CVE-2022-34749
- EPSS 0.49%
- Veröffentlicht 25.07.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 07:10:06
In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.
CVE-2022-35649
- EPSS 6.5%
- Veröffentlicht 25.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:26
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exp...
CVE-2022-35650
- EPSS 1.71%
- Veröffentlicht 25.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:26
The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal...
CVE-2022-35651
- EPSS 0.35%
- Veröffentlicht 25.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:26
A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary H...
CVE-2022-35652
- EPSS 0.35%
- Veröffentlicht 25.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:26
An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitr...
CVE-2022-35653
- EPSS 82.29%
- Veröffentlicht 25.07.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:26
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute...
CVE-2020-7677
- EPSS 0.2%
- Veröffentlicht 25.07.2022 14:15:10
- Zuletzt bearbeitet 21.11.2024 05:37:35
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
CVE-2022-0670
- EPSS 0.17%
- Veröffentlicht 25.07.2022 14:15:10
- Zuletzt bearbeitet 21.11.2024 06:39:09
A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker...
CVE-2021-46829
- EPSS 0.48%
- Veröffentlicht 24.07.2022 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:34:46
GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code exe...
CVE-2022-31160
- EPSS 10.94%
- Veröffentlicht 20.07.2022 20:15:08
- Zuletzt bearbeitet 21.11.2024 07:04:01
jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed with...