221901", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-22536", "SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.", "https://github.com/A-Duskin/dockerTesting https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/antx-code/CVE-2022-22536 https://github.com/asurti6783/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536 https://github.com/hktalent/TOP https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/na245/reu-2023-flask https://github.com/nomi-sec/PoC-in-GitHub https://github.com/pondoksiber/SAP-Pentest-Cheatsheet https://github.com/soosmile/POC https://github.com/tes5hacks/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536 https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-48334", "Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_verify_keys total_len+file_name_len integer overflow and resultant buffer overflow.", "No PoCs found on GitHub currently.", "https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/"], ["2022", "CVE-2022-25356", "Alt-N MDaemon Security Gateway through 8.5.0 allows SecurityGateway.dll?view=login XML Injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "https://www.swascan.com/security-advisory-alt-n-security-gateway/"], ["2022", "CVE-2022-34022", "SQL injection vulnerability in ResIOT IOT Platform + LoRaWAN Network Server through 4.1.1000114 via a crafted POST request to /ResiotQueryDBActive.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34022.html"], ["2022", "CVE-2022-33941", "PowerCMS XMLRPC API provided by Alfasado Inc. contains a command injection vulnerability. Sending a specially crafted message by POST method to PowerCMS XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products/versions are as follows: PowerCMS 6.021 and earlier (PowerCMS 6 Series), PowerCMS 5.21 and earlier (PowerCMS 5 Series), and PowerCMS 4.51 and earlier (PowerCMS 4 Series). Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-41446", "An access control issue in /Admin/dashboard.php of Record Management System using CodeIgniter v1.0 allows attackers to access and modify user data.", "https://github.com/RashidKhanPathan/CVE-2022-41446 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://github.com/RashidKhanPathan/CVE-2022-41446 https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor"], ["2022", "CVE-2022-0455", "Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 98.0.4758.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2550", "OS Command Injection in GitHub repository hestiacp/hestiacp prior to 1.6.5.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/6ab4384d-bcbe-4d98-bf67-35c3535fc5c7"], ["2022", "CVE-2022-36036", "mdx-mermaid provides plug and play access to Mermaid in MDX. There is a potential for an arbitrary javascript injection in versions less than 1.3.0 and 2.0.0-rc1. Modify any mermaid code blocks with arbitrary code and it will execute when the component is loaded by MDXjs. This vulnerability was patched in version(s) 1.3.0 and 2.0.0-rc2. There are currently no known workarounds.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-39248", "matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. matrix-android-sdk2 would then additionally sign such a key backup with its device key, spilling trust over to other devices trusting the matrix-android-sdk2 device. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. matrix-android-sdk2 version 1.5.1 has been modified to only accept Olm-encrypted to-device messages and to stop signing backups on a successful decryption. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2441", "The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/51025"], ["2022", "CVE-2022-23848", "In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/cldrn/security-advisories", "No PoCs from references."], ["2022", "CVE-2022-31656", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AdamCrosser/awesome-vuln-writeups https://github.com/Marcuccio/kevin https://github.com/Schira4396/VcenterKiller https://github.com/UNC1739/awesome-vulnerability-research", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-46337", "A cleverly devised username might bypass LDAP authentication checks. In LDAP-authenticated Derby installations, this could let an attacker fill up the disk by creating junk Derby databases. In LDAP-authenticated Derby installations, this could also allow the attacker to execute malware which was visible to and executable by the account which booted the Derby server. In LDAP-protected databases which weren't also protected by SQL GRANT/REVOKE authorization, this vulnerability could also let an attacker view and corrupt sensitive data and run sensitive database functions and procedures.Mitigation:Users should upgrade to Java 21 and Derby 10.17.1.0.Alternatively, users who wish to remain on older Java versions should build their own Derby distribution from one of the release families to which the fix was backported: 10.16, 10.15, and 10.14. Those are the releases which correspond, respectively, with Java LTS versions 17, 11, and 8.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-38124", "Debug tool in Secomea SiteManager allows logged-in administrator to modify system state in an unintended manner.", "No PoCs found on GitHub currently.", "https://www.secomea.com/support/cybersecurity-advisory/"], ["2022", "CVE-2022-1768", "The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2.
Please note that this is separate from CVE-2022-1453 & CVE-2022-1505.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc"], ["2022", "CVE-2022-29081", "Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring.", "No PoCs found on GitHub currently.", "https://www.tenable.com/security/research/tra-2022-14"], ["2022", "CVE-2022-43980", "There is a stored cross-site scripting vulnerability in Pandora FMS v765 in the network maps editing functionality. An attacker could modify a network map, including on purpose the name of an XSS payload. Once created, if a user with admin privileges clicks on the edited network maps, the XSS payload will be executed. The exploitation of this vulnerability could allow an atacker to steal the value of the admin user\u00b4s cookie.", "https://github.com/ARPSyndicate/cvemon https://github.com/Argonx21/CVE-2022-43980 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-0896", "Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0"], ["2022", "CVE-2022-0404", "The Material Design for Contact Form 7 WordPress plugin through 2.6.4 does not check authorization or that the option mentioned in the notice param belongs to the plugin when processing requests to the cf7md_dismiss_notice action, allowing any logged in user (with roles as low as Subscriber) to set arbitrary options to true, potentially leading to Denial of Service by breaking the site.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285"], ["2022", "CVE-2022-40878", "In Exam Reviewer Management System 1.0, an authenticated attacker can upload a web-shell php file in profile page to achieve Remote Code Execution (RCE).", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50726"], ["2022", "CVE-2022-39099", "In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-2690", "A vulnerability classified as problematic was found in SourceCodester Wedding Hall Booking System. Affected by this vulnerability is an unknown functionality of the file /whbs/?page=my_bookings of the component Booking Form. The manipulation of the argument Remarks leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205813 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205813"], ["2022", "CVE-2022-25096", "Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /members/view_member.php.", "https://github.com/2lambda123/CVE-mitre https://github.com/2lambda123/Windows10Exploits https://github.com/ARPSyndicate/cvemon https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame https://github.com/nu11secur1ty/CVE-mitre https://github.com/nu11secur1ty/CVE-nu11secur1ty https://github.com/nu11secur1ty/Windows10Exploits", "https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management https://www.exploit-db.com/exploits/50732"], ["2022", "CVE-2022-25307", "The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the platform parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5.", "No PoCs found on GitHub currently.", "https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb"], ["2022", "CVE-2022-33910", "An XSS vulnerability in MantisBT before 2.25.5 allows remote attackers to attach crafted SVG documents to issue reports or bugnotes. When a user or an admin clicks on the attachment, file_download.php opens the SVG document in a browser tab instead of downloading it as a file, causing the JavaScript code to execute.", "https://github.com/Sharpforce/cybersecurity", "https://mantisbt.org/bugs/view.php?id=29135 https://mantisbt.org/bugs/view.php?id=30384"], ["2022", "CVE-2022-43512", "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-27193", "CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.", "https://github.com/ARPSyndicate/cvemon https://github.com/csaf-tools/CVRF-CSAF-Converter", "https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2"], ["2022", "CVE-2022-31534", "The echoleegroup/PythonWeb repository through 2018-10-31 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-2820", "Session Fixation in GitHub repository namelessmc/nameless prior to v2.0.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/df06b7d7-6077-43a5-bd81-3cc66f0d4d19"], ["2022", "CVE-2022-24249", "A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.", "No PoCs found on GitHub currently.", "https://github.com/gpac/gpac/issues/2081"], ["2022", "CVE-2022-0626", "The Advanced Admin Search WordPress plugin before 1.1.6 does not sanitize and escape some parameters before outputting them back in an admin page, leading to a Reflected Cross-Site Scripting.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47"], ["2022", "CVE-2022-23429", "An improper boundary check in audio hal service prior to SMR Feb-2022 Release 1 allows attackers to read invalid memory and it leads to application crash.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2"], ["2022", "CVE-2022-2723", "A vulnerability was found in SourceCodester Employee Management System. It has been classified as critical. Affected is an unknown function of the file /process/eprocess.php. The manipulation of the argument mailuid/pwd leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205836.", "No PoCs found on GitHub currently.", "https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/"], ["2022", "CVE-2022-36354", "A heap out-of-bounds read vulnerability exists in the RLA format parser of OpenImageIO master-branch-9aeece7a and v2.3.19.0. More specifically, in the way run-length encoded byte spans are handled. A malformed RLA file can lead to an out-of-bounds read of heap metadata which can result in sensitive information leak. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629"], ["2022", "CVE-2022-20803", "A vulnerability in the OLE2 file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.The vulnerability is due to incorrect use of the realloc function that may result in a double-free. An attacker could exploit this vulnerability by submitting a crafted OLE2 file to be scanned by ClamAV on the affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-1898", "Use After Free in GitHub repository vim/vim prior to 8.2.", "No PoCs found on GitHub currently.", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea"], ["2022", "CVE-2022-0766", "Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/7f2a5bb4-e6c7-4b6a-b8eb-face9e3add7b"], ["2022", "CVE-2022-30489", "WAVLINK WN535 G3 was discovered to contain a cross-site scripting (XSS) vulnerability via the hostname parameter at /cgi-bin/login.cgi.", "https://github.com/20142995/Goby https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/HimmelAward/Goby_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/Z0fhack/Goby_POC https://github.com/badboycxcc/XSS-CVE-2022-30489 https://github.com/badboycxcc/badboycxcc https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/trhacknon/XSS-CVE-2022-30489 https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2663", "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", "https://github.com/ARPSyndicate/cvemon", "https://www.youtube.com/watch?v=WIq-YgQuYCA"], ["2022", "CVE-2022-0865", "Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.", "https://github.com/ARPSyndicate/cvemon https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/385"], ["2022", "CVE-2022-41876", "ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the \"passwordHash\" entry from \"src/bundle/Resources/config/graphql/User.types.yaml\" in the GraphQL package, and other properties like hash type, email, login if you prefer.", "https://github.com/Skileau/CVE-2022-41876 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-31474", "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in iThemes BackupBuddy allows Path Traversal.This issue affects BackupBuddy: from 8.5.8.0 through 8.7.4.1.", "https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/trhacknon/Pocingit", "No PoCs from references."], ["2022", "CVE-2022-20700", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-22594", "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-43973", "An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request to /apply.cgi to execute arbitrary commands on the underlying Linux operating system as root.", "No PoCs found on GitHub currently.", "https://youtu.be/73-1lhvJPNg https://youtu.be/RfWVYCUBNZ0 https://youtu.be/TeWAmZaKQ_w"], ["2022", "CVE-2022-44381", "Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request.", "No PoCs found on GitHub currently.", "https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/"], ["2022", "CVE-2022-38306", "LIEF commit 5d1d643 was discovered to contain a heap-buffer overflow in the component /core/CorePrPsInfo.tcc.", "No PoCs found on GitHub currently.", "https://github.com/lief-project/LIEF/issues/763"], ["2022", "CVE-2022-38097", "A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601"], ["2022", "CVE-2022-29072", "** DISPUTED ** 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. This is caused by misconfiguration of 7z.dll and a heap overflow. The command runs in a child process under the 7zFM.exe process. NOTE: multiple third parties have reported that no privilege escalation can occur.", "https://github.com/ARPSyndicate/cvemon https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/GhostTroops/TOP https://github.com/JERRY123S/all-poc https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Phantomiman/7-Zip.chm-Mitigation https://github.com/SYRTI/POC_to_review https://github.com/SnailDev/github-hot-hub https://github.com/WhooAmii/POC_to_review https://github.com/changtraixuqang97/changtraixuqang97 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/duytruongpham/duytruongpham https://github.com/goldenscale/GS_GithubMirror https://github.com/hktalent/TOP https://github.com/izj007/wechat https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/kagancapar/7-zip-malicious-code-vulnerability https://github.com/kagancapar/CVE-2022-29072 https://github.com/karimhabush/cyberowl https://github.com/kun-g/Scraping-Github-trending https://github.com/lions2012/Penetration_Testing_POC https://github.com/lonnyzhang423/github-hot-hub https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/notmariekondo/notmariekondo https://github.com/pipiscrew/timeline https://github.com/priamai/sigmatau https://github.com/rasan2001/CVE-2022-29072 https://github.com/sentinelblue/CVE-2022-29072 https://github.com/taielab/awesome-hacking-lists https://github.com/tiktb8/CVE-2022-29072 https://github.com/trhacknon/Pocingit https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve https://github.com/zoroqi/my-awesome", "http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html https://github.com/kagancapar/CVE-2022-29072 https://news.ycombinator.com/item?id=31070256 https://www.youtube.com/watch?v=sT1cvbu7ZTA"], ["2022", "CVE-2022-2871", "Cross-site Scripting (XSS) - Stored in GitHub repository notrinos/notrinoserp prior to 0.7.