Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-6m99-4wqf-w3q4
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
CVE-2006-5369
Unspecified vulnerability in Oracle Application Object Library in Oracle E-Business Suite 11.5.10CU2 has unknown impact and remote authenticated attack vectors, aka Vuln# APPS02.
[ "cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*" ]
CVE-2017-10895
sDNSProxy.exe ver1.1.0.0 and earlier allows remote attackers to cause a denial of service via unspecified vectors.
[ "cpe:2.3:a:sdnsproxy_project:sdnsproxy:*:*:*:*:*:*:*:*" ]
CVE-2008-4409
libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
[ "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*" ]
GHSA-6rv6-629w-3ghm
The installation functionality in the Novell Kanaka component before 2.8 for Novell Open Enterprise Server (OES) on Mac OS X does not verify the server's X.509 certificate during an SSL session, which allows man-in-the-middle attackers to spoof servers via an arbitrary certificate.
[]
CVE-2022-29581
Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
GHSA-x993-24wq-x7c4
An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
[]
CVE-2025-25170
WordPress Migrate Posts Plugin <=1.0 - Post Based Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Migrate Posts allows Reflected XSS. This issue affects Migrate Posts: from n/a through 1.0.
[]
GHSA-cqqf-7hc8-ww46
A vulnerability in the API of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because requests that are sent to the API are not properly validated. An attacker could exploit this vulnerability by sending a malicious request to the API. A successful exploit could allow the attacker to cause all participants on a call to be disconnected, resulting in a DoS condition.
[]
CVE-2019-1819
Cisco Prime Infrastructure and Evolved Programmable Network Manager Path Traversal Vulnerability
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager software could allow an authenticated, remote attacker to download and view files within the application that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view application files that may contain sensitive information.
[ "cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*" ]
CVE-2021-37291
An SQL Injection vulnerability exists in KevinLAB Inc Building Energy Management System 4ST BEMS 1.0.0 ivia the input_id POST parameter in index.php.
[ "cpe:2.3:a:kevinlab:4st_l-bems:1.0.0:*:*:*:*:*:*:*" ]
CVE-2010-3036
Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.
[ "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_services:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:2.6:update:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:qos_policy_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:qos_policy_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:qos_policy_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:security_manager:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_readiness_assessment_manager:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:*" ]
CVE-2018-1437
IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565.
[ "cpe:2.3:a:ibm:notes:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*" ]
GHSA-c75r-v5wg-3gmj
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[]
GHSA-35w3-6qhc-474v
@workos-inc/authkit-nextjs session replay vulnerability
ImpactA user can reuse an expired session by controlling the `x-workos-session` header.PatchesPatched in https://github.com/workos/authkit-nextjs/releases/tag/v0.4.2
[]
CVE-2019-1174
Windows Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in the way that the PsmServiceExtHost.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the PsmServiceExtHost.dll properly handles objects in memory.
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2022-47524
F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack.
[ "cpe:2.3:a:f-secure:safe:*:*:*:*:*:android:*:*" ]
GHSA-wv9p-64pj-gq2g
An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server’s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch.
[]
CVE-2024-48139
A prompt injection vulnerability in the chatbox of Blackbox AI v1.3.95 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message.
[ "cpe:2.3:a:blackbox_ai:blackbox_ai:*:*:*:*:*:*:*:*" ]
GHSA-5v9r-wpqf-v2w9
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
[]
GHSA-cx58-rgfc-jwq7
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.
[]
GHSA-vp3c-7mvg-xx4f
The Gallery Block (Meow Gallery) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data_atts’ parameter in versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2021-0005
Uncaught exception in firmware for Intel(R) Ethernet Adapters 800 Series Controllers and associated adapters before version 1.5.3.0 may allow a privileged user to potentially enable denial of service via local access.
