
CVE-2022-30808
https://notcve.org/view.php?id=CVE-2022-30808
31 May 2022 — elitecms 1.0.1 is vulnerable to Arbitrary code execution via admin/manage_uploads.php. elitecms versión 1.0.1, es vulnerable a la ejecución de código arbitrario por medio del archivo admin/manage_uploads.php • https://github.com/k0xx11/bug_report/blob/main/elitecms-1.01/RCE-1.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-23088 – 802.11 heap buffer overflow
https://notcve.org/view.php?id=CVE-2022-23088
31 May 2022 — The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame may overwrite kernel memory, leading to remote code execution. La rutina de manejo de balizas 802.11 no pudo validar la longitud de un ID de malla IEEE 802.11 antes de copiarlo en un búfer asignado en montón. Mientras un cliente Wi-Fi de FreeBSD está en modo de esc... • https://security.freebsd.org/advisories/FreeBSD-SA-22:07.wifi_meshid.asc • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-24581
https://notcve.org/view.php?id=CVE-2022-24581
27 May 2022 — ACEweb Online Portal 3.5.065 allows unauthenticated SMB hash capture via UNC. By specifying the UNC file path of an external SMB share when uploading a file, an attacker can induce the victim server to disclose the username and password hash of the user executing the ACEweb Online software. ACEweb Online Portal versión 3.5.065, permite una captura de hash SMB no autenticada por medio de UNC. Al especificar la ruta de archivo UNC de un recurso compartido SMB externo cuando es cargado un archivo, un atacante ... • http://aceware.com • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-24241
https://notcve.org/view.php?id=CVE-2022-24241
27 May 2022 — ACEweb Online Portal 3.5.065 was discovered to contain an External Controlled File Path and Name vulnerability via the txtFilePath parameter in attachments.awp. Se ha detectado que ACEweb Online Portal versión 3.5.065, contiene una vulnerabilidad de ruta y nombre de archivo externo controlado por medio del parámetro txtFilePath en el archivo attachments.awp • http://aceware.com • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVE-2022-24240
https://notcve.org/view.php?id=CVE-2022-24240
27 May 2022 — ACEweb Online Portal 3.5.065 was discovered to contain a SQL injection vulnerability via the criteria parameter in showschedule.awp. Se ha detectado que ACEweb Online Portal versión 3.5.065, contenía una vulnerabilidad de inyección SQL por medio del parámetro criteria en el archivo showschedule.awp • http://aceware.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-24239
https://notcve.org/view.php?id=CVE-2022-24239
27 May 2022 — ACEweb Online Portal 3.5.065 was discovered to contain an unrestricted file upload vulnerability via attachments.awp. Se ha detectado que ACEweb Online Portal versión 3.5.065, contiene una vulnerabilidad de carga de archivos sin restricciones por medio del archivo attachments.awp • http://aceware.com • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-24238
https://notcve.org/view.php?id=CVE-2022-24238
27 May 2022 — ACEweb Online Portal 3.5.065 was discovered to contain a cross-site scripting (XSS) vulnerability via the txtNmName1 parameter in person.awp. Se ha detectado que ACEweb Online Portal versión 3.5.065, contiene una vulnerabilidad de tipo cross-site scripting (XSS) por medio del parámetro txtNmName1 en el archivo person.awp • http://aceware.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-30423
https://notcve.org/view.php?id=CVE-2022-30423
27 May 2022 — Merchandise Online Store v1.0 by oretnom23 has an arbitrary code execution (RCE) vulnerability in the user profile upload point in the system information. • https://github.com/ffYYy6x0y1/bug_report/blob/main/vendors/oretnom23/merchandise-online-store/RCE-1.md • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-26691 – cups: authorization bypass when using "local" authorization
https://notcve.org/view.php?id=CVE-2022-26691
26 May 2022 — This flaw allows an attacker to authenticate to CUPS as root/admin without the 32-byte secret key and perform arbitrary code execution. • https://github.com/OpenPrinting/cups/commit/de4f8c196106033e4c372dce3e91b9d42b0b9444 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-697: Incorrect Comparison •

CVE-2022-24418
https://notcve.org/view.php?id=CVE-2022-24418
26 May 2022 — A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM. • https://www.dell.com/support/kbdoc/en-us/000199285/dsa-2022-095 • CWE-20: Improper Input Validation •