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/61126c07-22ac-4961-a198-1aa33060b373"], ["2022", "CVE-2022-24189", "The user_token authorization header on the Ourphoto App version 1.4.1 /apiv1/* end-points is not implemented properly. Removing the value causes all requests to succeed, bypassing authorization and session management. The impact of this vulnerability allows an attacker POST api calls with other users unique identifiers and enumerate information of all other end-users.", "No PoCs found on GitHub currently.", "https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html"], ["2022", "CVE-2022-37069", "H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateSnat.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12"], ["2022", "CVE-2022-46395", "An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Midgard r0p0 through r32p0, Bifrost r0p0 through r41p0 before r42p0, Valhall r19p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0.", "https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation https://github.com/Pro-me3us/CVE_2022_46395_Gazelle https://github.com/Pro-me3us/CVE_2022_46395_Raven https://github.com/austrisu/awesome-stuff https://github.com/xairy/linux-kernel-exploitation", "http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html"], ["2022", "CVE-2022-31565", "The yogson/syrabond repository through 2020-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-29163", "Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-44290", "webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in deleteapprovalstages.php.", "No PoCs found on GitHub currently.", "https://github.com/anhdq201/webtareas/issues/2"], ["2022", "CVE-2022-22817", "PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.", "https://github.com/ARPSyndicate/cvemon https://github.com/JawadPy/CVE-2022-22817 https://github.com/JawadPy/CVE-2022-22817-Exploit https://github.com/NaInSec/CVE-LIST https://github.com/SaintsConnor/Exploits https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-48116", "AyaCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the component /admin/tpl_edit.inc.php.", "https://github.com/RacerZ-fighting/RacerZ-fighting", "https://github.com/loadream/AyaCMS/issues/10"], ["2022", "CVE-2022-36094", "XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-23478", "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).xrdp < v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade.", "https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-2772", "A vulnerability was found in SourceCodester Apartment Visitor Management System and classified as critical. Affected by this issue is some unknown functionality of the file action-visitor.php. The manipulation of the argument editid/remark leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-206168.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206168"], ["2022", "CVE-2022-0737", "The Text Hover WordPress plugin before 4.2 does not sanitize and escape the text to hover, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc"], ["2022", "CVE-2022-22957", "VMware Workspace ONE Access, Identity Manager and vRealize Automation contain two remote code execution vulnerabilities (CVE-2022-22957 & CVE-2022-22958). A malicious actor with administrative access can trigger deserialization of untrusted data through malicious JDBC URI which may result in remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaanymz/2022-04-06-critical-vmware-fix https://github.com/sourceincite/hekate", "http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html"], ["2022", "CVE-2022-27131", "An arbitrary file upload vulnerability at /zbzedit/php/zbz.php in zbzcms v1.0 allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/wu610777031/My_CMSHunter", "No PoCs from references."], ["2022", "CVE-2022-22654", "A user interface issue was addressed. This issue is fixed in watchOS 8.5, Safari 15.4. Visiting a malicious website may lead to address bar spoofing.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38357", "Improper neutralization of special elements leaves the Eyes of Network Web application vulnerable to an iFrame injection attack, via the url parameter of /module/module_frame/index.php.", "https://github.com/karimhabush/cyberowl", "https://www.tenable.com/security/research/tra-2022-29"], ["2022", "CVE-2022-29023", "A buffer overflow vulnerability exists in the razermouse driver of OpenRazer up to version v3.3.0 allows attackers to cause a Denial of Service (DoS) and possibly escalate their privileges via a crafted buffer sent to the matrix_custom_frame device.", "No PoCs found on GitHub currently.", "https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities"], ["2022", "CVE-2022-24358", "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15703.", "No PoCs found on GitHub currently.", "https://www.foxit.com/support/security-bulletins.html"], ["2022", "CVE-2022-37129", "D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-21839", "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/Loginsoft-Research/Linux-Exploit-Detection https://github.com/k0mi-tg/CVE-POC https://github.com/lolin19/CVE-2022-21839- https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-20456", "In AutomaticZenRule of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703780", "https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-29324", "D-Link DIR-816 A2_v1.10CNB04 was discovered to contain a stack overflow via the proto parameter in /goform/form2IPQoSTcAdd.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/6 https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-25333", "The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) performs an RSA check implemented in mask ROM when loading a module through the SK_LOAD routine. However, only the module header authenticity is validated. An adversary can re-use any correctly signed header and append a forged payload, to be encrypted using the CEK (obtainable through CVE-2022-25332) in order to obtain arbitrary code execution in secure context. This constitutes a full break of the TEE security architecture.", "No PoCs found on GitHub currently.", "https://tetraburst.com/"], ["2022", "CVE-2022-34047", "An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Marcuccio/kevin", "http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html"], ["2022", "CVE-2022-41423", "Bento4 v1.6.0-639 was discovered to contain a segmentation violation in the mp4fragment component.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/767"], ["2022", "CVE-2022-36142", "SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Reader::getU30().", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/djcsdy/swfmill/issues/61"], ["2022", "CVE-2022-0430", "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f"], ["2022", "CVE-2022-2535", "The SearchWP Live Ajax Search WordPress plugin before 1.6.2 does not ensure that users making a live search are limited to published posts only, allowing unauthenticated users to make a crafted query disclosing private/draft/pending post titles along with their permalink", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02"], ["2022", "CVE-2022-0570", "Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1"], ["2022", "CVE-2022-28108", "Selenium Server (Grid) before 4 allows CSRF because it permits non-JSON content types such as application/x-www-form-urlencoded, multipart/form-data, and text/plain.", "No PoCs found on GitHub currently.", "https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/"], ["2022", "CVE-2022-34296", "In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/zalando/skipper/releases/tag/v0.13.218"], ["2022", "CVE-2022-4179", "Use after free in Audio in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31662", "VMware Workspace ONE Access, Identity Manager, Connectors and vRealize Automation contain a path traversal vulnerability. A malicious actor with network access may be able to access arbitrary files.", "No PoCs found on GitHub currently.", "https://www.vmware.com/security/advisories/VMSA-2022-0021.html"], ["2022", "CVE-2022-32899", "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/0x36/weightBufs https://github.com/ARPSyndicate/cvemon https://github.com/DRACULA-HACK/test https://github.com/houjingyi233/macOS-iOS-system-security", "No PoCs from references."], ["2022", "CVE-2022-21979", "Microsoft Exchange Server Information Disclosure Vulnerability", "https://github.com/FDlucifer/Proxy-Attackchain", "No PoCs from references."], ["2022", "CVE-2022-20796", "On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-44317", "PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StdioOutPutc function in cstdlib/stdio.c when called from ExpressionParseFunctionCall.", "https://github.com/ARPSyndicate/cvemon https://github.com/Halcy0nic/CVEs-for-picoc-3.2.2 https://github.com/Halcy0nic/Trophies https://github.com/skinnyrad/Trophies", "No PoCs from references."], ["2022", "CVE-2022-3599", "LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.", "https://github.com/ARPSyndicate/cvemon https://github.com/maxim12z/ECommerce https://github.com/peng-hui/CarpetFuzz https://github.com/waugustus/CarpetFuzz https://github.com/waugustus/waugustus", "https://gitlab.com/libtiff/libtiff/-/issues/398"], ["2022", "CVE-2022-3608", "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-alpha.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/8f0f3635-9d81-4c55-9826-2ba955c3a850"], ["2022", "CVE-2022-32988", "Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 via the \"*list\" parameters (e.g. filter_lwlist, keyword_rulelist, etc) in every \".asp\" page containing a list of stored strings. The following asp files are affected: (1) cgi-bin/APP_Installation.asp, (2) cgi-bin/Advanced_ACL_Content.asp, (3) cgi-bin/Advanced_ADSL_Content.asp, (4) cgi-bin/Advanced_ASUSDDNS_Content.asp, (5) cgi-bin/Advanced_AiDisk_ftp.asp, (6) cgi-bin/Advanced_AiDisk_samba.asp, (7) cgi-bin/Advanced_DSL_Content.asp, (8) cgi-bin/Advanced_Firewall_Content.asp, (9) cgi-bin/Advanced_FirmwareUpgrade_Content.asp, (10) cgi-bin/Advanced_GWStaticRoute_Content.asp, (11) cgi-bin/Advanced_IPTV_Content.asp, (12) cgi-bin/Advanced_IPv6_Content.asp, (13) cgi-bin/Advanced_KeywordFilter_Content.asp, (14) cgi-bin/Advanced_LAN_Content.asp, (15) cgi-bin/Advanced_Modem_Content.asp, (16) cgi-bin/Advanced_PortTrigger_Content.asp, (17) cgi-bin/Advanced_QOSUserPrio_Content.asp, (18) cgi-bin/Advanced_QOSUserRules_Content.asp, (19) cgi-bin/Advanced_SettingBackup_Content.asp, (20) cgi-bin/Advanced_System_Content.asp, (21) cgi-bin/Advanced_URLFilter_Content.asp, (22) cgi-bin/Advanced_VPN_PPTP.asp, (23) cgi-bin/Advanced_VirtualServer_Content.asp, (24) cgi-bin/Advanced_WANPort_Content.asp, (25) cgi-bin/Advanced_WAdvanced_Content.asp, (26) cgi-bin/Advanced_WMode_Content.asp, (27) cgi-bin/Advanced_WWPS_Content.asp, (28) cgi-bin/Advanced_Wireless_Content.asp, (29) cgi-bin/Bandwidth_Limiter.asp, (30) cgi-bin/Guest_network.asp, (31) cgi-bin/Main_AccessLog_Content.asp, (32) cgi-bin/Main_AdslStatus_Content.asp, (33) cgi-bin/Main_Spectrum_Content.asp, (34) cgi-bin/Main_WebHistory_Content.asp, (35) cgi-bin/ParentalControl.asp, (36) cgi-bin/QIS_wizard.asp, (37) cgi-bin/QoS_EZQoS.asp, (38) cgi-bin/aidisk.asp, (39) cgi-bin/aidisk/Aidisk-1.asp, (40) cgi-bin/aidisk/Aidisk-2.asp, (41) cgi-bin/aidisk/Aidisk-3.asp, (42) cgi-bin/aidisk/Aidisk-4.asp, (43) cgi-bin/blocking.asp, (44) cgi-bin/cloud_main.asp, (45) cgi-bin/cloud_router_sync.asp, (46) cgi-bin/cloud_settings.asp, (47) cgi-bin/cloud_sync.asp, (48) cgi-bin/device-map/DSL_dashboard.asp, (49) cgi-bin/device-map/clients.asp, (50) cgi-bin/device-map/disk.asp, (51) cgi-bin/device-map/internet.asp, (52) cgi-bin/error_page.asp, (53) cgi-bin/index.asp, (54) cgi-bin/index2.asp, (55) cgi-bin/qis/QIS_PTM_manual_setting.asp, (56) cgi-bin/qis/QIS_admin_pass.asp, (57) cgi-bin/qis/QIS_annex_setting.asp, (58) cgi-bin/qis/QIS_bridge_cfg_tmp.asp, (59) cgi-bin/qis/QIS_detect.asp, (60) cgi-bin/qis/QIS_finish.asp, (61) cgi-bin/qis/QIS_ipoa_cfg_tmp.asp, (62) cgi-bin/qis/QIS_manual_setting.asp, (63) cgi-bin/qis/QIS_mer_cfg.asp, (64) cgi-bin/qis/QIS_mer_cfg_tmp.asp, (65) cgi-bin/qis/QIS_ppp_cfg.asp, (66) cgi-bin/qis/QIS_ppp_cfg_tmp.asp, (67) cgi-bin/qis/QIS_wireless.asp, (68) cgi-bin/query_wan_status.asp, (69) cgi-bin/query_wan_status2.asp, and (70) cgi-bin/start_apply.asp.", "https://github.com/ARPSyndicate/cvemon https://github.com/FedericoHeichou/CVE-2022-32988 https://github.com/FedericoHeichou/DSL-N14U-XSS https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/FedericoHeichou/CVE-2022-32988 https://github.com/FedericoHeichou/DSL-N14U-XSS"], ["2022", "CVE-2022-0461", "Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-2564", "Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6.", "https://github.com/seal-community/patches", "https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd"], ["2022", "CVE-2022-28019", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\employee_edit.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-48091", "Tramyardg hotel-mgmt-system version 2022.4 is vulnerable to Cross Site Scripting (XSS) via process_update_profile.php.", "https://github.com/youyou-pm10/MyCVEs", "https://github.com/tramyardg/hotel-mgmt-system/issues/22"], ["2022", "CVE-2022-22990", "A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts.", "No PoCs found on GitHub currently.", "https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117"], ["2022", "CVE-2022-4068", "A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context of an admin's account.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/becfecc4-22a6-4f94-bf83-d6030b625fdc"], ["2022", "CVE-2022-41472", "74cmsSE v3.12.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /apiadmin/notice/add. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.", "https://github.com/anonymous364872/Rapier_Tool https://github.com/apif-review/APIF_tool_2024 https://github.com/youcans896768/APIV_Tool", "No PoCs from references."], ["2022", "CVE-2022-36113", "Cargo is a package manager for the rust programming language. After a package is downloaded, Cargo extracts its source code in the ~/.cargo folder on disk, making it available to the Rust projects it builds. To record when an extraction is successful, Cargo writes \"ok\" to the .cargo-ok file at the root of the extracted source code once it extracted all the files. It was discovered that Cargo allowed packages to contain a .cargo-ok symbolic link, which Cargo would extract. Then, when Cargo attempted to write \"ok\" into .cargo-ok, it would actually replace the first two bytes of the file the symlink pointed to with ok. This would allow an attacker to corrupt one file on the machine using Cargo to extract the package. Note that by design Cargo allows code execution at build time, due to build scripts and procedural macros. The vulnerabilities in this advisory allow performing a subset of the possible damage in a harder to track down way. Your dependencies must still be trusted if you want to be protected from attacks, as it's possible to perform the same attacks with build scripts and procedural macros. The vulnerability is present in all versions of Cargo. Rust 1.64, to be released on September 22nd, will include a fix for it. Since the vulnerability is just a more limited way to accomplish what a malicious build scripts or procedural macros can do, we decided not to publish Rust point releases backporting the security fix. Patch files are available for Rust 1.63.0 are available in the wg-security-response repository for people building their own toolchain.Mitigations We recommend users of alternate registries to exercise care in which package they download, by only including trusted dependencies in their projects. Please note that even with these vulnerabilities fixed, by design Cargo allows arbitrary code execution at build time thanks to build scripts and procedural macros: a malicious dependency will be able to cause damage regardless of these vulnerabilities. crates.io implemented server-side checks to reject these kinds of packages years ago, and there are no packages on crates.io exploiting these vulnerabilities. crates.io users still need to exercise care in choosing their dependencies though, as remote code execution is allowed by design there as well.", "https://github.com/ARPSyndicate/cvemon https://github.com/gene-git/Arch-mkpkg", "No PoCs from references."], ["2022", "CVE-2022-25222", "Money Transfer Management System Version 1.0 allows an unauthenticated user to inject SQL queries in 'admin/maintenance/manage_branch.php' and 'admin/maintenance/manage_fee.php' via the 'id' parameter.", "No PoCs found on GitHub currently.", "https://fluidattacks.com/advisories/berry/"], ["2022", "CVE-2022-0521", "Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca"], ["2022", "CVE-2022-2424", "The Google Maps Anywhere WordPress plugin through 1.2.6.3 does not sanitise and escape any of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909"], ["2022", "CVE-2022-22442", "\"IBM InfoSphere Information Server 11.7 could allow an authenticated user to access information restricted to users with elevated privileges due to improper access controls. IBM X-Force ID: 224427.