Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-cfhg-9x44-78h2
ps Enables OS Command Injection
Versions of `ps` before 1.0.0 are vulnerable to command injection.Proof of concept:RecommendationUpdate to version 1.0.0 or later.
[]
GHSA-fg8g-5752-vv79
HCL Domino is susceptible to a lockout policy bypass vulnerability in the ID Vault service. An unauthenticated attacker could use this vulnerability to mount a brute force attack against the ID Vault service.
[]
GHSA-963q-946c-mq2q
cyrus-sasl before 1.5.24 in Red Hat Linux 7.0 does not properly verify the authorization for a local user, which could allow the users to bypass specified access restrictions.
[]
CVE-2020-13316
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab was not validating a Deploy-Token and allowed a disabled repository be accessible via a git command line.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
CVE-2014-7568
The Marcus Butler Unofficial (aka com.automon.ay.marcus.butler) application 1.4.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:automon:marcus_butler_unofficial:1.4.0.6:*:*:*:*:android:*:*" ]
CVE-2023-0388
Random Text <= 0.3.0 - Subscriber+ SQLi
The Random Text WordPress plugin through 0.3.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscribers.
[ "cpe:2.3:a:random_text_project:random_text:*:*:*:*:*:wordpress:*:*" ]
GHSA-6rwg-9jq4-qw59
An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /monitor/s_scheduledfile.php.
[]
CVE-2021-41277
GeoJSON URL validation can expose server files and environment variables to unauthorized users
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
[ "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*", "cpe:2.3:a:metabase:metabase:0.40.0:-:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:0.40.1:*:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:0.40.2:*:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:0.40.3:*:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:0.40.4:*:*:*:-:*:*:*", "cpe:2.3:a:metabase:metabase:1.40.0:-:*:*:enterprise:*:*:*", "cpe:2.3:a:metabase:metabase:1.40.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:metabase:metabase:1.40.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:metabase:metabase:1.40.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:metabase:metabase:1.40.4:*:*:*:enterprise:*:*:*" ]
CVE-2024-24043
Directory Traversal vulnerability in Speedy11CZ MCRPX v.1.4.0 and before allows a local attacker to execute arbitrary code via a crafted file.
[ "cpe:2.3:a:speedy11cz:mcrpx:1.4.0:*:*:*:*:*:*:*" ]
GHSA-jf52-69wj-mgxf
The Globe7 soft phone client 7.3 sends username and password information in cleartext, which allows remote attackers to obtain sensitive information by sniffing the HTTP traffic.
[]
GHSA-jjgp-jxfq-2w96
The Bdat driver of Prague smart phones with software versions earlier than Prague-AL00AC00B211, versions earlier than Prague-AL00BC00B211, versions earlier than Prague-AL00CC00B211, versions earlier than Prague-TL00AC01B211, versions earlier than Prague-TL10AC01B211 has integer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP and execute it as a specific privilege; the APP can then send a specific parameter to the driver of the smart phone, causing arbitrary code execution.
[]
CVE-1999-0172
FormMail CGI program allows remote execution of commands.
[ "cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*" ]
CVE-2022-25869
Cross-site Scripting (XSS)
All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of <textarea> elements.
[ "cpe:2.3:a:angularjs:angular:*:*:*:*:*:node.js:*:*" ]
GHSA-cg2g-27wj-x8x6
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.
[]
CVE-2023-7079
Arbitrary remote file read in Wrangler dev server
Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
[ "cpe:2.3:a:cloudflare:wrangler:*:*:*:*:*:node.js:*:*" ]
GHSA-9hv6-wmqm-882c
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
[]
CVE-2023-26070
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 4 of 4).
[ "cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs943:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2240:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc232:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lw80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx617:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms710:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms711:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx710:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx711:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx717:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx718:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx810:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx811:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx812:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5263:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7263:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms911:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx910:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx911:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx912:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9145:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9165:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs310:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs317:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs410:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs417:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2132:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs510:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs517:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx317:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx417:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx517:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lhs60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x746:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs795:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs796:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs798:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs955:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*" ]
CVE-2009-3968
Multiple SQL injection vulnerabilities in ITechBids 8.0 allow remote attackers to execute arbitrary SQL commands via the (1) user_id parameter to feedback.php, (2) cate_id parameter to category.php, (3) id parameter to news.php, and (4) productid parameter to itechd.php. NOTE: the sellers_othersitem.php, classifieds.php, and shop.php vectors are already covered by CVE-2008-3238.
