Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2015-0544
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.
[ "cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*", "cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*", "cpe:2.3:a:emc:secure_remote_services:3.04:*:*:*:virtual:*:*:*" ]
CVE-2020-1186
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191.
[ "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-99v2-4jx9-8fv3
Microsoft Dataverse Remote Code Execution Vulnerability
[]
CVE-2003-0663
Unknown vulnerability in the Local Security Authority Subsystem Service (LSASS) in Windows 2000 domain controllers allows remote attackers to cause a denial of service via a crafted LDAP message.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*" ]
CVE-2013-5106
A Code Execution vulnerability exists in select.py when using python-mode 2012-12-19.
[ "cpe:2.3:a:python-mode_project:python-mode:2012-12-19:*:*:*:*:*:*:*" ]
CVE-2017-7298
In Moodle 3.2.2+, there is XSS in the Course summary filter of the "Add a new course" page, as demonstrated by a crafted attribute of an SVG element.
[ "cpe:2.3:a:moodle:moodle:3.2.2:*:*:*:*:*:*:*" ]
CVE-2008-5557
Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
[ "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*" ]
CVE-2022-20388
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-rx6g-pr26-7gxj
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization.
[]
CVE-2024-22294
WordPress Download IP2Location Country Blocker Plugin <= 2.33.3 is vulnerable to Sensitive Data Exposure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in IP2Location IP2Location Country Blocker.This issue affects IP2Location Country Blocker: from n/a through 2.33.3.
[ "cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-2257
Password Policy Bypass Vulnerability in Digisol Router
This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
[ "cpe:2.3:o:digisol:dg-gr1321_firmware:3.2.02:*:*:*:*:*:*:*" ]
GHSA-fff2-pwcg-x73m
Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)
[]
GHSA-p4f6-prp8-fmgf
Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a '$' (dollar sign) or '(' (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671.
[]
GHSA-6jfv-28cj-8jrr
mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
[]
GHSA-wwcm-7c7v-g9q6
An issue was discovered on the PLANEX CS-QR20 1.30. A hardcoded account / password ("admin:password") is used in the Android application that allows attackers to use a hidden API URL "/goform/SystemCommand" to execute any command with root permission.
[]
GHSA-9h2c-gmfr-3w4c
A vulnerability was found in Campcodes Online Shopping Portal 1.0. It has been classified as critical. This affects an unknown part of the file /admin/edit-subcategory.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2014-5213
nds/files/opt/novell/eDirectory/lib64/ndsimon/public/images in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote authenticated users to obtain sensitive information from process memory via a direct request.
[ "cpe:2.3:a:novell:edirectory:*:sp8:*:*:*:*:*:*" ]
CVE-2010-0921
Cross-site request forgery (CSRF) vulnerability in IBM Lotus iNotes (aka Domino Web Access or DWA) before 229.281 for Domino 8.0.2 FP4 allows remote attackers to hijack the authentication of unspecified victims via vectors related to lack of "XSS/CSRF Get Filter and Referer Check fixes."
[ "cpe:2.3:a:ibm:lotus_inotes:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.011:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.021:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.031:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.041:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.051:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.061:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.101:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.111:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.131:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.141:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.151:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.161:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.171:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.181:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.191:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.201:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.211:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.221:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.231:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.241:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.251:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:229.261:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*" ]
CVE-2014-0945
Cross-site scripting (XSS) vulnerability in the RES Console in Rule Execution Server in IBM Operational Decision Manager 7.5 before FP3 IF37, 8.0 before MP1 FP2, and 8.5 before MP1 IF26 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:operational_decision_manager:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:operational_decision_manager:8.5:*:*:*:*:*:*:*" ]
CVE-2014-7845
The generate_password function in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not provide a sufficient number of possible temporary passwords, which allows remote attackers to obtain access via a brute-force attack.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*" ]
GHSA-x88q-cqfj-5v26
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, and 1.0.5 could disclose sensitive information to an unauthorized user due to insufficient timeout functionality in the Web UI. IBM X-Force ID: 176334.
[]
CVE-2017-16417
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is a part of the font parsing module. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*" ]
GHSA-v5h9-4559-8f5h
Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
[]
GHSA-h6mp-42gx-78qp
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c.
[]
CVE-2023-47064
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*" ]
GHSA-f7rp-xx67-4pj9
Phachon mm-wiki vulnerable to stored cross-site scripting (XSS)
Phachon mm-wiki v.0.1.2 vulnerable to stored cross-site scripting (XSS). This could allow a remote attacker to execute arbitrary code via JavaScript code in the markdown editor. Any user browsing the document containing XSS malicious code will trigger the vulnerability.
