Search Results (Refine Search)
| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2022-30791 |
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected. Published: July 11, 2022; 7:15:08 AM -0400 |
V4.0:(not available) V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2022-2302 |
Multiple Lenze products of the cabinet series skip the password verification upon second login. After a user has been logged on to the device once, a remote attacker can get full access without knowledge of the password. Published: July 11, 2022; 7:15:08 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0: 9.3 HIGH |
| CVE-2022-1794 |
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system. Published: July 11, 2022; 7:15:08 AM -0400 |
V4.0:(not available) V3.x:(not available) V2.0: 4.7 MEDIUM |
| CVE-2022-2368 |
Authentication Bypass by Spoofing in GitHub repository microweber/microweber prior to 1.2.20. Published: July 11, 2022; 4:15:07 AM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0: 7.5 HIGH |
| CVE-2022-35416 |
H3C SSL VPN through 2022-07-10 allows wnm/login/login.json svpnlang cookie XSS. Published: July 10, 2022; 11:15:07 PM -0400 |
V4.0:(not available) V3.1: 6.1 MEDIUM V2.0: 4.3 MEDIUM |
| CVE-2022-32294 |
Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced. Published: July 10, 2022; 11:15:07 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0: 7.5 HIGH |
| CVE-2022-35414 |
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time. Published: July 10, 2022; 10:15:07 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0: 6.1 MEDIUM |
| CVE-2022-31588 |
The zippies/testplatform repository through 2016-07-19 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31587 |
The yuriyouzhou/KG-fashion-chatbot repository through 2018-05-22 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31586 |
The unizar-30226-2019-06/ChangePop-Back repository through 2019-06-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31585 |
The umeshpatil-dev/Home__internet repository through 2020-08-28 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31584 |
The stonethree/s3label repository through 2019-08-14 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31583 |
The sravaniboinepelli/AutomatedQuizEval repository through 2020-04-27 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31582 |
The shaolo1/VideoServer repository through 2019-09-21 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31581 |
The scorelab/OpenMF repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31580 |
The sanojtharindu/caretakerr-api repository through 2021-05-17 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31579 |
The ralphjzhang/iasset repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31578 |
The piaoyunsoft/bt_lnmp repository through 2019-10-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
| CVE-2022-31577 |
The longmaoteamtf/audio_aligner_app repository through 2020-01-10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |
| CVE-2022-31576 |
The heidi-luong1109/shackerpanel repository through 2021-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. Published: July 10, 2022; 9:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.3 CRITICAL V2.0: 6.4 MEDIUM |