[ "cpe:2.3:a:itechscripts:itechbids:8.0:*:*:*:*:*:*:*" ]
CVE-2024-57801
net/mlx5e: Skip restore TC rules for vport rep without loaded flag
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Skip restore TC rules for vport rep without loaded flag During driver unload, unregister_netdev is called after unloading vport rep. So, the mlx5e_rep_priv is already freed while trying to get rpriv->netdev, or walk rpriv->tc_ht, which results in use-after-free. So add the checking to make sure access the data of vport rep which is still loaded.
[]
GHSA-rchf-p2rm-hg6h
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
[]
CVE-2008-6129
Directory traversal vulnerability in print.php in moziloWiki 1.0.1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
[ "cpe:2.3:a:mozilo:mozilowiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilo:mozilowiki:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilo:mozilowiki:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilo:mozilowiki:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilo:mozilowiki:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilo:mozilowiki:1.0.0:*:*:*:*:*:*:*" ]
CVE-2023-41724
A command injection vulnerability in Ivanti Sentry prior to 9.19.0 allows unauthenticated threat actor to execute arbitrary commands on the underlying operating system of the appliance within the same physical or logical network.
[ "cpe:2.3:a:ivanti:sentry:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:standalone_sentry:*:*:*:*:*:*:*:*" ]
CVE-1999-0201
A quote cwd command on FTP servers can reveal the full path of the home directory of the "ftp" user.
[ "cpe:2.3:a:ftp:ftp:*:*:*:*:*:*:*:*" ]
GHSA-gwww-cpmw-jjf6
Parallels Desktop virtio-gpu Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parallels Desktop. User interaction is required to exploit this vulnerability in that the target in a guest system must visit a malicious page or open a malicious file.The specific flaw exists within the virtio-gpu virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the hypervisor. Was ZDI-CAN-21260.
[]
GHSA-4w4h-2rm6-37rj
Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 allows a remote attacker to obtain the information stored in the product because the product is set to accept HTTP connections from the WAN side by default.
[]
GHSA-m3vc-mpqh-m7hg
Directory traversal vulnerability in Meteor FTP 1.0 allows remote attackers to read arbitrary files via (1) a .. (dot dot) in the ls/LIST command, or (2) a ... in the cd/CWD command.
[]
GHSA-hp8g-g38x-6q8m
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17318.
[]
CVE-2012-0839
OCaml 3.12.1 and earlier computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
[ "cpe:2.3:a:inria:ocaml:*:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:1.07:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:2.99:alpha:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.03:alpha:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.04:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.05:beta:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.06:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.07:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.07:beta1:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.07:beta2:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.07:pl2:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.08:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.09:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:inria:ocaml:3.12:*:*:*:*:*:*:*" ]
CVE-2017-8342
Radicale before 1.1.2 and 2.x before 2.0.0rc2 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.
[ "cpe:2.3:a:radicale:radicale:*:*:*:*:*:*:*:*", "cpe:2.3:a:radicale:radicale:2.0.0:rc1:*:*:*:*:*:*" ]
GHSA-rvw7-mvc2-hwvc
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
[]
GHSA-j72r-7923-6w8v
Dell PowerProtect DM5500 version 5.15.0.0 and prior contains an insecure deserialization Vulnerability. A remote attacker with high privileges could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application.
[]
CVE-2021-0457
In the FingerTipS touch screen driver, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157155375
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2018-17666
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the exportData method of a host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6520.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2007-1131
PHP remote file inclusion vulnerability in sinapis.php in Sinapis Forum 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the fuss parameter.
[ "cpe:2.3:a:scripter.ch:sinapis_forum:2.2:*:*:*:*:*:*:*" ]
CVE-2005-1024
modules.php in PHP-Nuke 6.x to 7.6 allows remote attackers to obtain sensitive information via a direct request to (1) my_headlines, (2) userinfo, or (3) search, which reveals the path in a PHP error message.
[ "cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:7.6:*:*:*:*:*:*:*" ]
GHSA-6v48-qpg5-fj4m
A vulnerability in Cisco IOS XR Software image verification checks could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system.This vulnerability is due to a time-of-check, time-of-use (TOCTOU) race condition when an install query regarding an ISO image is performed during an install operation that uses an ISO image. An attacker could exploit this vulnerability by modifying an ISO image and then carrying out install requests in parallel. A successful exploit could allow the attacker to execute arbitrary code on an affected device.
[]
GHSA-f2rh-9mv9-vrw7
Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.
