Search Results (324593 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-41842 1 Xpdfreader 1 Xpdf 2025-05-20 5.5 Medium
An issue was discovered in Xpdf 4.04. There is a crash in gfseek(_IO_FILE*, long, int) in goo/gfile.cc.
CVE-2022-41841 1 Axiosys 1 Bento4 2025-05-20 5.5 Medium
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.
CVE-2022-41828 1 Amazon 1 Amazon Web Services Redshift Java Database Connectivity Driver 2025-05-20 8.8 High
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.
CVE-2022-41440 1 Billing System Project Project 1 Billing System Project 2025-05-20 7.2 High
Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /phpinventory/editcategory.php.
CVE-2022-41439 1 Billing System Project Project 1 Billing System Project 2025-05-20 7.2 High
Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /phpinventory/edituser.php.
CVE-2022-41437 1 Billing System Project Project 1 Billing System Project 2025-05-20 7.2 High
Billing System Project v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /php_action/createProduct.php.
CVE-2022-40887 1 Best Student Result Management System Project 1 Best Student Result Management System 2025-05-20 9.8 Critical
SourceCodester Best Student Result Management System 1.0 is vulnerable to SQL Injection.
CVE-2022-40879 1 Keking 1 Kkfileview 2025-05-20 6.1 Medium
kkFileView v4.1.0 is vulnerable to Cross Site Scripting (XSS) via the parameter 'errorMsg.'
CVE-2022-40472 1 Zktec 1 Zkbio Time 2025-05-20 8 High
ZKTeco Xiamen Information Technology ZKBio Time 8.0.7 Build: 20220721.14829 was discovered to contain a CSV injection vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload injected into the Content text field of the Add New Message module.
CVE-2022-40407 1 Chamilo 1 Chamilo 2025-05-20 8.8 High
A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file.
CVE-2022-40048 1 Flatpress 1 Flatpress 2025-05-20 7.2 High
Flatpress v1.2.1 was discovered to contain a remote code execution (RCE) vulnerability in the Upload File function.
CVE-2022-3287 2 Fwupd, Redhat 3 Fwupd, Enterprise Linux, Rhel Eus 2025-05-20 6.5 Medium
When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
CVE-2022-3215 1 Apple 1 Swiftnio 2025-05-20 7.5 High
NIOHTTP1 and projects using it for generating HTTP responses can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines to their input (usually in encoded form) and "inject" those newlines into the returned HTTP response. This capability allows users to work around security headers and HTTP/1.1 framing headers by injecting entirely false responses or other new headers. The injected false responses may also be treated as the response to subsequent requests, which can lead to XSS, cache poisoning, and a number of other flaws. This issue was resolved by adding validation to the HTTPHeaders type, ensuring that there's no whitespace incorrectly present in the HTTP headers provided by users. As the existing API surface is non-failable, all invalid characters are replaced by linear whitespace.
CVE-2022-39173 1 Wolfssl 1 Wolfssl 2025-05-20 7.5 High
In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes a previous TLS session. During the resumption Client Hello a Hello Retry Request must be triggered. Both Client Hellos are required to contain a list of duplicate cipher suites to trigger the buffer overflow. In total, two Client Hellos have to be sent: one in the resumed session, and a second one as a response to a Hello Retry Request message.
CVE-2022-37461 1 Canon 1 Medical Vitrea View 2025-05-20 6.1 Medium
Multiple cross-site scripting (XSS) vulnerabilities in Canon Medical Vitrea View 7.x before 7.7.6 allow remote attackers to inject arbitrary web script or HTML via (1) the input after the error subdirectory to the /vitrea-view/error/ subdirectory, or the (2) groupID, (3) offset, or (4) limit parameter to an Administrative Panel (Group and Users) page. There is a risk of an attacker retrieving patient information.
CVE-2022-35888 1 Amperecomputing 6 Ampere Altra, Ampere Altra Firmware, Ampere Altra Max and 3 more 2025-05-20 6.5 Medium
Ampere Altra and Ampere Altra Max devices through 2022-07-15 allow attacks via Hertzbleed, which is a power side-channel attack that extracts secret information from the CPU by correlating the power consumption with data being processed on the system.
CVE-2022-35137 1 Dgiotcloud 1 Dgiot 2025-05-20 5.4 Medium
DGIOT Lightweight industrial IoT v4.5.4 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities.
CVE-2022-33880 1 Hospital Management System Mini-project Project 1 Hospital Management System Mini-project 2025-05-20 9.8 Critical
hms-staff.php in Projectworlds Hospital Management System Mini-Project through 2018-06-17 allows SQL injection via the type parameter.
CVE-2019-5797 2 Google, Redhat 2 Chrome, Rhel Extras 2025-05-20 7.5 High
Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-34442 1 Dell 1 Policy Manager For Secure Connect Gateway 2025-05-20 8 High
Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability.  An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain LDAP user privileges.