\"", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22963", "In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.", "https://github.com/0x801453/SpringbootGuiExploit https://github.com/0xStrygwyr/OSCP-Guide https://github.com/0xZipp0/OSCP https://github.com/0xsyr0/OSCP https://github.com/13exp/SpringBoot-Scan-GUI https://github.com/189569400/Meppo https://github.com/20142995/Goby https://github.com/20142995/pocsuite3 https://github.com/20142995/sectool https://github.com/2lambda123/SBSCAN https://github.com/2lambda123/spring4shell-scan https://github.com/9xN/SpringCore-0day https://github.com/ADP-Dynatrace/dt-appsec-powerup https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AabyssZG/SpringBoot-Scan https://github.com/AayushmanThapaMagar/CVE-2022-22963 https://github.com/Anogota/Inject https://github.com/BearClaw96/CVE-2022-22963-Poc-Bearcules https://github.com/CLincat/vulcat https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/CognizantOneDevOps/Insights https://github.com/G01d3nW01f/CVE-2022-22963 https://github.com/GhostTroops/TOP https://github.com/GuayoyoCyber/CVE-2022-22965 https://github.com/HackJava/HackSpring https://github.com/HackJava/Spring https://github.com/HenriVlasic/Exploit-for-CVE-2022-22963 https://github.com/HimmelAward/Goby_POC https://github.com/J0ey17/CVE-2022-22963_Reverse-Shell-Exploit https://github.com/JERRY123S/all-poc https://github.com/Ki11i0n4ir3/CVE-2022-22963 https://github.com/Kirill89/CVE-2022-22963-PoC https://github.com/Ljw1114/SpringFramework-Vul https://github.com/Ly0nt4r/OSCP https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/Mustafa1986/CVE-2022-22963 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/Pear1y/Vuln-Env https://github.com/Pear1y/VulnEnv https://github.com/Qualys/spring4scanwin https://github.com/RanDengShiFu/CVE-2022-22963 https://github.com/SYRTI/POC_to_review https://github.com/SealPaPaPa/SpringCloudFunction-Research https://github.com/SirElmard/ethical_hacking https://github.com/SnailDev/github-hot-hub https://github.com/SourM1lk/CVE-2022-22963-Exploit https://github.com/Threekiii/Awesome-Exploit https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Awesome-Redteam https://github.com/Threekiii/Vulhub-Reproduce https://github.com/Trendyol/AppSec-Presentations https://github.com/W3BZT3R/Inject https://github.com/WhooAmii/POC_to_review https://github.com/Whoopsunix/PPPVULNS https://github.com/WingsSec/Meppo https://github.com/XuCcc/VulEnv https://github.com/Z0fhack/Goby_POC https://github.com/angui0O/Awesome-Redteam https://github.com/ax1sX/SpringSecurity https://github.com/axingde/Spring-Cloud-Function-Spel https://github.com/axingde/spring-cloud-function-spel https://github.com/bakery312/Vulhub-Reproduce https://github.com/chaosec2021/fscan-POC https://github.com/charis3306/CVE-2022-22963 https://github.com/charonlight/SpringExploitGUI https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/cyberkartik/CVE https://github.com/czz1233/fscan https://github.com/darryk10/CVE-2022-22963 https://github.com/dinosn/CVE-2022-22963 https://github.com/dotnes/spring4shell https://github.com/dr6817/CVE-2022-22963 https://github.com/dravenww/curated-article https://github.com/dtact/spring4shell-scanner https://github.com/e-hakson/OSCP https://github.com/edsonjt81/spring4shell-scan https://github.com/eljosep/OSCP-Guide https://github.com/encodedguy/oneliners https://github.com/exploitbin/CVE-2022-22963-Spring-Core-RCE https://github.com/fullhunt/spring4shell-scan https://github.com/gunzf0x/CVE-2022-22963 https://github.com/hktalent/TOP https://github.com/hktalent/spring-spel-0day-poc https://github.com/iliass-dahman/CVE-2022-22963-POC https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell https://github.com/jbmihoub/all-poc https://github.com/jojosec/SPeL-injection-study https://github.com/jorgectf/spring-cloud-function-spel https://github.com/jrbH4CK/CVE-2022-22963 https://github.com/jschauma/check-springshell https://github.com/justmumu/SpringShell https://github.com/k0mi-tg/CVE-POC https://github.com/k3rwin/spring-cloud-function-rce https://github.com/karimhabush/cyberowl https://github.com/kaydenlsr/Awesome-Redteam https://github.com/kgwanjala/oscp-cheatsheet https://github.com/kh4sh3i/Spring-CVE https://github.com/khulnasoft-lab/awesome-security https://github.com/khulnasoft-labs/awesome-security https://github.com/langu-xyz/JavaVulnMap https://github.com/lemmyz4n3771/CVE-2022-22963-PoC https://github.com/lions2012/Penetration_Testing_POC https://github.com/lonnyzhang423/github-hot-hub https://github.com/mamba-2021/fscan-POC https://github.com/manas3c/CVE-POC https://github.com/me2nuk/CVE-2022-22963 https://github.com/mebibite/springhound https://github.com/metaStor/SpringScan https://github.com/murchie85/twitterCyberMonitor https://github.com/nBp1Ng/FrameworkAndComponentVulnerabilities https://github.com/nBp1Ng/SpringFramework-Vul https://github.com/nikn0laty/RCE-in-Spring-Cloud-CVE-2022-22963 https://github.com/nitishbadole/oscp-note-3 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/onurgule/S4S-Scanner https://github.com/oscpname/OSCP_cheat https://github.com/puckiestyle/CVE-2022-22963 https://github.com/radiusmethod/awesome-gists https://github.com/randallbanner/Spring-Cloud-Function-Vulnerability-CVE-2022-22963-RCE https://github.com/revanmalang/OSCP https://github.com/savior-only/Spring_All_Reachable https://github.com/shengshengli/fscan-POC https://github.com/sinjap/spring4shell https://github.com/sspsec/Scan-Spring-GO https://github.com/stevemats/Spring0DayCoreExploit https://github.com/sule01u/SBSCAN https://github.com/superlink996/chunqiuyunjingbachang https://github.com/thenurhabib/s4sScanner https://github.com/thomasvincent/Spring4Shell-resources https://github.com/thomasvincent/spring-shell-resources https://github.com/thomasvincent/springshell https://github.com/tpt11fb/SpringVulScan https://github.com/trhacknon/CVE-2022-22963 https://github.com/trhacknon/Pocingit https://github.com/tweedge/springcore-0day-en https://github.com/twseptian/cve-2022-22963 https://github.com/txuswashere/OSCP https://github.com/wcoreiron/Sentinel_Analtic_Rules https://github.com/weeka10/-hktalent-TOP https://github.com/west-wind/Spring4Shell-Detection https://github.com/west-wind/Threat-Hunting-With-Splunk https://github.com/whoforget/CVE-POC https://github.com/x00tex/hackTheBox https://github.com/xhref/OSCP https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-36271", "Outbyte PC Repair Installation File 1.7.112.7856 is vulnerable to Dll Hijacking. iertutil.dll is missing so an attacker can use a malicious dll with same name and can get admin privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271"], ["2022", "CVE-2022-27294", "D-Link DIR-619 Ax v1.00 was discovered to contain a stack overflow in the function formWlanWizardSetup. This vulnerability allows attackers to cause a Denial of Service (DoS) via the webpage parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter", "https://www.dlink.com/en/security-bulletin/"], ["2022", "CVE-2022-20866", "A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This vulnerability is due to a logic error when the RSA key is stored in memory on a hardware platform that performs hardware-based cryptography. An attacker could exploit this vulnerability by using a Lenstra side-channel attack against the targeted device. A successful exploit could allow the attacker to retrieve the RSA private key. The following conditions may be observed on an affected device: This vulnerability will apply to approximately 5 percent of the RSA keys on a device that is running a vulnerable release of Cisco ASA Software or Cisco FTD Software; not all RSA keys are expected to be affected due to mathematical calculations applied to the RSA key. The RSA key could be valid but have specific characteristics that make it vulnerable to the potential leak of the RSA private key. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic. See the Indicators of Compromise section for more information on the detection of this type of RSA key. The RSA key could be malformed and invalid. A malformed RSA key is not functional, and a TLS client connection to a device that is running Cisco ASA Software or Cisco FTD Software that uses the malformed RSA key will result in a TLS signature failure, which means a vulnerable software release created an invalid RSA signature that failed verification. If an attacker obtains the RSA private key, they could use the key to impersonate a device that is running Cisco ASA Software or Cisco FTD Software or to decrypt the device traffic.", "https://github.com/ARPSyndicate/cvemon https://github.com/CiscoPSIRT/CVE-2022-20866 https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/leoambrus/CheckersNomisec https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0703", "The GD Mylist WordPress plugin through 1.1.1 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536"], ["2022", "CVE-2022-0492", "A vulnerability was found in the Linux kernel\u2019s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.", "https://github.com/ARPSyndicate/cvemon https://github.com/JadenQ/Cloud-Computing-Security-ProjectPage https://github.com/LeoPer02/IDS-Dataset https://github.com/Metarget/metarget https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492 https://github.com/SPuerBRead/shovel https://github.com/SYRTI/POC_to_review https://github.com/SgtMate/container_escape_showcase https://github.com/SofianeHamlaoui/CVE-2022-0492-Checker https://github.com/T1erno/CVE-2022-0492-Docker-Breakout-Checker-and-PoC https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492 https://github.com/WhooAmii/POC_to_review https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground https://github.com/adavarski/HomeLab-k8s-DevSecOps-playground https://github.com/bashofmann/hacking-kubernetes https://github.com/bb33bb/CVE-2022-0492 https://github.com/bigpick/cve-reading-list https://github.com/cdk-team/CDK https://github.com/chenaotian/CVE-2022-0492 https://github.com/cloud-native-security-news/cloud-native-security-news https://github.com/h4ckm310n/Container-Vulnerability-Exploit https://github.com/hardenedvault/ved https://github.com/iridium-soda/container-escape-exploits https://github.com/josebeo2016/eBPF_Hotpatch https://github.com/k0mi-tg/CVE-POC https://github.com/kvesta/vesta https://github.com/manas3c/CVE-POC https://github.com/marksowell/my-stars https://github.com/marksowell/starred https://github.com/marksowell/stars https://github.com/nomi-sec/PoC-in-GitHub https://github.com/omkmorendha/LSM_Project https://github.com/puckiestyle/CVE-2022-0492 https://github.com/sam8k/Dynamic-and-Static-Analysis-of-SOUPs https://github.com/soosmile/POC https://github.com/ssst0n3/ssst0n3 https://github.com/teamssix/container-escape-check https://github.com/tmawalt12528a/eggshell1 https://github.com/trhacknon/Pocingit https://github.com/ttauveron/cheatsheet https://github.com/whoforget/CVE-POC https://github.com/yoeelingBin/CVE-2022-0492-Container-Escape https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af"], ["2022", "CVE-2022-21409", "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime). The supported version that is affected is Prior to 9.2.6.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-2597", "The Visual Portfolio, Photo Gallery & Post Grid WordPress plugin before 2.19.0 does not have proper authorisation checks in some of its REST endpoints, allowing users with a role as low as contributor to call them and inject arbitrary CSS in arbitrary saved layouts", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7"], ["2022", "CVE-2022-35018", "Advancecomp v2.3 was discovered to contain a segmentation fault.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md"], ["2022", "CVE-2022-26269", "Suzuki Connect v1.0.15 allows attackers to tamper with displayed messages via spoofed CAN messages.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nsbogam/CVE-2022-26269 https://github.com/shipcod3/canTot https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md"], ["2022", "CVE-2022-22660", "This issue was addressed with a new entitlement. This issue is fixed in macOS Monterey 12.3. An app may be able to spoof system notifications and UI.", "https://github.com/ARPSyndicate/cvemon https://github.com/houjingyi233/macOS-iOS-system-security https://github.com/insidegui/CoreFollowUpAttack", "No PoCs from references."], ["2022", "CVE-2022-29017", "Bento4 v1.6.0.0 was discovered to contain a segmentation fault via the component /x86_64/multiarch/strlen-avx2.S.", "No PoCs found on GitHub currently.", "https://github.com/axiomatic-systems/Bento4/issues/691"], ["2022", "CVE-2022-41953", "Git GUI is a convenient graphical tool that comes with Git for Windows. Its target audience is users who are uncomfortable with using Git on the command-line. Git GUI has a function to clone repositories. Immediately after the local clone is available, Git GUI will automatically post-process it, among other things running a spell checker called `aspell.exe` if it was found. Git GUI is implemented as a Tcl/Tk script. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable _always includes the current directory_. Therefore, malicious repositories can ship with an `aspell.exe` in their top-level directory which is executed by Git GUI without giving the user a chance to inspect it first, i.e. running untrusted code. This issue has been addressed in version 2.39.1. Users are advised to upgrade. Users unable to upgrade should avoid using Git GUI for cloning. If that is not a viable option, at least avoid cloning from untrusted sources.", "https://github.com/9069332997/session-1-full-stack https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl https://github.com/sondermc/git-cveissues https://github.com/ycdxsb/ycdxsb", "No PoCs from references."], ["2022", "CVE-2022-31551", "The pleomax00/flask-mongo-skel repository through 2012-11-01 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22720", "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling", "https://github.com/8ctorres/SIND-Practicas https://github.com/ARPSyndicate/cvemon https://github.com/Benasin/CVE-2022-22720 https://github.com/PierreChrd/py-projet-tut https://github.com/Totes5706/TotesHTB https://github.com/bioly230/THM_Skynet https://github.com/firatesatoglu/shodanSearch https://github.com/kasem545/vulnsearch https://github.com/nomi-sec/PoC-in-GitHub", "https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-38223", "There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-LIST https://github.com/fkie-cad/nvd-json-data-feeds", "https://github.com/tats/w3m/issues/242"], ["2022", "CVE-2022-2845", "Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445"], ["2022", "CVE-2022-35158", "A vulnerability in the lua parser of TscanCode tsclua v2.15.01 allows attackers to cause a Denial of Service (DoS) via a crafted lua script.", "https://github.com/firmianay/security-issues", "No PoCs from references."], ["2022", "CVE-2022-26329", "File existence disclosure vulnerability in NetIQ Identity Manager plugin prior to version 4.8.5 allows attacker to determine whether a file exists on the filesystem. This issue affects: Micro Focus NetIQ Identity Manager NetIQ Identity Manager versions prior to 4.8.5 on ALL.", "https://github.com/ARPSyndicate/cvemon https://github.com/kaje11/CVEs", "No PoCs from references."], ["2022", "CVE-2022-0940", "Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782"], ["2022", "CVE-2022-0643", "The Bank Mellat WordPress plugin through 1.3.7 does not sanitize and escape the orderId parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c"], ["2022", "CVE-2022-21549", "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-22823", "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.", "https://github.com/ARPSyndicate/cvemon https://github.com/fokypoky/places-list", "No PoCs from references."], ["2022", "CVE-2022-48122", "TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the dayvalid parameter in the setting/delStaticDhcpRules function.", "No PoCs found on GitHub currently.", "https://github.com/Am1ngl/ttt/tree/main/17"], ["2022", "CVE-2022-0752", "Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.", "https://github.com/ARPSyndicate/cvemon https://github.com/jaapmarcus/drone-test", "https://huntr.dev/bounties/49940dd2-72c2-4607-857a-1fade7e8f080"], ["2022", "CVE-2022-21458", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Navigation Pages, Portal, Query). Supported versions that are affected are 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-2657", "The Multivendor Marketplace Solution for WooCommerce WordPress plugin before 3.8.12 is lacking authorisation and CSRF in multiple AJAX actions, which could allow any authenticated users, such as subscriber to call them and suspend vendors (reporter by the submitter) or update arbitrary order status (identified by WPScan when verifying the issue) for example. Other unauthenticated attacks are also possible, either directly or via CSRF", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a"], ["2022", "CVE-2022-36220", "Kiosk breakout (without quit password) in Safe Exam Browser (Windows) <3.4.0, which allows an attacker to achieve code execution via the browsers' print dialog.", "https://github.com/jomoza/KioskBypases-Malduino", "No PoCs from references."], ["2022", "CVE-2022-41741", "NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.", "https://github.com/ARPSyndicate/cvemon https://github.com/dumbbutt0/evilMP4", "No PoCs from references."], ["2022", "CVE-2022-41842", "An issue was discovered in Xpdf 4.04. There is a crash in gfseek(_IO_FILE*, long, int) in goo/gfile.cc.