[]
CVE-2020-16281
The Kommbox component in Rangee GmbH RangeeOS 8.0.4 could allow a local authenticated attacker to escape from the restricted environment and execute arbitrary code due to unrestricted context menus being accessible.
[ "cpe:2.3:a:rangee:rangeeos:8.0.4:*:*:*:*:*:*:*" ]
CVE-2025-27332
WordPress Smart Maintenance & Countdown Plugin <= 1.2 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in gmnazmul Smart Maintenance & Countdown allows Stored XSS. This issue affects Smart Maintenance & Countdown: from n/a through 1.2.
[]
CVE-2016-5318
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
[ "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*" ]
GHSA-px5w-6xv9-xcqp
The Asus ASUS_A002 Android device with a build fingerprint of asus/WW_ASUS_A002/ASUS_A002:7.0/NRD90M/14.1600.1805.51-20180626:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[]
GHSA-7c6p-848j-wh5h
Composer code execution and possible privilege escalation via compromised InstalledVersions.php or installed.php
ImpactSeveral files within the local working directory are included during the invocation of Composer and in the context of the executing user.As such, under certain conditions arbitrary code execution may lead to local privilege escalation, provide lateral user movement or malicious code execution when Composer is invoked within a directory with tampered files.All Composer CLI commands are affected, including composer.phar's self-update.The following are of high risk:Composer being run with sudo.Pipelines which may execute Composer on untrusted projects.Shared environments with developers who run Composer individually on the same project.Patches2.7.0, 2.2.23WorkaroundsIt is advised that the patched versions are applied at the earliest convenience.Where not possible, the following should be addressed:Remove all sudo composer privileges for all users to mitigate root privilege escalation.Avoid running Composer within an untrusted directory, or if needed, verify that the contents of `vendor/composer/InstalledVersions.php` and `vendor/composer/installed.php` do not include untrusted code.A reset can also be done on these files by the following:
[]
GHSA-qcc8-2v4m-qw7h
Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
[]
CVE-2019-12477
Supra Smart Cloud TV allows remote file inclusion in the openLiveURL function, which allows a local attacker to broadcast fake video without any authentication via a /remote/media_control?action=setUri&uri= URI.
[ "cpe:2.3:o:supra:stv-lc40lt0020f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:supra:stv-lc40lt0020f:-:*:*:*:*:*:*:*" ]
CVE-2007-5413
httpd.tkd in Radia Integration Server in Hewlett-Packard (HP) OpenView Configuration Management (CM) Infrastructure 4.0 through 4.2i and Client Configuration Manager (CCM) 2.0 allows remote attackers to read arbitrary files via URLs containing tilde (~) references to home directories, as demonstrated by ~root.
[ "cpe:2.3:a:hp:openview_client_configuraton_manager:2.0:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.0:*:aix:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.0:*:hpux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.0:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.0:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.0:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.1:*:aix:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.1:*:hpux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.1:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.1:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.1:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2:*:aix:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2:*:hpux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2:*:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2i:*:aix:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2i:*:hpux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2i:*:linux:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2i:*:solaris:*:*:*:*:*", "cpe:2.3:a:hp:openview_configuration_management:4.2i:*:windows:*:*:*:*:*" ]
CVE-2007-0061
The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers "corrupt stack memory."
[ "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" ]
CVE-2018-18880
In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a networkdiags.php reflected Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script.
[ "cpe:2.3:o:columbiaweather:weather_microserver_firmware:ms_2.6.9900:*:*:*:*:*:*:*", "cpe:2.3:h:columbiaweather:weather_microserver:-:*:*:*:*:*:*:*" ]
GHSA-mc64-v3mw-vq6w
Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
[]
CVE-2016-0663
Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to Performance Schema.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
GHSA-9c43-6hr9-gv5m
An issue was discovered in S-CMS v1.5. There is a SQL injection vulnerability in search.php via the keyword parameter.
[]
GHSA-rx8q-xg7h-mqpc
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fyljp SpiderDisplay allows Reflected XSS. This issue affects SpiderDisplay: from n/a through 1.9.1.
[]
GHSA-3f45-mmr7-7f4p
JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
[]
CVE-2021-0673
In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
GHSA-9xhv-3vhq-92w6
A stack-based buffer overflow vulnerability has been identified in Teledyne DALSA Sherlock Version 7.2.7.4 and prior, which may allow remote code execution.
