WAFPlanet

CVE Database - 2022

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

10838
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2022-24118

CRITICAL
9.10 CVSS 3.1

Certain General Electric Renewable Energy products allow attackers to use a code to trigger a reboot into the factory default configuration. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2021-45467

CRITICAL
9.80 CVSS 3.1

In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.

Missing Authorization
WAF: Low

CVE-2021-45466

CRITICAL
9.80 CVSS 3.1

In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, attackers can make a crafted request to api/?api=add_server&DHCP= to add an authorized_keys text file in the /resources/ folder.

Incorrect Authorization
WAF: Low

CVE-2021-44855

MEDIUM
5.40 CVSS 3.1

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-37310

MEDIUM
6.10 CVSS 3.1

OX App Suite through 7.10.6 allows XSS via a malicious capability to the metrics or help module, as demonstrated by a /#!!&app=io.ox/files&cap= URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-37309

MEDIUM
6.10 CVSS 3.1

OX App Suite through 7.10.6 allows XSS via script code within a contact that has an e-mail address but lacks a name.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-29853

MEDIUM
5.40 CVSS 3.1

OX App Suite through 8.2 allows XSS via a certain complex hierarchy that forces use of Show Entire Message for a huge HTML e-mail message.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-29852

MEDIUM
5.40 CVSS 3.1

OX App Suite through 8.2 allows XSS because BMFreehand10 and image/x-freehand are not blocked.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-37308

MEDIUM
6.10 CVSS 3.1

OX App Suite through 7.10.6 allows XSS via HTML in text/plain e-mail messages.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-37313

MEDIUM
5.30 CVSS 3.1

OX App Suite through 7.10.6 allows SSRF because the anti-SSRF protection mechanism only checks the first DNS AA or AAAA record.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2022-37307

MEDIUM
6.10 CVSS 3.1

OX App Suite through 7.10.6 allows XSS via XHTML CDATA for a snippet, as demonstrated by the onerror attribute of an IMG element within an e-mail signature.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-31469

MEDIUM
6.10 CVSS 3.1

OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class="deep-link-app" for a /#!!&app=%2e./ URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-4740

MEDIUM
6.10 CVSS 3.1

A vulnerability, which was classified as problematic, has been found in kkFileView. Affected by this issue is the function setWatermarkAttribute of the file /picturesPreview. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216776.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-4739

CRITICAL
9.80 CVSS 3.1

A vulnerability classified as critical was found in SourceCodester School Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216775.

SQL Injection
WAF: High

CVE-2022-4738

MEDIUM
6.10 CVSS 3.1

A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-4737

CRITICAL
9.80 CVSS 3.1

A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability.

SQL Injection
WAF: High

CVE-2022-4736

MEDIUM
6.10 CVSS 3.1

A vulnerability was found in Venganzas del Pasado and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument the_title leads to cross site scripting. The attack may be launched remotely. The name of the patch is 62339b2ec445692c710b804bdf07aef4bd247ff7. It is recommended to apply a patch to fix this issue. VDB-216770 is the identifier assigned to this vulnerability.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-36631

CRITICAL
9.80 CVSS 3.1

A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772.

SQL Injection
WAF: High

CVE-2020-36630

CRITICAL
9.80 CVSS 3.1

A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771.

SQL Injection
WAF: High

CVE-2022-40005

HIGH
8.80 CVSS 3.1

Intelbras WiFiber 120AC inMesh before 1-1-220826 allows command injection by authenticated users, as demonstrated by the /boaform/formPing6 and /boaform/formTracert URIs for ping and traceroute.

OS Command Injection
WAF: High

CVE-2022-37706

HIGH
7.80 CVSS 3.1

enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain privileges because it is setuid root, and the system library function mishandles pathnames that begin with a /dev/.. substring.