[ "cpe:2.3:o:intel:ethernet_controller_e810_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ethernet_controller_e810:-:*:*:*:*:*:*:*" ]
GHSA-q9h3-5p97-x52x
The ultimate-member plugin before 2.0.52 for WordPress has XSS during an account upgrade.
[]
GHSA-4qv9-67wq-cv7g
SoftVibe SARABAN for INFOMA 1.1 is vulnerable to stored cross-site scripting (XSS) that allows users to store scripts in certain fields (e.g. subject, description) of the document form.
[]
GHSA-3cf2-6pj6-x5w3
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
[]
GHSA-x7r7-wmj8-vv5g
Cross-site Scripting in OctoPrint
Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0. The login endpoint allows for javascript injection which may lead to account takeover in a phishing scenario.
[]
GHSA-x9cg-mcvj-x6x6
A vulnerability, which was classified as problematic, has been found in SourceCodester FAQ Management System 1.0. Affected by this issue is some unknown functionality of the component Update FAQ. The manipulation of the argument Frequently Asked Question leads to cross site scripting. The attack may be launched remotely. VDB-255386 is the identifier assigned to this vulnerability.
[]
CVE-2021-45224
An issue was discovered in COINS Construction Cloud 11.12. In several locations throughout the application, JavaScript code is passed as a URL parameter. Attackers can trivially alter this code to cause malicious behaviour. The application is therefore vulnerable to reflected XSS via malicious URLs.
[ "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*" ]
CVE-1999-0136
Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access.
[ "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*" ]
CVE-2020-24396
homee Brain Cube v2 (2.28.2 and 2.28.4) devices have sensitive SSH keys within downloadable and unencrypted firmware images. This allows remote attackers to use the support server as a SOCKS proxy.
[ "cpe:2.3:o:hom.ee:brain_cube_core:2.28.2:*:*:*:*:*:*:*", "cpe:2.3:o:hom.ee:brain_cube_core:2.28.4:*:*:*:*:*:*:*", "cpe:2.3:h:hom.ee:brain_cube:-:*:*:*:*:*:*:*" ]
GHSA-g97m-fwww-wqf3
SteVe is an open platform that implements different version of the OCPP protocol for Electric Vehicle charge points, acting as a central server for management of registered charge points. Attackers can inject arbitrary HTML and Javascript code via WebSockets leading to persistent Cross-Site Scripting in the SteVe management interface.
[]
GHSA-fxwg-r5hp-f5h3
login.php in PCXP/TOPPE CMS allows remote attackers to bypass authentication and gain privileges by modifying the cookie to match the target userid.
[]
GHSA-72pf-j5fj-gg32
Insufficient security control vulnerability in internal database access mechanism of Hitachi Energy Relion 670/650/SAM600-IO, Relion 650, GMS600, PWC600 allows attacker who successfully exploited this vulnerability, of which the product does not sufficiently restrict access to an internal database tables, could allow anybody with user credentials to bypass security controls that is enforced by the product. Consequently, exploitation may lead to unauthorized modifications on data/firmware, and/or to permanently disabling the product. This issue affects: Hitachi Energy Relion 670 Series 2.0 all revisions; 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.5. Hitachi Energy Relion 670/650 Series 2.1 all revisions. 2.2.0 all revisions; 2.2.4 all revisions; Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions; 2.2.5 versions prior to 2.2.5.2. Hitachi Energy Relion 650 1.0 all revisions. 1.1 all revisions; 1.2 all revisions; 1.3 versions prior to 1.3.0.8; Hitachi Energy GMS600 1.3.0; 1.3.0.1; 1.2.0. Hitachi Energy PWC600 1.0.1 version 1.0.1.4 and prior versions; 1.1.0 version 1.1.0.1 and prior versions.
[]
GHSA-86q3-f3qv-8r7r
PHP remote file inclusion vulnerability in admin/plugins/Online_Users/main.php in PageTree CMS 0.0.2 BETA 0001 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[PT_Config][dir][data] parameter.