[]
CVE-2022-43125
Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /appointments/manage_appointment.php.
[ "cpe:2.3:a:online_diagnostic_lab_management_system_project:online_diagnostic_lab_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-hwv5-9763-pqc4
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_startPing.
[]
CVE-2023-27843
SQL injection vulnerability found in PrestaShop askforaquote v.5.4.2 and before allow a remote attacker to gain privileges via the QuotesProduct::deleteProduct component.
[ "cpe:2.3:a:ask_for_a_quote_project:ask_for_a_quote:*:*:*:*:*:prestashop:*:*" ]
CVE-2018-11625
In ImageMagick 7.0.7-37 Q16, SetGrayscaleImage in the quantize.c file allows attackers to cause a heap-based buffer over-read via a crafted file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-37:q16:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
GHSA-g3f3-622v-gg6f
The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
GHSA-pppv-cq2v-65wm
A vulnerability was found in SourceCodester Online Library System 1.0. It has been classified as critical. This affects an unknown part of the file admin/borrowed/index.php. The manipulation of the argument BookPublisher/BookTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259467.
[]
CVE-2005-3504
Buffer overflow in swcons in IBM AIX 5.2, when debug malloc is enabled, allows remote attackers to cause a core dump and possibly execute arbitrary code.
[ "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*" ]
GHSA-x6cf-wqfh-ppxq
Open redirect vulnerability in EMC Documentum WebTop before 6.8P02, Documentum Administrator before 7.2P01, Documentum Digital Assets Manager through 6.5SP6, Documentum Web Publishers through 6.5SP7, and Documentum Task Space through 6.7SP2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL.
[]
CVE-2017-14917
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer sizes in the message passing interface are not properly validated.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2012-4185
Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_sdk:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" ]
CVE-2017-11006
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a Use After Free condition can occur during positioning.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2024-9578
Hide Links <= 1.4.2 - Unauthenticated Shortcode Execution
The Hide Links plugin for WordPress is vulnerable to unauthorized shortcode execution due to do_shortcode being hooked through the comment_text filter in all versions up to and including 1.4.2. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes available on the target site.
[ "cpe:2.3:a:wp_puzzle:hide_links:*:*:*:*:*:*:*:*" ]
GHSA-q5mw-fjpm-rc84
Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter.
[]
CVE-2021-41808
In M-Files Server product with versions before 21.11.10775.0, enabling logging of federated authentication would write sensitive information to event logs.
In M-Files Server product with versions before 21.11.10775.0, enabling logging of Federated authentication to event log wrote sensitive information to log. Mitigating factors are logging is disabled by default.
[ "cpe:2.3:a:m-files:m-files_server:*:*:*:*:*:*:*:*" ]
GHSA-r23c-pfc8-wx95
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
[]
CVE-2025-23951
WordPress Gallery: Hybrid – Advanced Visual Gallery plugin <= 1.4.0.2 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DivEngine Gallery: Hybrid – Advanced Visual Gallery allows Stored XSS.This issue affects Gallery: Hybrid – Advanced Visual Gallery: from n/a through 1.4.0.2.
[]
CVE-2022-33656
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*" ]
GHSA-268r-8rwm-mqq9
In the Linux kernel, the following vulnerability has been resolved:mtd: Fix gluebi NULL pointer dereference caused by ftl notifierIf both ftl.ko and gluebi.ko are loaded, the notifier of ftl triggers NULL pointer dereference when trying to access ‘gluebi->desc’ in gluebi_read().ubi_gluebi_init ubi_register_volume_notifier ubi_enumerate_volumes ubi_notify_all gluebi_notify nb->notifier_call() gluebi_create mtd_device_register mtd_device_parse_register add_mtd_device blktrans_notify_add not->add() ftl_add_mtd tr->add_mtd() scan_header mtd_read mtd_read_oob mtd_read_oob_std gluebi_read mtd->read() gluebi->desc - NULLDetailed reproduction information available at the Link [1],In the normal case, obtain gluebi->desc in the gluebi_get_device(), and access gluebi->desc in the gluebi_read(). However, gluebi_get_device() is not executed in advance in the ftl_add_mtd() process, which leads to NULL pointer dereference.The solution for the gluebi module is to run jffs2 on the UBI volume without considering working with ftl or mtdblock [2]. Therefore, this problem can be avoided by preventing gluebi from creating the mtdblock device after creating mtd partition of the type MTD_UBIVOLUME.
