CVE-2022-32320
17.07.2022, 17:15
A Cross-Site Request Forgery (CSRF) in Ferdi through 5.8.1 and Ferdium through 6.0.0-nightly.98 allows attackers to read files via an uploaded file such as a settings/preferences file.
Vendor | Product | Version |
---|---|---|
ferdium | ferdium | 6.0.0 |
ferdium | ferdium | 6.0.0:beta1 |
ferdium | ferdium | 6.0.0:beta2 |
ferdium | ferdium | 6.0.0:beta3 |
ferdium | ferdium | 6.0.0:nightly1 |
ferdium | ferdium | 6.0.0:nightly10 |
ferdium | ferdium | 6.0.0:nightly11 |
ferdium | ferdium | 6.0.0:nightly12 |
ferdium | ferdium | 6.0.0:nightly13 |
ferdium | ferdium | 6.0.0:nightly14 |
ferdium | ferdium | 6.0.0:nightly15 |
ferdium | ferdium | 6.0.0:nightly16 |
ferdium | ferdium | 6.0.0:nightly17 |
ferdium | ferdium | 6.0.0:nightly18 |
ferdium | ferdium | 6.0.0:nightly19 |
ferdium | ferdium | 6.0.0:nightly2 |
ferdium | ferdium | 6.0.0:nightly20 |
ferdium | ferdium | 6.0.0:nightly21 |
ferdium | ferdium | 6.0.0:nightly22 |
ferdium | ferdium | 6.0.0:nightly23 |
ferdium | ferdium | 6.0.0:nightly24 |
ferdium | ferdium | 6.0.0:nightly25 |
ferdium | ferdium | 6.0.0:nightly26 |
ferdium | ferdium | 6.0.0:nightly27 |
ferdium | ferdium | 6.0.0:nightly28 |
ferdium | ferdium | 6.0.0:nightly29 |
ferdium | ferdium | 6.0.0:nightly3 |
ferdium | ferdium | 6.0.0:nightly30 |
ferdium | ferdium | 6.0.0:nightly31 |
ferdium | ferdium | 6.0.0:nightly32 |
ferdium | ferdium | 6.0.0:nightly33 |
ferdium | ferdium | 6.0.0:nightly34 |
ferdium | ferdium | 6.0.0:nightly35 |
ferdium | ferdium | 6.0.0:nightly36 |
ferdium | ferdium | 6.0.0:nightly37 |
ferdium | ferdium | 6.0.0:nightly38 |
ferdium | ferdium | 6.0.0:nightly39 |
ferdium | ferdium | 6.0.0:nightly4 |
ferdium | ferdium | 6.0.0:nightly40 |
ferdium | ferdium | 6.0.0:nightly41 |
ferdium | ferdium | 6.0.0:nightly42 |
ferdium | ferdium | 6.0.0:nightly43 |
ferdium | ferdium | 6.0.0:nightly44 |
ferdium | ferdium | 6.0.0:nightly45 |
ferdium | ferdium | 6.0.0:nightly46 |
ferdium | ferdium | 6.0.0:nightly47 |
ferdium | ferdium | 6.0.0:nightly48 |
ferdium | ferdium | 6.0.0:nightly49 |
ferdium | ferdium | 6.0.0:nightly5 |
ferdium | ferdium | 6.0.0:nightly50 |
ferdium | ferdium | 6.0.0:nightly51 |
ferdium | ferdium | 6.0.0:nightly52 |
ferdium | ferdium | 6.0.0:nightly53 |
ferdium | ferdium | 6.0.0:nightly54 |
ferdium | ferdium | 6.0.0:nightly55 |
ferdium | ferdium | 6.0.0:nightly56 |
ferdium | ferdium | 6.0.0:nightly57 |
ferdium | ferdium | 6.0.0:nightly58 |
ferdium | ferdium | 6.0.0:nightly59 |
ferdium | ferdium | 6.0.0:nightly6 |
ferdium | ferdium | 6.0.0:nightly60 |
ferdium | ferdium | 6.0.0:nightly61 |
ferdium | ferdium | 6.0.0:nightly62 |
ferdium | ferdium | 6.0.0:nightly63 |
ferdium | ferdium | 6.0.0:nightly65 |
ferdium | ferdium | 6.0.0:nightly66 |
ferdium | ferdium | 6.0.0:nightly67 |
ferdium | ferdium | 6.0.0:nightly69 |
ferdium | ferdium | 6.0.0:nightly7 |
ferdium | ferdium | 6.0.0:nightly70 |
ferdium | ferdium | 6.0.0:nightly71 |
ferdium | ferdium | 6.0.0:nightly72 |
ferdium | ferdium | 6.0.0:nightly73 |
ferdium | ferdium | 6.0.0:nightly74 |
ferdium | ferdium | 6.0.0:nightly76 |
ferdium | ferdium | 6.0.0:nightly77 |
ferdium | ferdium | 6.0.0:nightly78 |
ferdium | ferdium | 6.0.0:nightly79 |
ferdium | ferdium | 6.0.0:nightly8 |
ferdium | ferdium | 6.0.0:nightly80 |
ferdium | ferdium | 6.0.0:nightly81 |
ferdium | ferdium | 6.0.0:nightly82 |
ferdium | ferdium | 6.0.0:nightly83 |
ferdium | ferdium | 6.0.0:nightly84 |
ferdium | ferdium | 6.0.0:nightly85 |
ferdium | ferdium | 6.0.0:nightly86 |
ferdium | ferdium | 6.0.0:nightly87 |
ferdium | ferdium | 6.0.0:nightly88 |
ferdium | ferdium | 6.0.0:nightly89 |
ferdium | ferdium | 6.0.0:nightly9 |
ferdium | ferdium | 6.0.0:nightly90 |
ferdium | ferdium | 6.0.0:nightly91 |
ferdium | ferdium | 6.0.0:nightly92 |
ferdium | ferdium | 6.0.0:nightly93 |
ferdium | ferdium | 6.0.0:nightly94 |
ferdium | ferdium | 6.0.0:nightly95 |
ferdium | ferdium | 6.0.0:nightly96 |
ferdium | ferdium | 6.0.0:nightly97 |
ferdium | ferdium | 6.0.0:nightly98 |
getferdi | ferdi | 𝑥 ≤ 5.8.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration