Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In September 2022
A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege escalation or remote code execution.
CVSS Score
8.8
EPSS Score
0.21
Published
2022-09-30
Insufficient sanitization of inputs in QoE application input field could lead to stored and Dom based XSS attack. This issue is fixed and released in SolarWinds Platform (2022.3.0).
CVSS Score
6.1
EPSS Score
0.009
Published
2022-09-30
Gridea version 0.9.3 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Gridea. This is possible because the application has the 'nodeIntegration' option enabled.
CVSS Score
7.8
EPSS Score
0.0
Published
2022-09-30
Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-09-30
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
CVSS Score
7.1
EPSS Score
0.004
Published
2022-09-30
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.
CVSS Score
9.8
EPSS Score
0.106
Published
2022-09-30
A limited SQL injection risk was identified in the "browse list of users" site administration page.
CVSS Score
9.8
EPSS Score
0.004
Published
2022-09-30
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
CVSS Score
4.3
EPSS Score
0.002
Published
2022-09-30
AppLock version 7.9.29 allows an attacker with physical access to the device to bypass biometric authentication. This is possible because the application did not correctly implement fingerprint validations.
CVSS Score
6.6
EPSS Score
0.0
Published
2022-09-30
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
CVSS Score
5.4
EPSS Score
0.344
Published
2022-09-30


Contact Us

Shodan ® - All rights reserved