[]
CVE-2020-25653
A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
[ "cpe:2.3:a:spice-space:spice-vdagent:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
GHSA-7rr4-25h7-4mj3
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
[]
GHSA-r2p9-9fp4-f59v
Opera before 11.62 on UNIX uses world-readable permissions for temporary files during printing, which allows local users to obtain sensitive information by reading these files.
[]
GHSA-pjc2-fghh-wx28
SQL injection vulnerability in Fortinet FortiManager 5.0.x before 5.0.11, 5.2.x before 5.2.2 allows remote attackers to execute arbitrary commands via unspecified parameters.
[]
GHSA-8w9m-69wv-wgjm
The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.
[]
GHSA-pc8h-c72v-h5j6
Parlano MindAlign 5.0 and later versions uses weak encryption, with unknown impact and attack vectors.
[]
CVE-2023-36034
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*", "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
GHSA-pmfj-qc23-7673
An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent to the server could potentially result in an out-of-bounds read. A user could be convinced to enter a particular string which would then get converted incorrectly and could lead to a potential out-of-bounds read.
[]
CVE-2021-22757
A CWE-125: Out-of-bounds read vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in disclosure of information or remote code execution due to lack of sanity checks on user-supplied input data, when a malicious CGF file is imported to IGSS Definition.
[ "cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*" ]
CVE-2009-3476
Buffer overflow in OpenSAML before 1.1.3 as used in Internet2 Shibboleth Service Provider software 1.3.x before 1.3.4, and XMLTooling before 1.2.2 as used in Internet2 Shibboleth Service Provider software 2.x before 2.2.1, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed encoded URL.
[ "cpe:2.3:a:internet2:shibboleth-sp:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:1.3f:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:opensaml:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:opensaml:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:xmltooling:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:xmltooling:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:xmltooling:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:xmltooling:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:xmltooling:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:internet2:shibboleth-sp:2.2:*:*:*:*:*:*:*" ]
CVE-2022-21607
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" ]
CVE-2016-10115
NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo Q devices with firmware 1.8.0_5551 and earlier, and Arlo Q Plus devices with firmware 1.8.1_6094 and earlier have a default password of 12345678, which makes it easier for remote attackers to obtain access after a factory reset or in a factory configuration.
[ "cpe:2.3:o:netgear:arlo_base_station_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:vmb30x0:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:vmk3xx0:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:vms3xx0:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:arlo_q_camera_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:vmc3040:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:arlo_q_plus_camera_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:vmc3040s:-:*:*:*:*:*:*:*" ]
GHSA-x2w4-c67p-g44j
Grafana Missing Synchronization vulnerability
Grafana is an open-source platform for monitoring and observability.Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.This might enable malicious users to crash Grafana instances through that endpoint.Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
[]
CVE-2018-20236
There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system.
[ "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*" ]
GHSA-mvjm-5rgf-fx59
Multiple PHP remote file inclusion vulnerabilities in index.php in Knusperleicht FileManager 1.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) dwl_download_path or (2) dwl_include_path parameters.
[]
CVE-2021-38472
InHand Networks IR615 Router
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal and could lure the administrator to perform changes.
[ "cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4724:*:*:*:*:*:*:*", "cpe:2.3:h:inhandnetworks:ir615:-:*:*:*:*:*:*:*", "cpe:2.3:o:inhandnetworks:ir615_firmware:2.3.0.r4870:*:*:*:*:*:*:*" ]
GHSA-4qv3-968r-mh4q
Adobe FrameMaker versions 2019 Update 8 (and earlier) and 2020 Update 4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2022-38830
Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setIPv6Status.
[ "cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*" ]
GHSA-qcvh-p9jq-wp8v
Malicious homeservers can steal message keys when the matrix-react-sdk user invites another user to a room
Impactmatrix-react-sdk before 3.102.0 allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite.Patchesmatrix-react-sdk 3.102.0 [disables sharing message keys on invite](https://github.com/matrix-org/matrix-react-sdk/pull/12618) by removing calls to the vulnerable functionality.WorkaroundsNone.ReferencesThe vulnerability in matrix-react-sdk is caused by calling `MatrixClient.sendSharedHistoryKeys` in matrix-js-sdk, which is inherently vulnerable to this sort of attack. This matrix-js-sdk vulnerability is tracked as CVE-2024-47080 / [GHSA-4jf8-g8wp-cx7c](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-4jf8-g8wp-cx7c). Given that this functionality is not specific to sharing message keys on *invite*, is optional, has to be explicitly called by the caller and has been independently patched in matrix-react-sdk by removing the offending calls, we believe it is proper to treat the matrix-react-sdk vulnerability as a separate one, with its own advisory and CVE.The matrix-org/matrix-react-sdk repository has recently been archived and the project was moved to [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk). Given that this happened *after* the first patched release, no releases of the project on [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk) were ever vulnerable to this vulnerability.Patching pull request: https://github.com/matrix-org/matrix-react-sdk/pull/12618.For more informationIf you have any questions or comments about this advisory, please email us at security at [security at matrix.org](mailto:[email protected]).