[]
GHSA-4jcc-3cc2-c846
Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
[]
GHSA-xx3r-74m7-rjg4
In the Linux kernel, the following vulnerability has been resolved:md/dm-raid: don't call md_reap_sync_thread() directlyCurrently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely unsafe because md_reap_sync_thread() can change many fields that is protected by 'reconfig_mutex'.However, hold 'reconfig_mutex' here is still problematic because this will cause deadlock, for example, commit 130443d60b1b ("md: refactor idle/frozen_sync_thread() to fix deadlock").Fix this problem by using stop_sync_thread() to unregister sync_thread, like md/raid did.
[]
CVE-2016-0047
WinForms in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows remote attackers to obtain sensitive information from process memory via crafted icon data, aka "Windows Forms Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*" ]
CVE-2022-37956
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*" ]
GHSA-v669-hwvw-m3vg
An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Information Disclosure Vulnerability'.
[]
CVE-2022-0692
Open Redirect on Rudloff/alltube in rudloff/alltube
Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.
[ "cpe:2.3:a:alltube_project:alltube:*:*:*:*:*:*:*:*" ]
CVE-2008-5988
SQL injection vulnerability in scripts/recruit_details.php in Jadu CMS for Government allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:jadu:jadu_cms_for_government:*:*:*:*:*:*:*:*" ]
GHSA-jxg6-fhwc-9v9c
Regular Expression Denial of Service (ReDoS) in es6-crawler-detect
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
[]
CVE-2022-41148
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18338.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*" ]
CVE-2017-9206
The iw_get_ui16le function in imagew-util.c:405:23 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image, related to imagew-jpeg.c.
[ "cpe:2.3:a:entropymine:imageworsener:1.3.1:*:*:*:*:*:*:*" ]
GHSA-ff5m-p28g-qvjf
The Store Locator WordPress plugin before 1.4.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[]
CVE-2014-5583
The Most Popular Ringtones (aka com.bbs.mostpopularringtones) application 32 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:blackbeltstudio:most_popular_ringtones:32:*:*:*:*:android:*:*" ]
GHSA-9vrw-gg2j-hwj3
Windows HTTP.sys Elevation of Privilege Vulnerability.
[]
GHSA-7ch3-7pp7-7cpq
Datasette 1.0 alpha series leaks names of databases and tables to unauthenticated users
ImpactThis bug affects Datasette instances running a Datasette 1.0 alpha - 1.0a0, 1.0a1, 1.0a2 or 1.0a3 - in an online accessible location but with authentication enabled using a plugin such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords).The `/-/api` API explorer endpoint could reveal the names of both databases and tables - but not their contents - to an unauthenticated user.PatchesDatasette 1.0a4 has a fix for this issue.WorkaroundsTo work around this issue, block all traffic to the `/-/api` endpoint. This can be done with a proxy such as Apache or NGINX, or by installing the [datasette-block](https://datasette.io/plugins/datasette-block) plugin and adding the following configuration to your `metadata.json` or `metadata.yml` file:This will block access to the API explorer but will still allow access to the Datasette read or write JSON APIs, as those use different URL patterns within the Datasette `/database` hierarchy.
[]
CVE-2017-5621
An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. XSS can be triggered via malicious HTML in a chat message or the content of a ticket article, when using either the REST API or the WebSocket API.
[ "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*", "cpe:2.3:a:zammad:zammad:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:zammad:zammad:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:zammad:zammad:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:zammad:zammad:1.2.0:*:*:*:*:*:*:*" ]
GHSA-qp4w-p87m-77j3
Check Point Session Authentication Agent allows remote attackers to obtain sensitive information (user credentials) via unspecified vectors.