[]
GHSA-8v3r-gw3g-qx4m
An issue was discovered in TopManage OLK 2020. As there is no ReadOnly on the Session cookie, the user and admin accounts can be taken over in a DOM-Based XSS attack.
[]
GHSA-cxmh-cjjc-hchp
The error checking routine used for the C_Verify call on a symmetric verification key in the nCipher PKCS#11 library 1.2.0 and later returns the CKR_OK status even when it detects an invalid signature, which could allow remote attackers to modify or forge messages.
[]
GHSA-gxhq-965f-5wv4
Unspecified vulnerability in Opera before 11.10 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by futura-sciences.com, seoptimise.com, and mitosyfraudes.org.
[]
CVE-2008-4666
SQL injection vulnerability in webboard.php in Ultimate Webboard 3.00 allows remote attackers to execute arbitrary SQL commands via the Category parameter.
[ "cpe:2.3:a:deeserver:ultimate_webboard:3.00:*:*:*:*:*:*:*" ]
GHSA-2x28-c7j7-23gv
Subrion remote command execution vulnerability
Subrion 4.2.1 has a remote command execution vulnerability in the backend.
[]
CVE-2020-4778
IBM Curam Social Program Management 7.0.9 and 7.0.10 uses MD5 algorithm for hashing token in a single instance which less safe than default SHA-256 cryptographic algorithm used throughout the Cúram application. IBM X-Force ID: 189156.
[ "cpe:2.3:a:ibm:curam_social_program_management:7.0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:7.0.10.0:*:*:*:*:*:*:*" ]
GHSA-698q-p785-rxxv
3DSecure 2.0 allows XSS in its 3DSMethod Authentication via a modified params parameter in a /rest/online request with a /redirect?action=challenge&txn= substring.
[]
CVE-2013-2653
security/MemberLoginForm.php in SilverStripe 3.0.3 supports login using a GET request, which makes it easier for remote attackers to conduct phishing attacks without detection by the victim.
[ "cpe:2.3:a:silverstripe:silverstripe:3.0.3:*:*:*:*:*:*:*" ]
CVE-2015-4648
Stack-based buffer overflow in the Ipropsapi.ipropsapiCtrl.1 ActiveX control in ipropsapivideo in Panasonic Security API (PS-API) ActiveX SDK before 8.10.18 allows remote attackers to execute arbitrary code via a long string to the MulticastAddr method.
[ "cpe:2.3:a:panasonic:security_api_activex_sdk:*:*:*:*:*:*:*:*" ]
GHSA-hw8c-33xc-vg7v
Cross-site scripting (XSS) vulnerability in skins/ace/popup-notopic.php in MindTouch OpenGarden DekiWiki before Gooseberry++ allows remote attackers to inject arbitrary web script or HTML via the message parameter.
[]
CVE-2018-17476
Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-829j-8cmx-37h4
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
[]
CVE-2017-5553
Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL.
[ "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*" ]
CVE-2003-0242
IPSec in Mac OS X before 10.2.6 does not properly handle certain incoming security policies that match by port, which could allow traffic that is not explicitly allowed by the policies.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
CVE-2022-41199
Due to lack of proper memory management, when a victim opens a manipulated Open Inventor File (.iv, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:*:*:*:*:*:*:*:*" ]
GHSA-vw72-3qh4-x2wh
Unspecified vulnerability in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to the "put bit buffer when num_saved_bits is reset."
[]
GHSA-5752-wxxv-m9xh
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix crash due to out of bounds access into reg2btf_ids.When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier reg type to the appropriate btf_vmlinux BTF ID, however commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL") moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after the base register types, and defined other variants using type flag composition. However, now, the direct usage of reg->type to index into reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to out of bounds access and kernel crash on dereference of bad pointer.
[]
CVE-2008-5007
create_lazarus_export_tgz.sh in lazarus 0.9.24 allows local users to overwrite or delete arbitrary files via a symlink attack on a (1) /tmp/lazarus.tgz temporary file or a (2) /tmp/lazarus temporary directory.
[ "cpe:2.3:a:lazarus:lazarus:0.9.24:*:*:*:*:*:*:*" ]
GHSA-3fw2-3g64-5h2v
Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34728, CVE-2022-38006.