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928"], ["2022", "CVE-2022-22631", "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to gain elevated privileges.", "https://github.com/ARPSyndicate/cvemon https://github.com/didi/kemon", "No PoCs from references."], ["2022", "CVE-2022-35049", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b03b5.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md"], ["2022", "CVE-2022-26238", "The default privileges for the running service Normand Service Manager in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.", "No PoCs found on GitHub currently.", "https://pastebin.com/23N5wcC7"], ["2022", "CVE-2022-0851", "There is a flaw in convert2rhel. When the --activationkey option is used with convert2rhel, the activation key is subsequently passed to subscription-manager via the command line, which could allow unauthorized users locally on the machine to view the activation key via the process command line via e.g. htop or ps. The specific impact varies upon the subscription, but generally this would allow an attacker to register systems purchased by the victim until discovered; a form of fraud. This could occur regardless of how the activation key is supplied to convert2rhel because it involves how convert2rhel provides it to subscription-manager.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-42468", "Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.", "https://github.com/ARPSyndicate/cvemon https://github.com/nbxiglk0/nbxiglk0", "No PoCs from references."], ["2022", "CVE-2022-2814", "A vulnerability has been found in SourceCodester Simple and Nice Shopping Cart Script and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /mkshope/login.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206401 was assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206401"], ["2022", "CVE-2022-35109", "SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via draw_stroke at /gfxpoly/stroke.c.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/matthiaskramm/swftools/issues/184"], ["2022", "CVE-2022-35298", "SAP NetWeaver Enterprise Portal (KMC) - version 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. KMC servlet is vulnerable to XSS attack. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim\u2019s web browser session.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-0911", "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77"], ["2022", "CVE-2022-31691", "Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker.", "https://github.com/ARPSyndicate/cvemon https://github.com/SpindleSec/CVE-2022-31691 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-43704", "The Sinilink XY-WFT1 WiFi Remote Thermostat, running firmware 1.3.6, allows an attacker to bypass the intended requirement to communicate using MQTT. It is possible to replay Sinilink aka SINILINK521 protocol (udp/1024) commands interfacing directly with the target device. This, in turn, allows for an attack to control the onboard relay without requiring authentication via the mobile application. This might result in an unacceptable temperature within the target device's physical environment.", "https://github.com/9lyph/CVE-2022-43704 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/"], ["2022", "CVE-2022-33897", "A directory traversal vulnerability exists in the web_server /ajax/remove/ functionality of Robustel R1510 3.1.16. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579"], ["2022", "CVE-2022-34265", "An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.", "https://github.com/ARPSyndicate/cvemon https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/OSCKOREA-WORKSHOP/NEXUS-Firewall https://github.com/SYRTI/POC_to_review https://github.com/SurfRid3r/Django_vulnerability_analysis https://github.com/TakutoYoshikai/TakutoYoshikai https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Vulhub-Reproduce https://github.com/WhooAmii/POC_to_review https://github.com/ZhaoQi99/CVE-2022-34265 https://github.com/ZhaoQi99/ZhaoQi99 https://github.com/aeyesec/CVE-2022-34265 https://github.com/bakery312/Vulhub-Reproduce https://github.com/coco0x0a/CTF_Django_CVE-2022-34265 https://github.com/k0mi-tg/CVE-POC https://github.com/kDv44/djangoApi-V4.0 https://github.com/lions2012/Penetration_Testing_POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/qwqoro/GPN-Hackathon https://github.com/simonepetruzzi/WebSecurityProject https://github.com/t0m4too/t0m4to https://github.com/traumatising/CVE-2022-34265 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/yoryio/django-vuln-research https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-27385", "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.", "No PoCs found on GitHub currently.", "https://jira.mariadb.org/browse/MDEV-26415"], ["2022", "CVE-2022-0612", "Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.", "https://github.com/ARPSyndicate/cvemon https://github.com/iohehe/awesome-xss https://github.com/khanhchauminh/khanhchauminh", "No PoCs from references."], ["2022", "CVE-2022-0583", "Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file", "No PoCs found on GitHub currently.", "https://gitlab.com/wireshark/wireshark/-/issues/17840"], ["2022", "CVE-2022-21689", "OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions the receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script. An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.", "No PoCs found on GitHub currently.", "https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc"], ["2022", "CVE-2022-21518", "Vulnerability in the Oracle Health Sciences Data Management Workbench product of Oracle Health Sciences Applications (component: User Interface). Supported versions that are affected are 2.4.8.7 and 2.5.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Health Sciences Data Management Workbench. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Health Sciences Data Management Workbench accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-32769", "Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Playlists plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's playlists.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536"], ["2022", "CVE-2022-2486", "A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.", "https://github.com/ARPSyndicate/kenzer-templates", "https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md https://vuldb.com/?id.204537"], ["2022", "CVE-2022-45208", "Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.", "No PoCs found on GitHub currently.", "https://github.com/jeecgboot/jeecg-boot/issues/4126"], ["2022", "CVE-2022-29287", "Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).", "No PoCs found on GitHub currently.", "https://devnet.kentico.com/download/hotfixes"], ["2022", "CVE-2022-22761", "Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1745566 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31510", "The sergeKashkin/Simple-RAT repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726 https://github.com/sergeKashkin/Simple-RAT/pull/11"], ["2022", "CVE-2022-31681", "VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-46071", "There is SQL Injection vulnerability at Helmet Store Showroom v1.0 Login Page. This vulnerability can be exploited to bypass admin access.", "No PoCs found on GitHub currently.", "https://yuyudhn.github.io/CVE-2022-46071/"], ["2022", "CVE-2022-41912", "The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html"], ["2022", "CVE-2022-0901", "The Ad Inserter Free and Pro WordPress plugins before 2.7.12 do not sanitise and escape the REQUEST_URI before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting in browsers which do not encode characters", "https://github.com/ARPSyndicate/cvemon", "http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba"], ["2022", "CVE-2022-2804", "A vulnerability was found in SourceCodester Zoo Management System. It has been classified as critical. Affected is an unknown function of the file /pages/apply_vacancy.php. The manipulation of the argument filename leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-206250 is the identifier assigned to this vulnerability.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.206250"], ["2022", "CVE-2022-45218", "Human Resource Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability. This vulnerability is triggered via a crafted payload injected into an authentication error message.", "No PoCs found on GitHub currently.", "https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip"], ["2022", "CVE-2022-2707", "A vulnerability classified as critical was found in SourceCodester Online Class and Exam Scheduling System 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/faculty_sched.php. The manipulation of the argument faculty with the input ' OR (SELECT 2078 FROM(SELECT COUNT(*),CONCAT(0x716a717071,(SELECT (ELT(2078=2078,1))),0x717a706a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- uYCM leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205831.", "No PoCs found on GitHub currently.", "https://vuldb.com/?id.205831"], ["2022", "CVE-2022-21508", "Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.3. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Essbase executes to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Essbase accessible data as well as unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-21699", "IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade.", "https://github.com/ARPSyndicate/cvemon https://github.com/gwyomarch/Shared-HTB-Writeup-FR", "https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x"], ["2022", "CVE-2022-0593", "The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3"], ["2022", "CVE-2022-0602", "Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010"], ["2022", "CVE-2022-20967", "A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
Cisco has not yet released software updates that address this vulnerability.", "No PoCs found on GitHub currently.", "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/"], ["2022", "CVE-2022-27004", "Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the Tunnel 6in4 function via the remote6in4 parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-22922", "TP-Link TL-WA850RE Wi-Fi Range Extender before v6_200923 was discovered to use highly predictable and easily detectable session keys, allowing attackers to gain administrative privileges.", "No PoCs found on GitHub currently.", "https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md"], ["2022", "CVE-2022-2647", "A vulnerability was found in jeecg-boot. It has been declared as critical. This vulnerability affects unknown code of the file /api/. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-205594 is the identifier assigned to this vulnerability.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-21448", "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Visual Analyzer). The supported version that is affected is 5.9.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0742", "Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.", "https://github.com/ARPSyndicate/cvemon", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc"], ["2022", "CVE-2022-0841", "OS Command Injection in GitHub repository ljharb/npm-lockfile in v2.0.3 and v2.0.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1"], ["2022", "CVE-2022-35059", "OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0414.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md"], ["2022", "CVE-2022-22621", "This issue was addressed with improved checks. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3, watchOS 8.5. A person with physical access to an iOS device may be able to see sensitive information via keyboard suggestions.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-41852", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "https://github.com/ARPSyndicate/cvemon https://github.com/LaNyer640/java_asm_parse https://github.com/OWASP/www-project-ide-vulscanner https://github.com/Warxim/CVE-2022-41852 https://github.com/Whoopsunix/PPPVULNS https://github.com/Y4tacker/JavaSec https://github.com/aneasystone/github-trending https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/tanjiti/sec_profile https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-0950", "Unrestricted Upload of File with Dangerous Type in GitHub repository star7th/showdoc prior to 2.10.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc"], ["2022", "CVE-2022-38233", "XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::readMCURow() at /xpdf/Stream.cc.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-31541", "The lyubolp/Barry-Voice-Assistant repository through 2021-01-18 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-22833", "An issue was discovered in Servisnet Tessa 0.0.2. An attacker can obtain sensitive information via a /js/app.js request.", "https://github.com/ARPSyndicate/cvemon https://github.com/Enes4xd/Enes4xd https://github.com/Enes4xd/aleyleiftaradogruu https://github.com/Enes4xd/ezelnur6327 https://github.com/Enes4xd/kirik_kalpli_olan_sayfa https://github.com/Enes4xd/salih_.6644 https://github.com/Enes4xd/salihalkan4466 https://github.com/aleyleiftaradogruu/aleyleiftaradogruu https://github.com/cayserkiller/cayserkiller https://github.com/cr0ss2018/cr0ss2018 https://github.com/crossresmii/cayserkiller https://github.com/crossresmii/crossresmii https://github.com/crossresmii/salihalkan4466 https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/ezelnur6327/ezelnur6327 https://github.com/xr4aleyna/Enes4xd https://github.com/xr4aleyna/aleyleiftaradogruu https://github.com/xr4aleyna/crossresmii https://github.com/xr4aleyna/xr4aleyna", "http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html https://www.exploit-db.com/exploits/50713"], ["2022", "CVE-2022-2756", "Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/95e7c181-9d80-4428-aebf-687ac55a9216"], ["2022", "CVE-2022-21559", "Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Application Framework). Supported versions that are affected are 11.3.0, 11.3.1 and 11.3.