[]
GHSA-4f8m-7h83-9f6m
XWiki Platform vulnerable to CSRF privilege escalation/RCE via the create action
ImpactThe create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. To reproduce, the XWiki syntax `[[image:path:/xwiki/bin/create/Foo/WebHome?template=&parent=Main.WebHome&title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)]]` can be added to any place that supports XWiki syntax like a comment. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable.PatchesThis has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.WorkaroundsThere are no known workarounds.Referenceshttps://jira.xwiki.org/browse/XWIKI-20849https://github.com/xwiki/xwiki-platform/commit/4b20528808d0c311290b0d9ab2cfc44063380ef7
[]
CVE-2024-2920
The WP-Members Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.4.9.3 due to the plugin uploading user supplied files to a publicly accessible directory in wp-content without any restrictions. This makes it possible for unauthenticated attackers to view files uploaded by other users which may contain sensitive information.
[]
GHSA-8r9p-9pp7-xxpc
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
[]
GHSA-wx3f-pjjp-293h
The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post.
[]
CVE-2018-12576
TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow clickjacking.
[ "cpe:2.3:o:tp-link:tl-wr841n_firmware:0.9.1_4.16:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wr841n:13.0:*:*:*:*:*:*:*" ]
GHSA-hjw6-p8wp-2qwf
The TCP implementation in Sun Solaris 8, 9, and 10 allows remote attackers to cause a denial of service (CPU consumption and new connection timeouts) via a TCP SYN flood attack.
[]
CVE-2016-3801
The MediaTek GPS driver in Android before 2016-07-05 on Android One devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28174914 and MediaTek internal bug ALPS02688853.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2024-3020
The plugin is vulnerable to PHP Object Injection in versions up to and including, 2.6.3 via deserialization of untrusted input in the import function via the 'shortcode' parameter. This allows authenticated attackers, with administrator-level access to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
[ "cpe:2.3:a:shapedplugin:product_slider_for_woocommerce:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:shapedplugin:post_grid\\,_post_carousel\\,_\\&_list_category_posts:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:shapedplugin:logo_carousel:-:*:*:*:*:wordpress:*:*" ]
CVE-2008-2143
Unspecified versions of Microsoft Outlook Web Access (OWA) use the Cache-Control: no-cache HTTP directive instead of no-store, which might cause web browsers that follow RFC-2616 to cache sensitive information.
[ "cpe:2.3:a:microsoft:outlook_web_access:*:*:*:*:*:*:*:*" ]
CVE-2024-26731
bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() syzbot reported the following NULL pointer dereference issue [1]: BUG: kernel NULL pointer dereference, address: 0000000000000000 [...] RIP: 0010:0x0 [...] Call Trace: <TASK> sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 If sk_psock_verdict_data_ready() and sk_psock_stop_verdict() are called concurrently, psock->saved_data_ready can be NULL, causing the above issue. This patch fixes this issue by calling the appropriate data ready function using the sk_psock_data_ready() helper and protecting it from concurrency with sk->sk_callback_lock.
[]
GHSA-qww3-wjff-2gj7
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
[]
GHSA-6f8p-g935-8f29
SPIP 4.0.0 is affected by a remote command execution vulnerability. To exploit the vulnerability, an attacker must craft a malicious picture with a double extension, upload it and then click on it to execute it.
[]
CVE-2019-14936
Easy!Appointments 1.3.2 plugin for WordPress allows Sensitive Information Disclosure (Username and Password Hash).
[ "cpe:2.3:a:easyappointments:easy\\!appointments:1.3.2:*:*:*:*:wordpress:*:*" ]
CVE-2024-8431
Photo Gallery, Images, Slider in Rbs Image Gallery <= 3.2.21 - Missing Authorization to Authenticated (Subscriber+) Private Gallery Title Disclosure
The Photo Gallery, Images, Slider in Rbs Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajaxGetGalleryJson() function in all versions up to, and including, 3.2.21. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve private post titles.
[]
CVE-1999-1319
Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations.
[ "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*" ]
CVE-2024-32418
An issue in flusity CMS v2.33 allows a remote attacker to execute arbitrary code via the add_addon.php component.