[]
CVE-2021-24285
Car Seller - Auto Classifieds Script <= 2.1.0 - Unauthenticated SQL Injection
The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.
[ "cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:*" ]
CVE-2019-8951
An Open Redirect vulnerability located in the webserver affects several Bosch hardware and software products. The vulnerability potentially allows a remote attacker to redirect users to an arbitrary URL. Affected hardware products: Bosch DIVAR IP 2000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.62.0019 and newer), Bosch DIVAR IP 5000 (vulnerable versions: 3.10; 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.80.0033 and newer). Affected software products: Video Recording Manager (VRM) (vulnerable versions: 3.20; 3.21; 3.50; 3.51; 3.55; 3.60; 3.61; 3.62; fixed versions: 3.70.0056 and newer; 3.81.0032 and newer), Bosch Video Management System (BVMS) (vulnerable versions: 3.50.00XX; 3.55.00XX; 3.60.00XX; fixed versions: 7.5; 3.70.0056).
[ "cpe:2.3:o:bosch:divar_ip_2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:bosch:divar_ip_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:bosch:divar_ip_5000:-:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*" ]
CVE-2015-2546
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
GHSA-p735-2vg8-f9q2
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13. An app may be able to disclose kernel memory.
[]
GHSA-qhr7-69q6-5rp8
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.
[]
GHSA-2v59-gf35-6hpx
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. While the vulnerability is in Oracle GlassFish Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle GlassFish Server. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
[]
GHSA-78jp-pvx9-93px
backup-manager-upload in Backup Manager before 0.6.3 provides the FTP server hostname, username, and password as plaintext command line arguments during FTP uploads, which allows local users to obtain sensitive information by listing the process and its arguments, a different vulnerability than CVE-2007-2766.
[]
CVE-2008-7204
Cross-site request forgery (CSRF) vulnerability in VirtueMart 1.0.13a and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[ "cpe:2.3:a:virtuemart:virtuemart:*:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:virtuemart:virtuemart:1.1:*:*:*:*:*:*:*" ]
CVE-2006-7038
Multiple buffer overflows in MERCUR Messaging 2005 before Service Pack 4 allow remote attackers to cause a denial of service (crash) via (1) "long command lines at port 32000" and (2) certain name service queries that are not properly handled by the SMTP service.
[ "cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:enterprise:*:*:*:*:*", "cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:lite:*:*:*:*:*", "cpe:2.3:a:atrium_software:mercur_messaging_2005:5.0_sp3:*:standard:*:*:*:*:*" ]
CVE-2024-1747
WooCommerce Customers Manager < 30.2 - Subscriber+ Stored XSS
The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values.
[ "cpe:2.3:a:woocommerce:woocommerce_customers_manager:*:*:*:*:*:*:*:*" ]
GHSA-7rhh-c3rg-v5x6
PHP remote file inclusion vulnerability in modules/mail/main.php in Inter7 vHostAdmin 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the MODULES_DIR parameter.
[]
CVE-2021-39193
Transaction validity oversight in pallet-ethereum
Frontier is Substrate's Ethereum compatibility layer. Prior to commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26, a bug in `pallet-ethereum` can cause invalid transactions to be included in the Ethereum block state in `pallet-ethereum` due to not validating the input data size. Any invalid transactions included this way have no possibility to alter the internal Ethereum or Substrate state. The transaction will appear to have be included, but is of no effect as it is rejected by the EVM engine. The impact is further limited by Substrate extrinsic size constraints. A patch is available in commit number 0b962f218f0cdd796dadfe26c3f09e68f7861b26. There are no workarounds aside from applying the patch.
[ "cpe:2.3:a:parity:frontier:*:*:*:*:*:*:*:*" ]
GHSA-fjxc-vq87-fmhx
SQL injection vulnerability in messages.php in PHP-Fusion 6.01.15 and 7.00.1, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the subject and msg_send parameters, a different vector than CVE-2005-3157, CVE-2005-3158, CVE-2005-3159, CVE-2005-4005, and CVE-2006-2459.
