CVE-2022-37796
In Simple Online Book Store System 1.0 in /admin_book.php the Title, Author, and Description parameters are vulnerable to Cross Site Scripting(XSS).
Source: CVE-2022-37796
CVE-2022-37796
In Simple Online Book Store System 1.0 in /admin_book.php the Title, Author, and Description parameters are vulnerable to Cross Site Scripting(XSS).
Source: CVE-2022-37796
CVE-2022-37794
In Library Management System 1.0 the /card/in-card.php file id_no parameters are vulnerable to SQL injection.
Source: CVE-2022-37794
CVE-2022-40325
SysAid Help Desk before 22.1.65 allows XSS via the Asset Dashboard, aka FR# 67262.
Source: CVE-2022-40325
CVE-2022-40324
SysAid Help Desk before 22.1.65 allows XSS via the Linked SRs field, aka FR# 67258.
Source: CVE-2022-40324
CVE-2022-40322
SysAid Help Desk before 22.1.65 allows XSS, aka FR# 66542 and 65579.
Source: CVE-2022-40322
CVE-2022-40323
SysAid Help Desk before 22.1.65 allows XSS in the Password Services module, aka FR# 67241.
Source: CVE-2022-40323
CVE-2022-25295
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \example.com, browser will redirect user to http://example.com.
Source: CVE-2022-25295
CVE-2022-26049
This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution on a target system by exploiting this vulnerability. **Note:** This could have allowed a malicious zip file to extract itself into an arbitrary directory. The only file that Goomph extracts is the p2 bootstrapper and eclipse metadata files hosted at eclipse.org, which are not malicious, so the only way this vulnerability could have affected you is if you had set a custom bootstrap zip, and that zip was malicious.
Source: CVE-2022-26049
CVE-2022-39135
In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, which makes them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators.
Source: CVE-2022-39135
CVE-2022-38266
An issue in the Leptonica linked library (v1.79.0) in Tesseract v5.0.0 allows attackers to cause an arithmetic exception leading to a Denial of Service (DoS) via a crafted JPEG file.
Source: CVE-2022-38266