[ "cpe:2.3:a:flusity:flusity:2.33:*:*:*:*:*:*:*" ]
CVE-2020-11016
Remote code execution in Message sending functionality in IntelMQ Manager
IntelMQ Manager from version 1.1.0 and before version 2.1.1 has a vulnerability where the backend incorrectly handled messages given by user-input in the "send" functionality of the Inspect-tool of the Monitor component. An attacker with access to the IntelMQ Manager could possibly use this issue to execute arbitrary code with the privileges of the webserver. Version 2.1.1 fixes the vulnerability.
[ "cpe:2.3:a:intelmq_manager_project:intelmq_manager:*:*:*:*:*:*:*:*" ]
GHSA-75g3-c2w4-6cxv
libming 0.4.8 has a NULL pointer dereference in the getName function of the decompile.c file, a different vulnerability than CVE-2018-7872 and CVE-2018-9165.
[]
GHSA-h95j-83q7-272j
Tenda A18 V15.13.07.09 was discovered to contain a stack overflow via the wpapsk_crypto2_4g parameter in the fromSetWirelessRepeat function.
[]
GHSA-68q9-m85g-jq3q
Musescore 3.0 to 4.0.1 has a stack buffer overflow vulnerability that occurs when reading misconfigured midi files. If attacker can additional information, attacker can execute arbitrary code.
[]
CVE-2010-2208
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*" ]
GHSA-j3x6-57xg-f3g3
The turboSMTP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link while logged in to turboSMTP.
[]
CVE-2024-51576
WordPress AMP Img Shortcode plugin <= 1.0.1 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPZA AMP Img Shortcode allows Stored XSS.This issue affects AMP Img Shortcode: from n/a through 1.0.1.
[ "cpe:2.3:a:wpza:amp_img_shortcode:*:*:*:*:*:wordpress:*:*" ]
CVE-2021-25743
ANSI escape characters in kubectl output are not being filtered
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
[ "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*" ]
GHSA-9vj3-f442-h49r
An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated for the msb and mac instructions, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution.
[]
CVE-2024-20982
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.35 and prior and 8.2.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.2.0:*:*:*:*:*:*:*" ]
CVE-2005-0358
EMC Legato NetWorker, Solstice Backup 6.0 and 6.1, and StorEdge Enterprise Backup 6.0 through 7.2 do not properly verify authentication tokens, which allows remote attackers to gain privileges by modifying an authentication token.
[ "cpe:2.3:a:emc:legato_networker:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:legato_networker:7.13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:solstice_backup:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:solstice_backup:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:storedge_enterprise_backup_software:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:storedge_enterprise_backup_software:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:storedge_enterprise_backup_software:7.2:*:*:*:*:*:*:*" ]
CVE-2002-1282
Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote attackers to execute arbitrary code via a certain URL.
[ "cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*" ]
CVE-2019-16523
The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin.
[ "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*" ]
CVE-2020-6654
DLL Hijacking
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.
[ "cpe:2.3:a:eaton:9000x_programming_and_configuration_software:*:*:*:*:*:*:*:*" ]
GHSA-jg8x-xffr-qj4m
Unrestricted file upload vulnerability in phUploader.php in phphq.Net phUploader 1.2 allows remote attackers to upload and execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2020-10393
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-field.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
GHSA-gqpx-99v5-r9g9
Multiple cross-site scripting (XSS) vulnerabilities in World Recipe 2.11 allow remote attackers to inject arbitrary web script or HTML via the (1) n parameter to emailrecipe.aspx, (2) id parameter to recipedetail.aspx, and the (3) catid parameter to validatefieldlength.aspx.
[]
CVE-2008-4080
SQL injection vulnerability in Stash 1.0.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the (1) username parameter to admin/library/authenticate.php and the (2) download parameter to downloadmp3.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:stash:stash:1.0.3:*:*:*:*:*:*:*" ]
GHSA-mpq7-8p6c-8w2f
The JPXStream::readTilePart function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a specific pdf file, as demonstrated by pdftohtml.