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Commerce Platform executes to compromise Oracle Commerce Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Commerce Platform accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-0653", "The Profile Builder \u2013 User Profile & User Registration Forms WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-2587", "Out of bounds write in Chrome OS Audio Server in Google Chrome on Chrome OS prior to 102.0.5005.125 allowed a remote attacker to potentially exploit heap corruption via crafted audio metadata.", "https://github.com/ARPSyndicate/cvemon https://github.com/yo-yo-yo-jbo/yo-yo-yo-jbo.github.io", "No PoCs from references."], ["2022", "CVE-2022-21419", "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Visual Analyzer). Supported versions that are affected are 5.5.0.0.0 and 5.9.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuapr2022.html"], ["2022", "CVE-2022-0482", "Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Acceis/exploit-CVE-2022-0482 https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/mija-pilkaite/CVE-2022-0482_exploit https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466 https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26"], ["2022", "CVE-2022-0713", "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c"], ["2022", "CVE-2022-22973", "VMware Workspace ONE Access and Identity Manager contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.", "https://github.com/ARPSyndicate/cvemon https://github.com/happyhacking-k/happyhacking-k", "No PoCs from references."], ["2022", "CVE-2022-43594", "Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653"], ["2022", "CVE-2022-43605", "An out-of-bounds write vulnerability exists in the SetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out of bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662"], ["2022", "CVE-2022-29396", "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_00418f10.", "https://github.com/ARPSyndicate/cvemon https://github.com/d1tto/IoT-vuln", "https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules"], ["2022", "CVE-2022-29007", "Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Dairy Farm Shop Management System v1.0 allows attackers to bypass authentication.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sudoninja-noob/CVE-2022-29007 https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://www.exploit-db.com/exploits/50365"], ["2022", "CVE-2022-31790", "WatchGuard Firebox and XTM appliances allow an unauthenticated remote attacker to retrieve sensitive authentication server settings by sending a malicious request to exposed authentication endpoints. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.", "https://github.com/ARPSyndicate/cvemon https://github.com/AlexRogalskiy/AlexRogalskiy https://github.com/pipiscrew/timeline", "https://www.ambionics.io/blog/hacking-watchguard-firewalls"], ["2022", "CVE-2022-20775", "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", "No PoCs found on GitHub currently.", "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc"], ["2022", "CVE-2022-26279", "EyouCMS v1.5.5 was discovered to have no access control in the component /data/sqldata.", "No PoCs found on GitHub currently.", "https://github.com/eyoucms/eyoucms/issues/22"], ["2022", "CVE-2022-35008", "PNGDec commit 8abf6be was discovered to contain a stack overflow via /linux/main.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-42848", "A logic issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, iOS 15.7.2 and iPadOS 15.7.2, tvOS 16.2. An app may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Dec/20 http://seclists.org/fulldisclosure/2022/Dec/21 http://seclists.org/fulldisclosure/2022/Dec/26"], ["2022", "CVE-2022-0531", "The Migration, Backup, Staging WordPress plugin before 0.9.70 does not sanitise and escape the sub_page parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca"], ["2022", "CVE-2022-27337", "A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.", "https://github.com/0xCyberY/CVE-T4PDF https://github.com/ARPSyndicate/cvemon", "https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230 https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177"], ["2022", "CVE-2022-4138", "A Cross Site Request Forgery issue has been discovered in GitLab CE/EE affecting all versions before 15.6.7, all versions starting from 15.7 before 15.7.6, and all versions starting from 15.8 before 15.8.1. An attacker could take over a project if an Owner or Maintainer uploads a file to a malicious project.", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/383709"], ["2022", "CVE-2022-29225", "Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 secompressors accumulate decompressed data into an intermediate buffer before overwriting the body in the decode/encodeBody. This may allow an attacker to zip bomb the decompressor by sending a small highly compressed payload. Maliciously constructed zip files may exhaust system memory and cause a denial of service. Users are advised to upgrade. Users unable to upgrade may consider disabling decompression.", "https://github.com/ARPSyndicate/cvemon https://github.com/ssst0n3/docker_archive", "https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh"], ["2022", "CVE-2022-46342", "A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-44096", "Sanitization Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.", "No PoCs found on GitHub currently.", "https://github.com/upasvi/CVE-/issues/1"], ["2022", "CVE-2022-3618", "The Spacer WordPress plugin before 3.0.7 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b"], ["2022", "CVE-2022-27277", "InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain an arbitrary file deletion vulnerability via the function sub_17C08.", "https://github.com/ARPSyndicate/cvemon https://github.com/skyvast404/IoT_Hunter https://github.com/wu610777031/IoT_Hunter", "No PoCs from references."], ["2022", "CVE-2022-31860", "An issue was discovered in OpenRemote through 1.0.4 allows attackers to execute arbitrary code via a crafted Groovy rule.", "No PoCs found on GitHub currently.", "https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html"], ["2022", "CVE-2022-25372", "Pritunl Client through 1.2.3019.52 on Windows allows local privilege escalation, related to an ACL entry for CREATOR OWNER in platform_windows.go.", "https://github.com/ARPSyndicate/cvemon https://github.com/H4cksploit/CVEs-master https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/RhinoSecurityLabs/CVEs https://github.com/lions2012/Penetration_Testing_POC https://github.com/merlinepedra/RHINOECURITY-CVEs https://github.com/merlinepedra25/RHINOSECURITY-CVEs https://github.com/xuetusummer/Penetration_Testing_POC", "No PoCs from references."], ["2022", "CVE-2022-22980", "A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SummerSec/BlogPapers https://github.com/SummerSec/SummerSec https://github.com/Vulnmachines/Spring_cve-2022-22980 https://github.com/W01fh4cker/Serein https://github.com/WhooAmii/POC_to_review https://github.com/Whoopsunix/PPPVULNS https://github.com/Y4tacker/JavaSec https://github.com/ax1sX/Automation-in-Java-Security https://github.com/ax1sX/Codeql-In-Java-Security https://github.com/jweny/cve-2022-22980 https://github.com/jweny/cve-2022-22980-exp https://github.com/k0mi-tg/CVE-POC https://github.com/kuron3k0/Spring-Data-Mongodb-Example https://github.com/li8u99/Spring-Data-Mongodb-Demo https://github.com/manas3c/CVE-POC https://github.com/murataydemir/CVE-2022-22980 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/sohamda/organizing-java-backend https://github.com/tindoc/spring-blog https://github.com/trganda/CVE-2022-22980 https://github.com/trganda/dockerv https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-34006", "An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2.1050. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\\SYSTEM, aka NX-I674 (sub-issue 2). NOTE: as of 2022-06-21, the 1.2.1050 release corrects this vulnerability in a new installation, but not in an upgrade installation.", "No PoCs found on GitHub currently.", "https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf"], ["2022", "CVE-2022-33965", "Multiple Unauthenticated SQL Injection (SQLi) vulnerabilities in Osamaesh WP Visitor Statistics plugin <= 5.7 at WordPress.", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates", "No PoCs from references."], ["2022", "CVE-2022-48310", "An information disclosure vulnerability allows sensitive key material to be included in technical support archives in Sophos Connect versions older than 2.2.90.", "https://github.com/ARPSyndicate/cvemon https://github.com/nitschSB/CVE-2022-48309-and-CVE-2022-48310 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/scopas1293/SophosConnectUpgradeScript", "No PoCs from references."], ["2022", "CVE-2022-28009", "Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \\admin\\attendance_delete.php.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-2574", "The Meks Easy Social Share WordPress plugin before 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2"], ["2022", "CVE-2022-0471", "The Favicon by RealFaviconGenerator WordPress plugin before 1.3.23 does not properly sanitise and escape the json_result_url parameter before outputting it back in the Favicon admin dashboard, leading to a Reflected Cross-Site Scripting issue", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66"], ["2022", "CVE-2022-48190", "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.", "https://github.com/fkie-cad/nvd-json-data-feeds", "No PoCs from references."], ["2022", "CVE-2022-33874", "An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in SSH login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-22891", "Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via ecma_ref_object_inline in /jerry-core/ecma/base/ecma-gc.c.", "https://github.com/ARPSyndicate/cvemon", "https://github.com/jerryscript-project/jerryscript/issues/4871"], ["2022", "CVE-2022-28118", "SiteServer CMS v7.x allows attackers to execute arbitrary code via a crafted plug-in.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Richard-Tang/SSCMS-PluginShell https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-0560", "Open Redirect in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25"], ["2022", "CVE-2022-21969", "Microsoft Exchange Server Remote Code Execution Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/FDlucifer/Proxy-Attackchain https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet https://github.com/f0ur0four/Insecure-Deserialization https://github.com/hktalent/ysoserial.net https://github.com/puckiestyle/ysoserial.net https://github.com/pwntester/ysoserial.net", "No PoCs from references."], ["2022", "CVE-2022-31672", "VMware vRealize Operations contains a privilege escalation vulnerability. A malicious actor with administrative network access can escalate privileges to root.", "https://github.com/ARPSyndicate/cvemon https://github.com/sourceincite/DashOverride https://github.com/trhacknon/DashOverride", "No PoCs from references."], ["2022", "CVE-2022-22543", "SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate sap-passport information, which could lead to a Denial-of-Service attack. This allows an unauthorized remote user to provoke a breakdown of the SAP Web Dispatcher or Kernel work process. The crashed process can be restarted immediately, other processes are not affected.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-44356", "WAVLINK Quantum D4G (WL-WN531G3) running firmware versions M31G3.V5030.201204 and M31G3.V5030.200325 has an access control issue which allows unauthenticated attackers to download configuration data and log files.", "No PoCs found on GitHub currently.", "https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md"], ["2022", "CVE-2022-3649", "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-21829", "Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing \u2018concrete_secure\u2019 instead of \u2018concrete\u2019. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520.", "https://github.com/416e6e61/My-CVEs", "No PoCs from references."], ["2022", "CVE-2022-0420", "The RegistrationMagic WordPress plugin before 5.0.2.2 does not sanitise and escape the rm_form_id parameter before using it in a SQL statement in the Automation admin dashboard, allowing high privilege users to perform SQL injection attacks", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151"], ["2022", "CVE-2022-27226", "A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a threat actor to create a crontab entry in the router administration panel. The cronjob will consequently execute the entry on the threat actor's defined interval, leading to remote code execution, allowing the threat actor to gain filesystem access. In addition, if the router's default credentials aren't rotated or a threat actor discovers valid credentials, remote code execution can be achieved without user interaction.", "https://github.com/ARPSyndicate/cvemon https://github.com/AlexRogalskiy/AlexRogalskiy https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/SakuraSamuraii/ez-iRZ https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/karimhabush/cyberowl https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/vishnusomank/GoXploitDB https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html https://github.com/SakuraSamuraii/ez-iRZ https://johnjhacking.com/blog/cve-2022-27226/"], ["2022", "CVE-2022-36152", "tifig v0.2.2 was discovered to contain a memory leak via operator new[](unsigned long) at /asan/asan_new_delete.cpp.", "https://github.com/ARPSyndicate/cvemon https://github.com/Cvjark/Poc", "No PoCs from references."], ["2022", "CVE-2022-25323", "ZEROF Web Server 2.0 allows /admin.back XSS.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/awillix/research https://github.com/landigv/research https://github.com/landigvt/research", "No PoCs from references."], ["2022", "CVE-2022-36255", "A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as \"searchTxt\".", "No PoCs found on GitHub currently.", "https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3 https://github.com/sazanrjb/InventoryManagementSystem/issues/14"], ["2022", "CVE-2022-22947", "In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.", "https://github.com/0730Nophone/CVE-2022-22947- https://github.com/0x783kb/Security-operation-book https://github.com/0x7eTeam/CVE-2022-22947 https://github.com/0x801453/SpringbootGuiExploit https://github.com/13exp/SpringBoot-Scan-GUI https://github.com/189569400/Meppo https://github.com/20142995/Goby https://github.com/20142995/pocsuite3 https://github.com/20142995/sectool https://github.com/22ke/CVE-2022-22947 https://github.com/2lambda123/SBSCAN https://github.com/4nNns/CVE-2022-22947 https://github.com/ADP-Dynatrace/dt-appsec-powerup https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/AabyssZG/SpringBoot-Scan https://github.com/An0th3r/CVE-2022-22947-exp https://github.com/Arrnitage/CVE-2022-22947-exp https://github.com/Arrnitage/CVE-2022-22947_exp https://github.com/Awrrays/FrameVul https://github.com/Axx8/CVE-2022-22947_Rce_Exp https://github.com/B0rn2d/Spring-Cloud-Gateway-Nacos https://github.com/BerMalBerIst/CVE-2022-22947 https://github.com/CLincat/vulcat https://github.com/CVEDB/PoC-List https://github.com/CVEDB/awesome-cve-repo https://github.com/CVEDB/top https://github.com/Ciyfly/mullet https://github.com/CllmsyK/YYBaby-Spring_Scan https://github.com/Enokiy/cve-2022-22947-spring-cloud-gateway https://github.com/Enokiy/cve_learning_record https://github.com/Enokiy/javaThings https://github.com/Enokiy/java_things https://github.com/F6JO/Burp_VulPscan https://github.com/Getshell/Mshell https://github.com/GhostTroops/TOP https://github.com/Greetdawn/CVE-2022-22947 https://github.com/Ha0Liu/CVE-2022-22947 https://github.com/HimmelAward/Goby_POC https://github.com/JERRY123S/all-poc https://github.com/Jun-5heng/CVE-2022-22947 https://github.com/LY613313/CVE-2022-22947 https://github.com/Le1a/CVE-2022-22947 https://github.com/Ljw1114/SpringFramework-Vul https://github.com/M0ge/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE https://github.com/M1r0ku/Java-Sec-Learn https://github.com/Mr-xn/Penetration_Testing_POC https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/Nathaniel1025/CVE-2022-22947 https://github.com/Ostorlab/KEV https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors https://github.com/PaoPaoLong-lab/Spring-CVE-2022-22947- https://github.com/PyterSmithDarkGhost/VMWARECODEINJECTIONATTACKCVE-2022-22947 https://github.com/SYRTI/POC_to_review https://github.com/Sec-Fork/mullet2 https://github.com/SiJiDo/CVE-2022-22947 