[]
CVE-2024-54333
WordPress Check Pincode For Woocommerce plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in silverplugins217 Check Pincode For Woocommerce allows Reflected XSS.This issue affects Check Pincode For Woocommerce: from n/a through 1.1.
[]
CVE-2016-10954
The Neosense theme before 1.8 for WordPress has qquploader unrestricted file upload.
[ "cpe:2.3:a:dynamicpress:neosense:*:*:*:*:*:wordpress:*:*" ]
CVE-2021-29606
Heap OOB read in TFLite
TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of `Split_V`(https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the `SizeOfDimension` function(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
GHSA-mxh3-24xj-7crf
A vulnerability in the API implementation of Cisco ACI Multi-Site Orchestrator (MSO) could allow an authenticated, remote attacker to elevate privileges on an affected device. This vulnerability is due to improper authorization on specific APIs. An attacker could exploit this vulnerability by sending crafted HTTP requests. A successful exploit could allow an attacker who is authenticated with non-Administrator privileges to elevate to Administrator privileges on an affected device.
[]
CVE-2009-1377
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" ]
GHSA-74x8-6hh6-9qvg
The mintToken function of a smart contract implementation for Coinstar (CSTR), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
CVE-2006-1997
Unspecified vulnerability in Sybase Pylon Anywhere groupware synchronization server before 7.0 allows local users to obtain sensitive information such as email and PIM data of another user via unknown attack vectors.
[ "cpe:2.3:a:sybase:pylon_anywhere:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:sybase:pylon_anywhere:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:sybase:pylon_anywhere:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:sybase:pylon_anywhere:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sybase:pylon_anywhere:6.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:sybase:pylon_anywhere:6.4.9:*:*:*:*:*:*:*" ]
CVE-2008-5918
Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl function in index.php in WebSVN 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[ "cpe:2.3:a:tigris:websvn:*:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.04:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.31a:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.33:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.37:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.38:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.39:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.61:*:*:*:*:*:*:*", "cpe:2.3:a:tigris:websvn:1.62:*:*:*:*:*:*:*" ]
GHSA-38h8-x697-gh8q
Tmp files readable by other users in sync-exec
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.RecommendationThere is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.
[]
CVE-2024-48282
A SQL Injection vulnerability was found in /password-recovery.php of PHPGurukul User Registration & Login and User Management System 3.2, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the femail parameter in a POST HTTP request.
[ "cpe:2.3:a:phpgurukul:user_registration_and_login_and_user_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2004-0836
Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" ]
CVE-2024-50304
ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the control path where the mutex is taken. Add a lockdep expression to hlist_for_each_entry_rcu() in ip_tunnel_find() in order to validate that the mutex is held and to silence the suspicious RCU usage warning [1]. [1] WARNING: suspicious RCU usage 6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted ----------------------------- net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by ip/362: #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60 stack backtrace: CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Call Trace: <TASK> dump_stack_lvl+0xba/0x110 lockdep_rcu_suspicious.cold+0x4f/0xd6 ip_tunnel_find+0x435/0x4d0 ip_tunnel_newlink+0x517/0x7a0 ipgre_newlink+0x14c/0x170 __rtnl_newlink+0x1173/0x19c0 rtnl_newlink+0x6c/0xa0 rtnetlink_rcv_msg+0x3cc/0xf60 netlink_rcv_skb+0x171/0x450 netlink_unicast+0x539/0x7f0 netlink_sendmsg+0x8c1/0xd80 ____sys_sendmsg+0x8f9/0xc20 ___sys_sendmsg+0x197/0x1e0 __sys_sendmsg+0x122/0x1f0 do_syscall_64+0xbb/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*" ]
GHSA-gwq2-m8h6-8gvq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wiredmindshelp LeadLab by wiredminds allows Reflected XSS. This issue affects LeadLab by wiredminds: from n/a through 1.3.
[]
GHSA-9rjp-j2f3-hgr2
A vulnerability has been found in PHPGurukul Bank Locker Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /changeidproof.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2025-21235
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
[]
GHSA-fm68-v3v6-jm8v
Unrestricted file upload vulnerability in PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to execute arbitrary code by uploading a ColdFusion page, and then accessing it via unspecified vectors.
[]
CVE-2016-6087
IBM Domino 8.5 and 9.0 could allow an attacker to steal credentials using multiple sessions and large amounts of data using Domino TLS Key Exchange validation. IBM X-Force ID: 117918.