[]
CVE-2024-25290
An issue in Casa Systems NL1901ACV R6B032 allows a remote attacker to execute arbitrary code via the userName parameter of the add function.
[ "cpe:2.3:a:casa_systems:nl1901acv:*:*:*:*:*:*:*:*" ]
CVE-2019-11392
BlogEngine.NET 3.3.7 and earlier allows XXE via an apml file to syndication.axd.
[ "cpe:2.3:a:dotnetblogengine:blogengine.net:*:*:*:*:*:*:*:*" ]
CVE-2025-26695
When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address. This vulnerability affects Thunderbird < 136 and Thunderbird < 128.8.
[]
GHSA-2q8v-r2xr-c9xc
Memory Corruption in camera while installing a fd for a particular DMA buffer.
[]
CVE-2021-40850
TCMAN GIM SQL injection vulnerability
TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.
[ "cpe:2.3:a:tcman:gim:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:tcman:gim:11.0:*:*:*:*:*:*:*" ]
GHSA-8932-qxvp-f4gm
IBM i2 Analyst Notebook 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 183317.
[]
GHSA-p658-8693-mhvg
Tendermint Core vulnerable to Uncontrolled Resource Consumption
DescriptionTendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, [we added a new `Timestamp` field to `Evidence` structs](https://github.com/tendermint/tendermint/pull/5219). This timestamp would be calculated using the same algorithm that is used when a block is created and proposed. (This algorithm relies on the timestamp of the last commit from this specific block.)In Tendermint Core v0.34.0-v0.34.2, the `consensus` reactor is responsible for forming `DuplicateVoteEvidence` whenever double signs are observed. However, the current block is still “in flight” when it is being formed by the `consensus` reactor. It hasn’t been finalized through network consensus yet. This means that different nodes in the network may observe different “last commits” when assigning a timestamp to `DuplicateVoteEvidence.`In turn, different nodes could form `DuplicateVoteEvidence` objects at the same height but with different timestamps. One `DuplicateVoteEvidence` object (with one timestamp) will then eventually get finalized in the block, but this means that any `DuplicateVoteEvidence` with a different timestamp is considered invalid. Any node that formed invalid `DuplicateVoteEvidence` will continue to propose invalid evidence; its peers may see this, and choose to disconnect from this node. This bug means that double signs are DoS vectors in Tendermint Core v0.34.0-v0.34.2.Tendermint Core v0.34.3 is a security release which fixes this bug. As of v0.34.3, `DuplicateVoteEvidence` is no longer formed by the `consensus` reactor; rather, the `consensus` reactor passes the `Vote`s themselves into the `EvidencePool`, which is now responsible for forming `DuplicateVoteEvidence`. The `EvidencePool` has timestamp info that should be consistent across the network, which means that `DuplicateVoteEvidence` formed in this reactor should have consistent timestamps.This release changes the API between the `consensus` and `evidence` reactors.ImpactThis is a denial-of-service vector which impacts networks running Tendermint Core v0.34.0 - v0.34.2.RemediationThis problem has been patched in Tendermint Core v0.34.3. Networks running impacted versions of Tendermint Core should update immediately.WorkaroundsThere are no workarounds, other than upgrading to a patched version of Tendermint Core.CreditsCrypto.com (@cyril-crypto, @brianatcrypto, @tomtau and @yihuang) for finding and submitting this vulnerability@melekes and @cmwaters for identifying the root cause and patching the problemFor more informationIf you have any questions or comments about this advisory:Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)Email us at [[email protected]](mailto:[email protected])
[]
CVE-2018-12816
Adobe Digital Editions versions 4.5.8 and below have an out of bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*" ]
CVE-2011-0209
Integer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted RIFF WAV file.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*" ]
GHSA-gmhq-vm7x-p5c3
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
[]
CVE-2020-11595
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an API request and obtain the upload folder path that includes the hostname in a UNC path.
[ "cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:*" ]
GHSA-pg6q-x7mh-7cg2
An authenticated user may trigger an invariant assertion during command dispatch due to incorrect validation on the $external database. This may result in mongod denial of service or server crash. This issue affects: MongoDB Inc. MongoDB Server v5.0 versions, prior to and including v5.0.6.
[]
GHSA-7967-3g5v-3pfc
Multiple race conditions in the SMB implementation in the Server service in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allow remote attackers to cause a denial of service (system hang) via a crafted (1) SMBv1 or (2) SMBv2 Negotiate packet, aka "SMB Memory Corruption Vulnerability."
[]