https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947 https://github.com/SummerSec/learning-codeql https://github.com/Tas9er/SpringCloudGatewayRCE https://github.com/Threekiii/Awesome-Exploit https://github.com/Threekiii/Awesome-POC https://github.com/Threekiii/Awesome-Redteam https://github.com/Threekiii/Vulhub-Reproduce https://github.com/Vancomycin-g/CVE-2022-22947 https://github.com/Vulnmachines/spring-cve-2022-22947 https://github.com/WhooAmii/POC_to_review https://github.com/Whoopsunix/PPPVULNS https://github.com/WingsSec/Meppo https://github.com/Wrin9/CVE-2022-22947 https://github.com/Wrin9/POC https://github.com/Wrong-pixel/CVE-2022-22947-exp https://github.com/Xd-tl/CVE-2022-22947-Rce_POC https://github.com/XuCcc/VulEnv https://github.com/Y4tacker/JavaSec https://github.com/YutuSec/SpEL https://github.com/Z0fhack/Goby_POC https://github.com/ZWDeJun/ZWDeJun https://github.com/Zh0um1/CVE-2022-22947 https://github.com/ad-calcium/vuln_script https://github.com/aesm1p/CVE-2022-22947-POC-Reproduce https://github.com/al4xs/CVE-2022-22947-Spring-Cloud https://github.com/anansec/CVE-2022-22947_EXP https://github.com/angui0O/Awesome-Redteam https://github.com/aodsec/CVE-2022-22947 https://github.com/awsassets/CVE-2022-22947-RCE https://github.com/ax1sX/SpringSecurity https://github.com/ba1ma0/Spring-Cloud-GateWay-CVE-2022-22947-demon-code https://github.com/bakery312/Vulhub-Reproduce https://github.com/bigbigban1/CVE-2022-22947-exp https://github.com/bysinks/CVE-2022-22947 https://github.com/carlosevieira/CVE-2022-22947 https://github.com/chaosec2021/CVE-2022-22947-POC https://github.com/chaosec2021/EXP-POC https://github.com/chaosec2021/fscan-POC https://github.com/charonlight/SpringExploitGUI https://github.com/crowsec-edtech/CVE-2022-22947 https://github.com/cyberanand1337x/bug-bounty-2022 https://github.com/d-rn/vulBox https://github.com/d4n-sec/d4n-sec.github.io https://github.com/darkb1rd/cve-2022-22947 https://github.com/dbgee/CVE-2022-22947 https://github.com/debug4you/CVE-2022-22947 https://github.com/dingxiao77/-cve-2022-22947- https://github.com/dravenww/curated-article https://github.com/expzhizhuo/Burp_VulPscan https://github.com/fbion/CVE-2022-22947 https://github.com/flying0er/CVE-2022-22947-goby https://github.com/go-bi/bappstore https://github.com/h30gyan/Java-Sec-Learn https://github.com/helloexp/CVE-2022-22947 https://github.com/hh-hunter/cve-2022-22947-docker https://github.com/hktalent/TOP https://github.com/hktalent/bug-bounty https://github.com/hosch3n/msmap https://github.com/hunzi0/CVE-2022-22947-Rce_POC https://github.com/hxysaury/saury-vulnhub https://github.com/j-jasson/CVE-2022-22947-Spring-Cloud-Gateway-SpelRCE https://github.com/jbmihoub/all-poc https://github.com/k0mi-tg/CVE-POC https://github.com/k3rwin/spring-cloud-gateway-rce https://github.com/kaydenlsr/Awesome-Redteam https://github.com/kmahyyg/CVE-2022-22947 https://github.com/langu-xyz/JavaVulnMap https://github.com/lions2012/Penetration_Testing_POC https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 https://github.com/luckyfuture0177/VULOnceMore https://github.com/mamba-2021/EXP-POC https://github.com/mamba-2021/fscan-POC https://github.com/manas3c/CVE-POC https://github.com/march0s1as/CVE-2022-22947 https://github.com/metaStor/SpringScan https://github.com/michaelklaan/CVE-2022-22947-Spring-Cloud https://github.com/mieeA/SpringWebflux-MemShell https://github.com/mostwantedduck/cve-poc https://github.com/mrknow001/CVE-2022-22947 https://github.com/n11dc0la/PocSuite_POC https://github.com/nBp1Ng/FrameworkAndComponentVulnerabilities https://github.com/nBp1Ng/SpringFramework-Vul https://github.com/nanaao/CVE-2022-22947-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/nu0l/cve-2022-22947 https://github.com/nu1r/yak-module-Nu https://github.com/open-source-agenda/new-open-source-projects https://github.com/pen4uin/java-memshell-generator-release https://github.com/qq87234770/CVE-2022-22947 https://github.com/reph0r/poc-exp https://github.com/reph0r/poc-exp-tools https://github.com/safest-place/ExploitPcapCollection https://github.com/sagaryadav8742/springcloudRCE https://github.com/savior-only/CVE-2022-22947 https://github.com/savior-only/Spring_All_Reachable https://github.com/scopion/CVE-2022-22947-exp https://github.com/scopion/cve-2022-22947 https://github.com/shakeman8/CVE-2022-22947-RCE https://github.com/shengshengli/fscan-POC https://github.com/soosmile/POC https://github.com/sp4zcmd/SpringWebflux-MemShell https://github.com/sspsec/Scan-Spring-GO https://github.com/stayfoolish777/CVE-2022-22947-POC https://github.com/sule01u/SBSCAN https://github.com/superlink996/chunqiuyunjingbachang https://github.com/talentsec/Spring-Cloud-Gateway-CVE-2022-22947 https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway https://github.com/tanjiti/sec_profile https://github.com/testivy/springboot-actuator-spring-cloud-function-rce https://github.com/thomasvincent/Spring4Shell-resources https://github.com/thomasvincent/spring-shell-resources https://github.com/thomasvincent/springshell https://github.com/tpt11fb/SpringVulScan https://github.com/trhacknon/CVE-2022-22947 https://github.com/trhacknon/Pocingit https://github.com/twseptian/cve-2022-22947 https://github.com/veo/vscan https://github.com/viemsr/spring_cloud_gateway_memshell https://github.com/weeka10/-hktalent-TOP https://github.com/whoforget/CVE-POC https://github.com/whwlsfb/cve-2022-22947-godzilla-memshell https://github.com/wjl110/Spring_CVE_2022_22947 https://github.com/xuetusummer/Penetration_Testing_POC https://github.com/york-cmd/CVE-2022-22947-goby https://github.com/youwizard/CVE-POC https://github.com/zan8in/afrog https://github.com/zecool/cve https://github.com/zhizhuoshuma/Burp_VulPscan", "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-30759", "In Nokia One-NDS (aka Network Directory Server) through 20.9, some Sudo permissions can be exploited by some users to escalate to root privileges and execute arbitrary commands.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html"], ["2022", "CVE-2022-0727", "Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/nhiephon/Research", "https://huntr.dev/bounties/d1faa10f-0640-480c-bb52-089adb351e6e"], ["2022", "CVE-2022-0824", "Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.", "https://github.com/0day404/vulnerability-poc https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/Enes4xd/Enes4xd https://github.com/KatherineHuangg/metasploit-POC https://github.com/KayCHENvip/vulnerability-poc https://github.com/Miraitowa70/POC-Notes https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Threekiii/Awesome-POC https://github.com/WhooAmii/POC_to_review https://github.com/cr0ss2018/cr0ss2018 https://github.com/cryst4lliz3/CVE-2022-0824 https://github.com/d3ltacros/d3ltacros https://github.com/d4n-sec/d4n-sec.github.io https://github.com/drdisexon/CVE-Collection https://github.com/ezelnur6327/Enes4xd https://github.com/ezelnur6327/enesamaafkolan https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell https://github.com/gokul-ramesh/WebminRCE-exploit https://github.com/hktalent/TOP https://github.com/honypot/CVE-2022-0824 https://github.com/k0mi-tg/CVE-POC https://github.com/kh4sh3i/Webmin-CVE https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/p0rkan0x/CVE-Collection https://github.com/pizza-power/golang-webmin-CVE-2022-0824-revshell https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/166240/Webmin-1.984-Remote-Code-Execution.html http://packetstormsecurity.com/files/169700/Webmin-1.984-File-Manager-Remote-Code-Execution.html https://huntr.dev/bounties/d0049a96-de90-4b1a-9111-94de1044f295 https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html"], ["2022", "CVE-2022-37139", "Loan Management System version 1.0 suffers from a persistent cross site scripting vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/saitamang/POC-DUMP", "https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md"], ["2022", "CVE-2022-24348", "Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related to Helm charts because of an error in helmTemplate in repository.go. For example, an attacker may be able to discover credentials stored in a YAML file.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/abtris/kubecon2022 https://github.com/cokeBeer/go-cves https://github.com/jkroepke/CVE-2022-24348-2 https://github.com/jkroepke/helm-secrets https://github.com/jkroepke/jkroepke https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/soosmile/POC https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2921", "Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository notrinos/notrinoserp prior to v0.7. This results in privilege escalation to a system administrator account. An attacker can gain access to protected functionality such as create/update companies, install/update languages, install/activate extensions, install/activate themes and other permissive actions.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/51b32a1c-946b-4390-a212-b6c4b6e4115c"], ["2022", "CVE-2022-41837", "An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.", "https://github.com/ARPSyndicate/cvemon", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636"], ["2022", "CVE-2022-31575", "The duducosmos/livro_python repository through 2018-06-06 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-41977", "An out of bounds read vulnerability exists in the way OpenImageIO version v2.3.19.0 processes string fields in TIFF image files. A specially-crafted TIFF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627"], ["2022", "CVE-2022-0964", "Stored XSS viva .webmv file upload in GitHub repository star7th/showdoc prior to 2.10.4.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0"], ["2022", "CVE-2022-37079", "TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg.", "No PoCs found on GitHub currently.", "https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/5"], ["2022", "CVE-2022-2861", "Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.101 allowed an attacker who convinced a user to install a malicious extension to inject arbitrary scripts into WebUI via a crafted HTML page.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2762", "The AdminPad WordPress plugin before 2.2 does not have CSRF check when updating admin's note, allowing attackers to make a logged in admin update their notes via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a"], ["2022", "CVE-2022-23468", "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade.", "https://github.com/seyrenus/trace-release", "No PoCs from references."], ["2022", "CVE-2022-41674", "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "https://github.com/c0ld21/linux_kernel_ndays https://github.com/c0ld21/ndays https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html https://www.openwall.com/lists/oss-security/2022/10/13/5"], ["2022", "CVE-2022-27061", "AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the Post Image function under the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC"], ["2022", "CVE-2022-36315", "When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox < 103.", "No PoCs found on GitHub currently.", "https://www.mozilla.org/security/advisories/mfsa2022-28/"], ["2022", "CVE-2022-22807", "A CWE-1021 Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause unintended modifications of the product settings or user accounts when deceiving the user to use the web interface rendered within iframes. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13)", "https://github.com/1-tong/vehicle_cves https://github.com/Vu1nT0tal/Vehicle-Security https://github.com/VulnTotal-Team/Vehicle-Security https://github.com/VulnTotal-Team/vehicle_cves", "No PoCs from references."], ["2022", "CVE-2022-25164", "Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.", "No PoCs found on GitHub currently.", "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf"], ["2022", "CVE-2022-30708", "Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.", "No PoCs found on GitHub currently.", "https://github.com/esp0xdeadbeef/rce_webmin https://github.com/esp0xdeadbeef/rce_webmin/blob/main/exploit.py https://github.com/webmin/webmin/issues/1635"], ["2022", "CVE-2022-0776", "Cross-site Scripting (XSS) - DOM in GitHub repository hakimel/reveal.js prior to 4.3.0.", "https://github.com/ARPSyndicate/kenzer-templates", "https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001"], ["2022", "CVE-2022-22916", "O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerability via /x_program_center/jaxrs/invoke.", "https://github.com/0x7eTeam/CVE-2022-22916 https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/aodsec/CVE-2022-22916 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "https://github.com/wendell1224/O2OA-POC/blob/main/POC.md"], ["2022", "CVE-2022-25075", "TOTOLink A3000RU V5.9c.2280_B20180512 was discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.", "https://github.com/ARPSyndicate/cvemon https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits https://github.com/kuznyJan1972/CVE-2022-25075-RCE https://github.com/kuznyJan1972/CVE-2022-25075-rce-POC https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3000RU/README.md"], ["2022", "CVE-2022-44000", "An issue was discovered in BACKCLICK Professional 5.9.63. Due to an exposed internal communications interface, it is possible to execute arbitrary system commands on the server.", "No PoCs found on GitHub currently.", "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037"], ["2022", "CVE-2022-22615", "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, Security Update 2022-003 Catalina, watchOS 8.5, macOS Monterey 12.3. An application may be able to execute arbitrary code with kernel privileges.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-22584", "A memory corruption issue was addressed with improved validation. This issue is fixed in tvOS 15.3, iOS 15.3 and iPadOS 15.3, watchOS 8.4, macOS Monterey 12.2. Processing a maliciously crafted file may lead to arbitrary code execution.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-31464", "Insecure permissions configuration in Adaware Protect v1.2.439.4251 allows attackers to escalate privileges via changing the service binary path.", "No PoCs found on GitHub currently.", "https://r0h1rr1m.medium.com/adaware-protect-local-privilege-escalation-through-insecure-service-permissions-44d0eeb6c933"], ["2022", "CVE-2022-20710", "Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.", "No PoCs found on GitHub currently.", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D"], ["2022", "CVE-2022-46294", "Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC Cartesian file format", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666"], ["2022", "CVE-2022-40798", "OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover.", "https://github.com/ARPSyndicate/cvemon https://github.com/ninj4c0d3r/OcoMon-Research https://github.com/ninj4c0d3r/ninj4c0d3r", "https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc"], ["2022", "CVE-2022-0875", "The Google Authenticator WordPress plugin before 1.0.5 does not have CSRF check when saving its settings, and does not sanitise as well as escape them, allowing attackers to make a logged in admin change them and perform Cross-Site Scripting attacks", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762"], ["2022", "CVE-2022-0935", "Host Header injection in password Reset in GitHub repository livehelperchat/livehelperchat prior to 3.97.", "https://github.com/ARPSyndicate/cvemon", "https://huntr.dev/bounties/a7e40fdf-a333-4a50-8a53-d11b16ce3ec2"], ["2022", "CVE-2022-38256", "TastyIgniter v3.5.0 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload.", "No PoCs found on GitHub currently.", "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005"], ["2022", "CVE-2022-22755", "By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.", "No PoCs found on GitHub currently.", "https://bugzilla.mozilla.org/show_bug.cgi?id=1309630 https://www.mozilla.org/security/advisories/mfsa2022-04/"], ["2022", "CVE-2022-31524", "The PureStorage-OpenConnect/swagger repository through 1.1.