[ "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.7:*:*:*:*:*:*:*" ]
CVE-2020-2633
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Connector Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*" ]
GHSA-3x49-h2mv-h459
Insufficient permissions in Ivanti Patch SDK before version 9.7.703 allows a local authenticated attacker to delete arbitrary files.
[]
CVE-2024-27337
Kofax Power PDF TIF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
Kofax Power PDF TIF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22033.
[ "cpe:2.3:a:kofax:power_pdf:*:*:*:*:*:*:*:*" ]
GHSA-69j6-29vr-p3j9
Authentication bypass for viewing and deletions of snapshots
Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly.CVE-2021-39226 Snapshot authentication bypassSummaryCVSS Score: 9.8 Critical CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HWe received a security report to [[email protected]](mailto:[email protected]) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability.ImpactUnauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths:`/dashboard/snapshot/:key`, or`/api/snapshots/:key`If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path:`/api/snapshots-delete/:deleteKey`Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths:`/api/snapshots/:key`, or`/api/snapshots-delete/:deleteKey`The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.Attack auditWhile we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment.Through reverse proxy/load balancer logsTo determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK). For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job="nginx-ingress-controller"} |= "\"status\": 200" |= "\"uri\": \"/api/snapshots/:key\""`.Through the Grafana Enterprise audit featureIf you enabled “Log web requests” in your configuration with `router_logging = true`, look for `"requestUri":"/api/snapshots-delete/”`,`“requestUri":"/api/snapshots/:key"`, or `"type":"snapshot"` in combination with `"action":"delete"`.Patched versionsRelease 8.1.6:[Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6)[Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/)Release 7.5.11:[Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11)[Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/)Solutions and mitigationsDownload and install the appropriate patch for your version of Grafana.[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.WorkaroundIf for some reason you cannot upgrade:You can use a reverse proxy or similar to block access to the literal paths`/api/snapshots/:key``/api/snapshots-delete/:deleteKey``/dashboard/snapshot/:key``/api/snapshots/:key`They have no normal function and can be disabled without side effects.Timeline and postmortemHere is a detailed timeline starting from when we originally learned of the issue. All times in UTC.2021-09-15 14:49: Tuan Tran [email protected] sends initial report about viewing snapshots without authentication2021-09-15 15:56: Initial reproduction2021-09-15 17:10: MEDIUM severity declared2021-09-15 18:58: Workaround deployed on Grafana Cloud2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more.2021-09-16 09:35: HIGH severity declared2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS2021-09-16 11:19: CRITICAL declared2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation2021-09-23: Grafana Cloud instances updated2021-09-28 12:00: Grafana Enterprise images released to customers under embargo2021-10-05 17:00: Public releaseReporting security issuesIf you think you have found a security vulnerability, please send a report to [[email protected]](mailto:[email protected]). This address can be used for all of Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CAThe key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index.Security announcementsWe maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements), where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss).AcknowledgementWe would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us.
[]
CVE-2021-21643
Jenkins Config File Provider Plugin 3.7.0 and earlier does not correctly perform permission checks in several HTTP endpoints, allowing attackers with global Job/Configure permission to enumerate system-scoped credentials IDs of credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*" ]
CVE-2020-2729
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: Advanced Console). Supported versions that are affected are 11.1.2.3.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Identity Manager accessible data as well as unauthorized read access to a subset of Identity Manager accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:identity_manager:11.1.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:identity_manager:12.2.1.3.0:*:*:*:*:*:*:*" ]
GHSA-vhrf-w875-h9vr