[]
CVE-2017-13314
In setAllowOnlyVpnForUids of NetworkManagementService.java, there is a possible security settings bypass due to a missing permission check. This could lead to local escalation of privilege allowing users to access non-VPN networks, when they are supposed to be restricted to the VPN networks, with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ]
CVE-2020-35666
Steedos Platform through 1.21.24 allows NoSQL injection because the /api/collection/findone implementation in server/packages/steedos_base.js mishandles req.body validation, as demonstrated by MongoDB operator attacks such as an X-User-Id[$ne]=1 value.
[ "cpe:2.3:a:steedos:steedos:*:*:*:*:*:*:*:*" ]
GHSA-m2w8-wqfw-qchx
OpenSC before 0.20.0 has a double free in coolkey_free_private_data because coolkey_add_object in libopensc/card-coolkey.c lacks a uniqueness check.
[]
CVE-2024-8329
Gether Technology 6SHR System - SQL Injection
6SHR system from Gether Technology does not properly validate the specific page parameter, allowing remote attackers with regular privilege to inject SQL command to read, modify, and delete database contents.
[ "cpe:2.3:a:gethertechnology:6shr:*:*:*:*:*:*:*:*", "cpe:2.3:a:6shr_system_project:6shr_system:*:*:*:*:*:*:*:*" ]
GHSA-fg8p-6p6r-wh76
Stack-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file.
[]
CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
[ "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*" ]
GHSA-m8r3-7cw4-x3mh
Multiple cross-site scripting (XSS) vulnerabilities in admin/admin.php in Grafik CMS 1.1.2, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) page_menu and (2) description parameters in an edit_page action.
[]
CVE-2010-4175
Integer overflow in the rds_cmsg_rdma_args function (net/rds/rdma.c) in Linux kernel 2.6.35 allows local users to cause a denial of service (crash) and possibly trigger memory corruption via a crafted Reliable Datagram Sockets (RDS) request, a different vulnerability than CVE-2010-3865.
[ "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*" ]
GHSA-5gpj-c4j6-2wgw
Cross-site scripting (XSS) vulnerability in IBM Rational ClearQuest (CQ) Web 7.0.0.0 allows remote attackers to inject arbitrary web script or HTML via an attachment to a defect log entry.
[]
GHSA-32vr-pw5g-2xc5
Rejected reason: This candidate was in a CNA pool that was not assigned to any issues during 2023.
[]
CVE-2018-0580
Untrusted search path vulnerability in CELSYS, Inc CLIP STUDIO series (CLIP STUDIO PAINT (for Windows) EX/PRO/DEBUT Ver.1.7.3 and earlier, CLIP STUDIO ACTION (for Windows) Ver.1.5.5 and earlier, with its timestamp prior to April 25, 2018, 12:11:31, and CLIP STUDIO MODELER (for Windows) Ver.1.6.3 and earlier, with its timestamp prior to April 25, 2018, 17:02:49) allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.
[ "cpe:2.3:a:celsys:clip_studio_action:*:*:*:*:*:windows:*:*", "cpe:2.3:a:celsys:clip_studio_modeler:*:*:*:*:*:windows:*:*", "cpe:2.3:a:celsys:clip_studio_paint:*:*:*:*:*:windows:*:*" ]
CVE-2021-38632
BitLocker Security Feature Bypass Vulnerability
BitLocker Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*" ]
GHSA-cr3c-c3mj-8xqv
PeopleSoft PeopleTools 8.1x, 8.2x, and 8.4x allows remote attackers to execute arbitrary commands by uploading a file to the IClient Servlet, guessing the insufficiently random (system time) name of the directory used to store the file, and directly requesting that file.
[]
CVE-2016-5472
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.54 and 8.55 allows local users to affect confidentiality, integrity, and availability via vectors related to Install and Packaging.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*" ]