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-20953", "Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25135", "A command injection vulnerability in the function recv_mesh_info_sync of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-43720", "An authenticated attacker with write CSS template permissions can create a record with specific HTML tags that will not get properly escaped by the toast message displayed when a user deletes that specific CSS template record. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-2733", "Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/25b91301-dfb0-4353-a732-e051bbe8420c"], ["2022", "CVE-2022-2983", "The Salat Times WordPress plugin before 3.2.2 does not sanitize and escapes its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf"], ["2022", "CVE-2022-23918", "A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability leverages the ethAddr field within the protobuf message to cause a buffer overflow.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455"], ["2022", "CVE-2022-44362", "Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/AddSysLogRule.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md"], ["2022", "CVE-2022-20472", "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579", "https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nidhi7598/frameworks_minikin_AOSP_10_r33_CVE-2022-20472 https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-31497", "LibreHealth EHR Base 2.0.0 allows interface/main/finder/finder_navigation.php patient XSS.", "No PoCs found on GitHub currently.", "https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r"], ["2022", "CVE-2022-31706", "The vRealize Log Insight contains a Directory Traversal Vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories https://github.com/getdrive/PoC https://github.com/horizon3ai/CVE-2023-34051 https://github.com/horizon3ai/vRealizeLogInsightRCE https://github.com/karimhabush/cyberowl", "http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html"], ["2022", "CVE-2022-27212", "Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31805", "In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.", "https://github.com/ARPSyndicate/cvemon https://github.com/ic3sw0rd/Codesys_V2_Vulnerability", "No PoCs from references."], ["2022", "CVE-2022-39089", "In mlog service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-40868", "Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a stack overflow vulnerability in the function formDelDhcpRule with the request /goform/delDhcpRules/", "No PoCs found on GitHub currently.", "https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md"], ["2022", "CVE-2022-0414", "Improper Validation of Specified Quantity in Input in Packagist dolibarr/dolibarr prior to 16.0.", "https://github.com/ARPSyndicate/cvemon https://github.com/khanhchauminh/khanhchauminh", "https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f"], ["2022", "CVE-2022-0785", "The Daily Prayer Time WordPress plugin before 2022.03.01 does not sanitise and escape the month parameter before using it in a SQL statement via the get_monthly_timetable AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection", "https://github.com/20142995/sectool https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255"], ["2022", "CVE-2022-39258", "mailcow is a mailserver suite. A vulnerability innversions prior to 2022-09 allows an attacker to craft a custom Swagger API template to spoof Authorize links. This could redirect a victim to an attacker controller place to steal Swagger authorization credentials or create a phishing page to steal other information. The issue has been fixed with the 2022-09 mailcow Mootember Update. As a workaround, one may delete the Swapper API Documentation from their e-mail server.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-0554", "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.", "https://github.com/ARPSyndicate/cvemon", "http://seclists.org/fulldisclosure/2022/Oct/41 https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71"], ["2022", "CVE-2022-27352", "Simple House Rental System v1 was discovered to contain an arbitrary file upload vulnerability via /app/register.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/D4rkP0w4r/D4rkP0w4r", "http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md"], ["2022", "CVE-2022-41547", "Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.", "No PoCs found on GitHub currently.", "https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166"], ["2022", "CVE-2022-29240", "Scylla is a real-time big data database that is API-compatible with Apache Cassandra and Amazon DynamoDB. When decompressing CQL frame received from user, Scylla assumes that user-provided uncompressed length is correct. If user provides fake length, that is greater than the real one, part of decompression buffer won't be overwritten, and will be left uninitialized. This can be exploited in several ways, depending on the privileges of the user. 1. The main exploit is that an attacker with access to CQL port, but no user account, can bypass authentication, but only if there are other legitimate clients making connections to the cluster, and they use LZ4. 2. Attacker that already has a user account on the cluster can read parts of uninitialized memory, which can contain things like passwords of other users or fragments of other queries / results, which leads to authorization bypass and sensitive information disclosure. The bug has been patched in the following versions: Scylla Enterprise: 2020.1.14, 2021.1.12, 2022.1.0. Scylla Open Source: 4.6.7, 5.0.3. Users unable to upgrade should make sure none of their drivers connect to cluster using LZ4 compression, and that Scylla CQL port is behind firewall. Additionally make sure no untrusted client can connect to Scylla, by setting up authentication and applying workarounds from previous point (firewall, no lz4 compression).", "https://github.com/Live-Hack-CVE/CVE-2022-29240", "No PoCs from references."], ["2022", "CVE-2022-1638", "Heap buffer overflow in V8 Internationalization in Google Chrome prior to 101.0.4951.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "https://github.com/ARPSyndicate/cvemon https://github.com/davidboukari/yum-rpm-dnf https://github.com/dlehgus1023/dlehgus1023", "No PoCs from references."], ["2022", "CVE-2022-29351", "** DISPUTED ** An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. Note: The vendor argues that this is not a legitimate issue and there is no vulnerability here.", "No PoCs found on GitHub currently.", "https://www.youtube.com/watch?v=F_DBx4psWns"], ["2022", "CVE-2022-1729", "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "https://github.com/ARPSyndicate/cvemon https://github.com/EGI-Federation/SVG-advisories", "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704"], ["2022", "CVE-2022-0445", "The WordPress Real Cookie Banner: GDPR (DSGVO) & ePrivacy Cookie Consent WordPress plugin before 2.14.2 does not have CSRF checks in place when resetting its settings, allowing attackers to make a logged in admin reset them via a CSRF attack", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285"], ["2022", "CVE-2022-40839", "A SQL injection vulnerability in the height and width parameter in NdkAdvancedCustomizationFields v3.5.0 allows unauthenticated attackers to exfiltrate database data.", "No PoCs found on GitHub currently.", "https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt"], ["2022", "CVE-2022-31854", "Codoforum v5.1 was discovered to contain an arbitrary file upload vulnerability via the logo change option in the admin panel.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/Vikaran101/CVE-2022-31854 https://github.com/WhooAmii/POC_to_review https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html"], ["2022", "CVE-2022-36137", "ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input sHeader.", "https://github.com/ARPSyndicate/cvemon https://github.com/bypazs/GrimTheRipper", "https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-sheader-2ed4184030f7"], ["2022", "CVE-2022-34032", "Nginx NJS v0.7.5 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.", "No PoCs found on GitHub currently.", "https://github.com/nginx/njs/issues/524"], ["2022", "CVE-2022-27092", "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50804"], ["2022", "CVE-2022-43782", "Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39209", "cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print(\"![l\"* 100000 + \"\\n\")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-39198", "A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions.", "https://github.com/ARPSyndicate/cvemon https://github.com/Whoopsunix/PPPVULNS https://github.com/muneebaashiq/MBProjects https://github.com/wh1t3p1g/tabby", "No PoCs from references."], ["2022", "CVE-2022-2400", "External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a"], ["2022", "CVE-2022-0505", "Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968"], ["2022", "CVE-2022-0694", "The Advanced Booking Calendar WordPress plugin before 1.7.0 does not validate and escape the calendar parameter before using it in a SQL statement via the abc_booking_getSingleCalendar AJAX action (available to both unauthenticated and authenticated users), leading to an unauthenticated SQL injection", "https://github.com/cyllective/CVEs", "https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0"], ["2022", "CVE-2022-0997", "Improper file permissions in the CommandPost, Collector, and Sensor components of Fidelis Network and Deception enables an attacker with local, administrative access to the CLI to modify affected script files, which could result in arbitrary commands being run as root upon subsequent logon by a root user. The vulnerability is present in Fidelis Network and Deception versions prior to 9.4.5. Patches and updates are available to address this vulnerability.", "https://github.com/ARPSyndicate/cvemon https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/henryreed/CVE-2022-0997 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-2892", "Measuresoft ScadaPro Server (Versions prior to 6.8.0.1) uses an unmaintained ActiveX control, which may allow an out-of-bounds write condition while processing a specific project file.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-31586", "The unizar-30226-2019-06/ChangePop-Back repository through 2019-06-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.", "No PoCs found on GitHub currently.", "https://github.com/github/securitylab/issues/669#issuecomment-1117265726"], ["2022", "CVE-2022-42171", "Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/saveParentControlInfo.", "https://github.com/ARPSyndicate/cvemon https://github.com/z1r00/IOT_Vul", "https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md"], ["2022", "CVE-2022-28870", "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails.", "https://github.com/KirtiRamchandani/KirtiRamchandani", "No PoCs from references."], ["2022", "CVE-2022-40074", "Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via /bin/httpd, setSchedWifi.", "No PoCs found on GitHub currently.", "https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3"], ["2022", "CVE-2022-22268", "Incorrect implementation of Knox Guard prior to SMR Jan-2022 Release 1 allows physically proximate attackers to temporary unlock the Knox Guard via Samsung DeX mode.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1"], ["2022", "CVE-2022-4801", "Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593"], ["2022", "CVE-2022-3162", "Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API group 2. Users have cluster-wide list or watch authorization on one of those custom resources. 3. The same users are not authorized to read another custom resource in the same API group.", "https://github.com/ARPSyndicate/cvemon https://github.com/noirfate/k8s_debug", "No PoCs from references."], ["2022", "CVE-2022-4702", "The Royal Elementor Addons plugin for WordPress is vulnerable to insufficient access control in the 'wpr_fix_royal_compatibility' AJAX action in versions up to, and including, 1.3.59. This allows any authenticated user, including those with subscriber-level permissions, to deactivate every plugin on the site unless it is part of an extremely limited hardcoded selection. This also switches the site to the 'royal-elementor-kit' theme, potentially resulting in availability issues.", "https://github.com/ARPSyndicate/cvemon", "No PoCs from references."], ["2022", "CVE-2022-38868", "SQL Injection vulnerability in Ehoney version 2.0.0 in models/protocol.go and models/images.go, allows attackers to execute arbitrary code.", "No PoCs found on GitHub currently.", "https://github.com/seccome/Ehoney/issues/59"], ["2022", "CVE-2022-25408", "Hospital Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the dpassword parameter at /admin-panel1.php.", "No PoCs found on GitHub currently.", "https://github.com/kishan0725/Hospital-Management-System/issues/22"], ["2022", "CVE-2022-21390", "Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Webservices Manager). Supported versions that are affected are 12.0.0.3 and 12.0.0.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. While the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-37987", "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability", "https://github.com/ARPSyndicate/cvemon https://github.com/star-sg/windows_patch_extractor", "No PoCs from references."], ["2022", "CVE-2022-32270", "In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).", "No PoCs found on GitHub currently.", "https://github.com/Edubr2020/RP_Import_RCE https://youtu.be/CONlijEgDLc"], ["2022", "CVE-2022-45711", "IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the hostname parameter in the formSetNetCheckTools function.", "No PoCs found on GitHub currently.", "https://hackmd.io/dLM8vDnwQOup8mmDbHJRHQ?both"], ["2022", "CVE-2022-45480", "PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "No PoCs found on GitHub currently.", "https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/"], ["2022", "CVE-2022-28773", "Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the application may crash, leading to denial of service, but can be restarted automatically.", "https://github.com/karimhabush/cyberowl", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-39407", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.58, 8.59 and 8.60. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpuoct2022.html"], ["2022", "CVE-2022-24927", "Improper privilege management vulnerability in Samsung Video Player prior to version 7.3.15.30 allows attackers to execute video files without permission.", "https://github.com/ARPSyndicate/cvemon https://github.com/heegong/CVE-2022-24924", "No PoCs from references."], ["2022", "CVE-2022-45651", "Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the formSetVirtualSer function.", "No PoCs found on GitHub currently.", "https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md"], ["2022", "CVE-2022-38928", "XPDF 4.04 is vulnerable to Null Pointer Dereference in FoFiType1C.cc:2393.", "No PoCs found on GitHub currently.", "https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421"], ["2022", "CVE-2022-25548", "Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the serverName parameter.", "No PoCs found on GitHub currently.", "https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/5"], ["2022", "CVE-2022-41258", "Due to insufficient input validation, SAP Financial Consolidation - version 1010, allows an authenticated attacker to inject malicious script when running a common query in the Web Administration Console. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality, integrity and availability of the application.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-1036", "Able to create an account with long password leads to memory corruption / Integer Overflow in GitHub repository microweber/microweber prior to 1.2.12.", "https://github.com/Nithisssh/CVE-2022-1036 https://github.com/nomi-sec/PoC-in-GitHub", "No PoCs from references."], ["2022", "CVE-2022-3133", "OS Command Injection in GitHub repository jgraph/drawio prior to 20.3.0.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/2d93052f-efc6-4647-9a6d-8b08dc251223"], ["2022", "CVE-2022-4850", "Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.9.1.