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401When users run the command:cat /sys/kernel/debug/dri/0/amdgpu_dm_dtn_logThe following NULL pointer dereference happens:[ +0.000003] BUG: kernel NULL pointer dereference, address: NULL [ +0.000005] #PF: supervisor instruction fetch in kernel mode [ +0.000002] #PF: error_code(0x0010) - not-present page [ +0.000002] PGD 0 P4D 0 [ +0.000004] Oops: 0010 [#1] PREEMPT SMP NOPTI [ +0.000003] RIP: 0010:0x0 [ +0.000008] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [...] [ +0.000002] PKRU: 55555554 [ +0.000002] Call Trace: [ +0.000002] <TASK> [ +0.000003] ? show_regs+0x65/0x70 [ +0.000006] ? __die+0x24/0x70 [ +0.000004] ? page_fault_oops+0x160/0x470 [ +0.000006] ? do_user_addr_fault+0x2b5/0x690 [ +0.000003] ? prb_read_valid+0x1c/0x30 [ +0.000005] ? exc_page_fault+0x8c/0x1a0 [ +0.000005] ? asm_exc_page_fault+0x27/0x30 [ +0.000012] dcn10_log_color_state+0xf9/0x510 [amdgpu] [ +0.000306] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? vsnprintf+0x2fb/0x600 [ +0.000009] dcn10_log_hw_state+0xfd0/0xfe0 [amdgpu] [ +0.000218] ? __mod_memcg_lruvec_state+0xe8/0x170 [ +0.000008] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? debug_smp_processor_id+0x17/0x20 [ +0.000003] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? set_ptes.isra.0+0x2b/0x90 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? _raw_spin_unlock+0x19/0x40 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? do_anonymous_page+0x337/0x700 [ +0.000004] dtn_log_read+0x82/0x120 [amdgpu] [ +0.000207] full_proxy_read+0x66/0x90 [ +0.000007] vfs_read+0xb0/0x340 [ +0.000005] ? __count_memcg_events+0x79/0xe0 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? count_memcg_events.constprop.0+0x1e/0x40 [ +0.000003] ? handle_mm_fault+0xb2/0x370 [ +0.000003] ksys_read+0x6b/0xf0 [ +0.000004] __x64_sys_read+0x19/0x20 [ +0.000003] do_syscall_64+0x60/0x130 [ +0.000004] entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ +0.000003] RIP: 0033:0x7fdf32f147e2 [...]This error happens when the color log tries to read the gamut remap information from DCN401 which is not initialized in the dcn401_dpp_funcs which leads to a null pointer dereference. This commit addresses this issue by adding a proper guard to access the gamut_remap callback in case the specific ASIC did not implement this function.
[]
CVE-2022-46322
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ]
GHSA-x45w-xc46-348w
IBM MQ 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.3 CD and IBM MQ Appliance 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.2 LTS, under certain configurations, is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 250397.
[]
GHSA-4v59-chwx-688h
Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index.
[]
CVE-2013-5771
Unspecified vulnerability in the XML Parser component in Oracle Database Server 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote attackers to affect confidentiality and availability via unknown vectors.
[ "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*" ]
CVE-2017-20084
JUNG Smart Visu Server KNX Group Address backdoor
A vulnerability has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832 and classified as critical. Affected by this vulnerability is an unknown functionality of the component KNX Group Address. The manipulation leads to backdoor. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component.
[ "cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.804:*:*:*:*:*:*:*", "cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.830:*:*:*:*:*:*:*", "cpe:2.3:o:jung-group:smart_visu_server_firmware:1.0.832:*:*:*:*:*:*:*", "cpe:2.3:h:jung-group:smart_visu_server:-:*:*:*:*:*:*:*" ]
CVE-2005-4683
PADL MigrationTools 46, when a failure occurs, stores contents of /etc/shadow in a world-readable /tmp/nis.$$.ldif file, and possibly other sensitive information in other temporary files, which are not properly managed by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh.
[ "cpe:2.3:a:padl_software:migrationtools:46:*:*:*:*:*:*:*" ]
CVE-2001-0065
Buffer overflow in bftpd 1.0.13 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long SITE CHOWN command.
[ "cpe:2.3:a:max-wilhelm_bruker:bftpd:1.0.13:*:*:*:*:*:*:*" ]
GHSA-75wr-7cmg-f792
YoruFukurou (NightOwl) before 2.85 relies on support for emoji skin-tone modifiers even though this support is missing from the CoreText CTFramesetter API on OS X 10.9, which allows remote attackers to cause a denial of service (application crash) via a crafted emoji character sequence.
[]
CVE-2020-13999
ScaleViewPortExtEx in libemf.cpp in libEMF (aka ECMA-234 Metafile Library) 1.0.12 allows an integer overflow and denial of service via a crafted EMF file.
[ "cpe:2.3:a:libemf_project:libemf:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
GHSA-r3qm-7q4q-jc3r
OX App Suite 7.10.3 and earlier allows XSS via text/x-javascript, text/rdf, or a PDF document.
[]
CVE-2025-1243
Field in api-go proxy not transformed before version 1.44.1
The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1. Other data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted.
[]
GHSA-j27h-7jg7-4q9j
Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5078.
[]
CVE-2018-19519
In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.
[ "cpe:2.3:a:tcpdump:tcpdump:4.9.2:*:*:*:*:*:*:*" ]
GHSA-cp67-8w3w-6h9c
Path Traversal
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
[]