Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Khorasan Razavi, Iran

0

سبد خرید

high level and critical vulnerability(13-15 December)

high level and critical vulnerability(13-15 December)

CVE-2022-2536

Description

The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient validation of settings on the ‘tp_translation’ AJAX action which makes it possible for unauthenticated attackers to bypass any restrictions and influence the data shown on the site. Please note this is a separate issue from CVE-2022-2461. Notes from the researcher: When installed Transposh comes with a set of pre-configured options, one of these is the “Who can translate” setting under the “Settings” tab. However, this option is largely ignored, if Transposh has enabled its “autotranslate” feature (it’s enabled by default) and the HTTP POST parameter “sr0” is larger than 0. This is caused by a faulty validation in “wp/transposh_db.php.”

 Base Score: 7.5 HIGH

https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536

____________________________________________

CVE-2022-31702

Description

vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.

Base Score: 9.8 CRITICAL

https://www.vmware.com/security/advisories/VMSA-2022-0031.html

_______________________________________

CVE-2022-31700

Description

VMware Workspace ONE Access and Identity Manager contain an authenticated remote code execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.

Base Score: 7.2 HIGH

https://www.vmware.com/security/advisories/VMSA-2022-0032.html

_____________________________________________

CVE-2022-31705

Description

VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Base Score: 8.2 HIGH

https://www.vmware.com/security/advisories/VMSA-2022-0033.html

____________________________________________

CVE-2022-31703

Description

vRealize Network Insight (vRNI) directory traversal vulnerability in vRNI REST API. A malicious actor with network access to the vRNI REST API can read arbitrary files from the server.

Base Score: 7.5 HIGH

https://www.vmware.com/security/advisories/VMSA-2022-0031.html

___________________________________________

CVE-2022-46609

Description

Python3-RESTfulAPI commit d9907f14e9e25dcdb54f5b22252b0e9452e3970e and e772e0beee284c50946e94c54a1d43071ca78b74 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.

Base Score: 9.8 CRITICAL

https://github.com/herry-zhang/Python3-RESTfulAPI/_

_______________________________________

CVE-2022-44832

Description

D-Link DIR-3040 device with firmware 120B03 was discovered to contain a command injection vulnerability via the SetTriggerLEDBlink function.

Base Score: 9.8 CRITICAL

https://www.dlink.com/en/security-bulletin/

__________________________________________-

CVE-2022-34271

Description

A vulnerability in import module of Apache Atlas allows an authenticated user to write to web server filesystem. This issue affects Apache Atlas versions from 0.8.4 to 2.2.0.

Base Score: 8.8 HIGH

https://lists.apache.org/thread/0rqvcxo6brmos9w3lzfsdn2lsmlblpw3

_____________________________________

CVE-2022-4440

Description

Use after free in Profiles in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

Base Score: 8.8 HIGH

https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html

________________________

sourse:

https://nvd.nist.gov/vuln/detail/CVE-2021-3466

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3466

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

© All rights reserved to APA Specialized Center of Ferdowsi University of Mashhad