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346"], ["2022", "CVE-2022-42120", "A SQL injection vulnerability in the Fragment module in Liferay Portal 7.3.3 through 7.4.3.16, and Liferay DXP 7.3 before update 4, and 7.4 before update 17 allows attackers to execute arbitrary SQL commands via a PortletPreferences' `namespace` attribute.", "No PoCs found on GitHub currently.", "https://issues.liferay.com/browse/LPE-17513"], ["2022", "CVE-2022-24735", "Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures that prevent a script from creating side effects that persist and can affect the execution of the same, or different script, at a later time. Several weaknesses of these measures have been publicly known for a long time, but they had no security impact as the Redis security model did not endorse the concept of users or privileges. With the introduction of ACLs in Redis 6.0, these weaknesses can be exploited by a less privileged users to inject Lua code that will execute at a later time, when a privileged user executes a Lua script. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.", "https://github.com/ARPSyndicate/cvemon", "https://www.oracle.com/security-alerts/cpujul2022.html"], ["2022", "CVE-2022-24836", "Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `>= 1.13.4`. There are no known workarounds for this issue.", "https://github.com/fkie-cad/nvd-json-data-feeds", "http://seclists.org/fulldisclosure/2022/Dec/23"], ["2022", "CVE-2022-32221", "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.", "https://github.com/ARPSyndicate/cvemon https://github.com/SaintsConnor/Exploits https://github.com/a23au/awe-base-images https://github.com/stkcat/awe-base-images", "http://seclists.org/fulldisclosure/2023/Jan/19"], ["2022", "CVE-2022-28722", "Certain HP Print Products are potentially vulnerable to Buffer Overflow.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-4753", "The Print-O-Matic WordPress plugin before 2.1.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126"], ["2022", "CVE-2022-25459", "Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the S1 parameter in the SetSysTimeCfg function.", "No PoCs found on GitHub currently.", "https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/15"], ["2022", "CVE-2022-4613", "A vulnerability was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome and classified as critical. This issue affects some unknown processing of the component Browser Extension Provisioning. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216275.", "No PoCs found on GitHub currently.", "https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html https://vuldb.com/?id.216275"], ["2022", "CVE-2022-41198", "Due to lack of proper memory management, when a victim opens a manipulated SketchUp (.skp, SketchUp.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-41209", "SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses encryption method which lacks proper diffusion and does not hide the patterns well. This can lead to information disclosure. In certain scenarios, application might also be susceptible to replay attacks.", "No PoCs found on GitHub currently.", "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"], ["2022", "CVE-2022-30264", "The Emerson ROC and FloBoss RTU product lines through 2022-05-02 perform insecure filesystem operations. They utilize the ROC protocol (4000/TCP, 5000/TCP) for communications between a master terminal and RTUs. Opcode 203 of this protocol allows a master terminal to transfer files to and from the flash filesystem and carrying out arbitrary file and directory read, write, and delete operations.", "https://github.com/karimhabush/cyberowl", "https://www.forescout.com/blog/"], ["2022", "CVE-2022-21281", "Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2, 20.0.0.0 and 20.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Portfolio Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-26873", "A potential attacker can execute an arbitrary code at the time of the PEI phase and influence the subsequent boot stages. This can lead to the mitigations bypassing, physical memory contents disclosure, discovery of any secrets from any Virtual Machines (VMs) and bypassing memory isolation and confidential computing boundaries. Additionally, an attacker can build a payload which can be injected into the SMRAM memory. This issue affects: Module name: PlatformInitAdvancedPreMem SHA256: 644044fdb8daea30a7820e0f5f88dbf5cd460af72fbf70418e9d2e47efed8d9b Module GUID: EEEE611D-F78F-4FB9-B868-55907F169280 This issue affects: AMI Aptio 5.x.", "No PoCs found on GitHub currently.", "https://www.binarly.io/advisories/BRLY-2022-027"], ["2022", "CVE-2022-24976", "Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.", "No PoCs found on GitHub currently.", "https://www.openwall.com/lists/oss-security/2022/01/30/4"], ["2022", "CVE-2022-45600", "Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.", "https://github.com/ARPSyndicate/cvemon https://github.com/ethancunt/CVE-2022-45600 https://github.com/nomi-sec/PoC-in-GitHub", "https://github.com/ethancunt/CVE-2022-45600"], ["2022", "CVE-2022-28961", "Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.", "No PoCs found on GitHub currently.", "https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/"], ["2022", "CVE-2022-42060", "Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setWanPpoe function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.", "No PoCs found on GitHub currently.", "https://boschko.ca/tenda_ac1200_router https://boschko.ca/tenda_ac1200_router/"], ["2022", "CVE-2022-35501", "Stored Cross-site Scripting (XSS) exists in the Amasty Blog Pro 2.10.3 and 2.10.4 plugin for Magento 2 because of the duplicate post function.", "https://github.com/afine-com/CVE-2022-35501 https://github.com/afine-com/research https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC", "No PoCs from references."], ["2022", "CVE-2022-24675", "encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.", "https://github.com/ARPSyndicate/cvemon https://github.com/MrKsey/AdGuardHome https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/henriquebesing/container-security https://github.com/jfrog/jfrog-CVE-2022-24675 https://github.com/k0mi-tg/CVE-POC https://github.com/kb5fls/container-security https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/ruzickap/malware-cryptominer-container https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-1176", "Loose comparison causes IDOR on multiple endpoints in GitHub repository livehelperchat/livehelperchat prior to 3.96.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3"], ["2022", "CVE-2022-31108", "Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can exfiltrate the contents of an input field by bruteforcing the `value` attribute one character at a time. Whenever there is an actual match, an `http` request will be made by the browser in order to \"load\" a background image that will let an attacker know what's the value of the character. This issue may lead to `Information Disclosure` via CSS selectors and functions able to generate HTTP requests. This also allows an attacker to change the document in ways which may lead a user to perform unintended actions, such as clicking on a link, etc. This issue has been resolved in version 9.1.3. Users are advised to upgrade. Users unable to upgrade should ensure that user input is adequately escaped before embedding it in CSS blocks.", "No PoCs found on GitHub currently.", "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf"], ["2022", "CVE-2022-31299", "Haraj v3.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the User Upgrade Form.", "https://github.com/ARPSyndicate/cvemon https://github.com/ARPSyndicate/kenzer-templates https://github.com/ColordStudio/CVE https://github.com/NaInSec/CVE-PoC-in-GitHub https://github.com/SYRTI/POC_to_review https://github.com/WhooAmii/POC_to_review https://github.com/bigzooooz/CVE-2022-31299 https://github.com/k0mi-tg/CVE-POC https://github.com/manas3c/CVE-POC https://github.com/nomi-sec/PoC-in-GitHub https://github.com/trhacknon/Pocingit https://github.com/whoforget/CVE-POC https://github.com/youwizard/CVE-POC https://github.com/zecool/cve", "No PoCs from references."], ["2022", "CVE-2022-4431", "The WOOCS WordPress plugin before 1.3.9.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932"], ["2022", "CVE-2022-21332", "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28440", "An arbitrary file upload vulnerability in UCMS v1.6 allows attackers to execute arbitrary code via a crafted PHP file.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "No PoCs from references."], ["2022", "CVE-2022-39837", "An issue was discovered in Connected Vehicle Systems Alliance (COVESA) dlt-daemon through 2.18.8. Due to a faulty DLT file parser, a crafted DLT file that crashes the process can be created. This is due to missing validation checks. There is a NULL pointer dereference,", "No PoCs found on GitHub currently.", "https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/ https://seclists.org/fulldisclosure/2022/Sep/24"], ["2022", "CVE-2022-40347", "SQL Injection vulnerability in Intern Record System version 1.0 in /intern/controller.php in 'phone', 'email', 'deptType' and 'name' parameters, allows attackers to execute arbitrary code and gain sensitive information.", "https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated https://github.com/h4md153v63n/CVEs https://github.com/h4md153v63n/h4md153v63n https://github.com/nomi-sec/PoC-in-GitHub", "http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated"], ["2022", "CVE-2022-1354", "A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.", "No PoCs found on GitHub currently.", "https://gitlab.com/libtiff/libtiff/-/issues/319"], ["2022", "CVE-2022-3251", "Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/minarca prior to 4.2.2.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/b9a1b411-060b-4235-9426-e39bd0a1d6d9"], ["2022", "CVE-2022-38458", "A cleartext transmission vulnerability exists in the Remote Management functionality of Netgear Orbi Router RBR750 4.6.8.5. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information.", "No PoCs found on GitHub currently.", "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598"], ["2022", "CVE-2022-1185", "A denial of service vulnerability when rendering RDoc files in GitLab CE/EE versions 10 to 14.7.7, 14.8.0 to 14.8.5, and 14.9.0 to 14.9.2 allows an attacker to crash the GitLab web application with a maliciously crafted RDoc file", "No PoCs found on GitHub currently.", "https://gitlab.com/gitlab-org/gitlab/-/issues/349148"], ["2022", "CVE-2022-3080", "By sending specific queries to the resolver, an attacker can cause named to crash.", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-38689", "In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.", "https://github.com/ARPSyndicate/cvemon https://github.com/pokerfacett/MY_CVE_CREDIT", "No PoCs from references."], ["2022", "CVE-2022-25978", "All versions of the package github.com/usememos/memos/server are vulnerable to Cross-site Scripting (XSS) due to insufficient checks on external resources, which allows malicious actors to introduce links starting with a javascript: scheme.", "No PoCs found on GitHub currently.", "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070"], ["2022", "CVE-2022-28992", "A Cross-Site Request Forgery (CSRF) in Online Banquet Booking System v1.0 allows attackers to change admin credentials via a crafted POST request.", "No PoCs found on GitHub currently.", "https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html"], ["2022", "CVE-2022-21272", "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).", "No PoCs found on GitHub currently.", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-0178", "Missing Authorization vulnerability in snipe snipe/snipe-it.This issue affects snipe/snipe-i before 5.3.8.", "No PoCs found on GitHub currently.", "https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368"], ["2022", "CVE-2022-45562", "Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.", "No PoCs found on GitHub currently.", "https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562"], ["2022", "CVE-2022-23377", "Archeevo below 5.0 is affected by local file inclusion through file=~/web.config to allow an attacker to retrieve local files.", "No PoCs found on GitHub currently.", "https://www.exploit-db.com/exploits/50665"], ["2022", "CVE-2022-32392", "Prison Management System v1.0 was discovered to contain a SQL injection vulnerability via the 'id' parameter at /pms/admin/actions/manage_action.php:4", "https://github.com/ARPSyndicate/cvemon https://github.com/Dyrandy/BugBounty", "https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32392.md"], ["2022", "CVE-2022-35960", "TensorFlow is an open source platform for machine learning. In `core/kernels/list_kernels.cc's TensorListReserve`, `num_elements` is assumed to be a tensor of size 1. When a `num_elements` of more than 1 element is provided, then `tf.raw_ops.TensorListReserve` fails the `CHECK_EQ` in `CheckIsAlignedAndSingleElement`. We have patched the issue in GitHub commit b5f6fbfba76576202b72119897561e3bd4f179c7. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.", "https://github.com/ARPSyndicate/cvemon https://github.com/skipfuzz/skipfuzz", "No PoCs from references."], ["2022", "CVE-2022-48588", "A SQL injection vulnerability exists in the \u201cschedule editor decoupled\u201d feature of the ScienceLogic SL1 that takes unsanitized user\u2010controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.", "No PoCs found on GitHub currently.", "https://www.securifera.com/advisories/cve-2022-48588/"], ["2022", "CVE-2022-48619", "An issue was discovered in drivers/input/input.c in the Linux kernel before 5.17.10. An attacker can cause a denial of service (panic) because input_set_capability mishandles the situation in which an event code falls outside of a bitmap.", "No PoCs found on GitHub currently.", "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10"], ["2022", "CVE-2022-4571", "The Seriously Simple Podcasting WordPress plugin before 2.19.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00"], ["2022", "CVE-2022-26991", "Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ntp function via the TimeZone parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "https://github.com/ARPSyndicate/cvemon https://github.com/pjqwudi/my_vuln", "No PoCs from references."], ["2022", "CVE-2022-21363", "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).", "https://github.com/hinat0y/Dataset1 https://github.com/hinat0y/Dataset10 https://github.com/hinat0y/Dataset11 https://github.com/hinat0y/Dataset12 https://github.com/hinat0y/Dataset2 https://github.com/hinat0y/Dataset3 https://github.com/hinat0y/Dataset4 https://github.com/hinat0y/Dataset5 https://github.com/hinat0y/Dataset6 https://github.com/hinat0y/Dataset7 https://github.com/hinat0y/Dataset8 https://github.com/hinat0y/Dataset9", "https://www.oracle.com/security-alerts/cpujan2022.html"], ["2022", "CVE-2022-28411", "Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/admin/?page=agents/manage_agent.", "https://github.com/ARPSyndicate/cvemon https://github.com/debug601/bug_report https://github.com/k0xx11/bug_report", "https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md"], ["2022", "CVE-2022-28780", "Improper access control vulnerability in Weather prior to SMR May-2022 Release 1 allows that attackers can access location information that set in Weather without permission. The patch adds proper protection to prevent access to location information.", "No PoCs found on GitHub currently.", "https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5"], ["2022", "CVE-2022-4460", "The Sidebar Widgets by CodeLights WordPress plugin through 1.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks, which could be used against high-privilege users such as admins.", "https://github.com/ARPSyndicate/cvemon", "https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc"], ["2022", "CVE-2022-1094", "The amr users WordPress plugin before 4.59.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed", "No PoCs found on GitHub currently.", "https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329"], ["2022", "CVE-2022-3200", "Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "https://github.com/karimhabush/cyberowl", "No PoCs from references."], ["2022", "CVE-2022-25869", "All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of |