Improper Privilege Management
WAF: Low

CVE-2019-25084

MEDIUM
6.10 CVSS 3.1

A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-4735

MEDIUM
6.10 CVSS 3.1

A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. It is recommended to apply a patch to fix this issue. VDB-216766 is the identifier assigned to this vulnerability.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-4731

MEDIUM
5.40 CVSS 3.1

A vulnerability, which was classified as problematic, was found in myapnea up to 29.0.x. Affected is an unknown function of the component Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 29.1.0 is able to address this issue. The name of the patch is 99934258530d761bd5d09809bfa6c14b598f8d18. It is recommended to upgrade the affected component. VDB-216750 is the identifier assigned to this vulnerability.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-4276

HIGH
8.80 CVSS 3.1

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don’t believe this specific attack is possible without such a compromise of the Data Manager server.

SQL Injection
WAF: High

CVE-2020-36629

HIGH
7.50 CVSS 3.1

A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748.

Path Traversal
WAF: High

CVE-2020-36628

CRITICAL
9.80 CVSS 3.1

A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747.

Path Traversal
WAF: High

CVE-2020-36627

MEDIUM
6.10 CVSS 3.1

A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.

Open Redirect
WAF: Medium

CVE-2022-45896

CRITICAL
9.80 CVSS 3.1

Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution.

Unrestricted File Upload
WAF: Medium

CVE-2022-45894

MEDIUM
6.50 CVSS 3.1

GetFile.aspx in Planet eStream before 6.72.10.07 allows ..\ directory traversal to read arbitrary local files.

Path Traversal
WAF: High

CVE-2022-44380

MEDIUM
5.40 CVSS 3.1

Snipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-44016

HIGH
7.50 CVSS 3.1

An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '"ImagesPath":"C:\\"' value.

Path Traversal
WAF: High

CVE-2022-44015

CRITICAL
9.80 CVSS 3.1

An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure.

SQL Injection
WAF: High

CVE-2022-44012

MEDIUM
5.40 CVSS 3.1

An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-45892

MEDIUM
5.40 CVSS 3.1

In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-45891

CRITICAL
9.10 CVSS 3.1

Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList).

Incorrect Authorization
WAF: Low

CVE-2022-45890

MEDIUM
6.10 CVSS 3.1

In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter).

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-45889

HIGH
7.20 CVSS 3.1

Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter).

SQL Injection
WAF: High

CVE-2022-47934

MEDIUM
6.50 CVSS 3.1

Brave Browser before 1.43.88 allowed a remote attacker to cause a denial of service in private and guest windows via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This is caused by an incomplete fix for CVE-2022-47932 and CVE-2022-47934.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2022-47932

MEDIUM
6.50 CVSS 3.1

Brave Browser before 1.43.34 allowed a remote attacker to cause a denial of service via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This vulnerability is caused by an incomplete fix for CVE-2022-47933.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2022-43860

MEDIUM
4.30 CVSS 3.1

IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305.

SQL Injection
WAF: High

CVE-2022-47633

HIGH
8.10 CVSS 3.1

An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases.

Improper Authentication
WAF: Low

CVE-2022-40011

MEDIUM
6.10 CVSS 3.1

Typora through 1.3.8 allows XSS if a document containing an SVG element with an attacker-controlled onload attribute is exported and then used at a victim's origin.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-28229

HIGH
7.50 CVSS 3.1

The hash functionality in userver before 42059b6319661583b3080cab9b595d4f8ac48128 allows attackers to cause a denial of service via crafted HTTP request, involving collisions.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2022-47945

CRITICAL
9.80 CVSS 3.1

ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.

Path Traversal
WAF: High

CVE-2022-23854

HIGH
7.50 CVSS 3.1

AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server.

Path Traversal
WAF: High

CVE-2022-4692

MEDIUM
5.40 CVSS 3.1

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.

Cross-Site Scripting (XSS)
WAF: High

CVE-2022-43849

MEDIUM
6.20 CVSS 3.1

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX pfcdd kernel extension to cause a denial of service. IBM X-Force ID: 239170.

Improper Input Validation
WAF: Medium

CVE-2022-43848

MEDIUM
6.20 CVSS 3.1

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169.

Improper Input Validation
WAF: Medium

CVE-2022-41290

HIGH
8.40 CVSS 3.1

IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the rm_rlcache_file command to obtain root privileges. IBM X-Force ID: 236690.

Improper Privilege Management
WAF: Low
Page 4 of 217 (10838 CVEs)