id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-g2j8-6pgv-mpjm
Improper validation of backend id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
[]
GHSA-h98h-qp56-wrjw
Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.
[]
GHSA-r6m8-h5v3-6mmw
The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2022-32972
Infoblox BloxOne Endpoint for Windows through 2.2.7 allows DLL injection that can result in local privilege escalation.
[ "cpe:2.3:a:infoblox:bloxone_endpoint:*:*:*:*:*:windows:*:*" ]
GHSA-hwvv-cf85-p845
Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a high-privileged user account.
[]
GHSA-p24g-8vxx-2vm3
Zimbra Collaboration before 8.7.0 allows remote attackers to conduct deserialization attacks via unspecified vectors, aka bug 102276.
[]
GHSA-g75p-qvp4-j95j
IBM ManageIQ could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted yaml file request.
[]
CVE-2018-8441
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" ]
CVE-2024-6381
MongoDB C Driver bson_strfreev may be susceptible to integer overflow
The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2
[ "cpe:2.3:a:mongodb:libbson:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:0.98.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.6.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.7.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.7.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.8.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.8.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.8.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.0:-:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.18.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.18.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.22.0:beta0:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.23.5:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.24.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.24.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.25.2:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.25.4:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:mongodb:libbson:1.26.1:*:*:*:*:*:*:*" ]
GHSA-c9r2-56cr-xpqg
Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network.
[]
CVE-2024-49910
drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func This commit adds a null check for the set_output_gamma function pointer in the dcn401_set_output_transfer_func function. Previously, set_output_gamma was being checked for null, but then it was being dereferenced without any null check. This could lead to a null pointer dereference if set_output_gamma is null. To fix this, we now ensure that set_output_gamma is not null before dereferencing it. We do this by adding a null check for set_output_gamma before the call to set_output_gamma.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2013-3404
SQL injection vulnerability in Cisco Unified Communications Manager (CUCM) 7.1(x) through 9.1(1a) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, leading to discovery of encrypted credentials by leveraging metadata, aka Bug ID CSCuh01051.
[ "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(2b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3a\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(3b\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:7.1\\(5b\\)su6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(2c\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.0\\(3a\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.5\\(1\\)su5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(2a\\)su3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:8.6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:9.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:9.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:9.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:9.1.1\\(a\\):*:*:*:*:*:*:*" ]
CVE-2011-1945
The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
[ "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*" ]
GHSA-g975-6398-g6r8
The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403.
[]
GHSA-fm8c-whcx-jx6x
Buffer overflow in l2cap.c in hcidump 1.29 allows remote attackers to cause a denial of service (crash) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet.
[]
CVE-2025-4714
Campcodes Sales and Inventory System reprint.php sql injection
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been classified as critical. Affected is an unknown function of the file /pages/reprint.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-4894-5vqc-6r2r
Django cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget
Cross-site scripting (XSS) vulnerability in the AdminURLFieldWidget widget in contrib/admin/widgets.py in Django 1.5.x before 1.5.2 and 1.6.x before 1.6 beta 2 allows remote attackers to inject arbitrary web script or HTML via a URLField.
[]
GHSA-g4pv-55wx-3w8q
In bluetooth service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07933038; Issue ID: MSV-559.
[]
CVE-2020-25245
A vulnerability has been identified in DIGSI 4 (All versions < V4.94 SP1 HF 1). Several folders in the %PATH% are writeable by normal users. As these folders are included in the search for dlls, an attacker could place dlls there with code executed by SYSTEM.
[ "cpe:2.3:a:siemens:digsi_4:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:digsi_4:4.94:-:*:*:*:*:*:*", "cpe:2.3:a:siemens:digsi_4:4.94:sp1:*:*:*:*:*:*" ]
CVE-2020-2519
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" ]
CVE-2023-40732
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The QMS.Mobile module of the affected application does not invalidate the session token on logout. This could allow an attacker to perform session hijacking attacks.
[ "cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*" ]
CVE-2018-15991
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
GHSA-2rfw-3jfg-3f64
Adobe ColdFusion MX 7 for Linux and Solaris uses insecure permissions for certain scripts and directories, which allows local users to execute arbitrary code or obtain sensitive information via the (1) CFMX7DreamWeaverExtensions.mxp, (2) CFReportBuilderInstaller.exe, (3) .com.zerog.registry.xml, (4) uninstall.lax, (5) license.txt, (6) Readme.htm, (7) .com.zerog.registry.xml, (8) k2adminstop, or (9) k2adminstart files; or (10) certain files in lib/wsconfig/.
[]
CVE-2008-6324
SQL injection vulnerability in forummessages.cfm in CF_Forum allows remote attackers to execute arbitrary SQL commands via the categorynbr parameter.
[ "cpe:2.3:a:cfmsource:cf_forum:-:*:*:*:*:*:*:*" ]
CVE-2007-0879
Buffer overflow in SmidgeonSoft PEBrowse Professional 8.2.1.0 allows user-assisted remote attackers to execute arbitrary code via certain executable files in PE format. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:smidgeonsoft:pebrowse:professional_8.2.1.0:*:*:*:*:*:*:*" ]
GHSA-xrxq-x8xp-9x7h
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to send an malicious request to the application, which could disclose the internal version details of the affected system. This vulnerability has low impact on confidentiality, with no effect on integrity and availability of the application.
[]
GHSA-3g5j-8vj8-rhj3
Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing attackers to obtain sensitive information from process memory or cause a crash.
[]
CVE-1999-0463
Remote attackers can perform a denial of service using IRIX fcagent.
[ "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*" ]
GHSA-vpr2-5gxq-hjc6
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.
[]
CVE-2007-2244
Multiple buffer overflows in Adobe Photoshop CS2 and CS3, Illustrator CS3, and GoLive 9 allow user-assisted remote attackers to execute arbitrary code via a crafted (1) BMP, (2) DIB, or (3) RLE file.
[ "cpe:2.3:a:adobe:golive:9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:illustrator:cs3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:photoshop:9.0.2:*:*:*:*:*:*:*" ]
GHSA-4pg4-qvpc-4q3h
Multer vulnerable to Denial of Service from maliciously crafted requests
ImpactA vulnerability in Multer versions >=1.4.4-lts.1 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process.PatchesUsers should upgrade to `2.0.0`WorkaroundsNoneReferenceshttps://github.com/expressjs/multer/issues/1176https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
[]
GHSA-4cvv-4v6h-5hq7
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
[]
GHSA-g38j-rgpp-8873
lavc_CopyPicture in modules/codec/avcodec/video.c in VideoLAN VLC media player through 3.0.7 has a heap-based buffer over-read because it does not properly validate the width and height.
[]
CVE-2023-53085
drm/edid: fix info leak when failing to get panel id
In the Linux kernel, the following vulnerability has been resolved: drm/edid: fix info leak when failing to get panel id Make sure to clear the transfer buffer before fetching the EDID to avoid leaking slab data to the logs on errors that leave the buffer unchanged.
[]
GHSA-4556-6gxj-6r9w
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15534.
[]
GHSA-gh9h-qjxh-2mh7
In the Linux kernel, the following vulnerability has been resolved:NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECTFix an Oopsable condition in pnfs_mark_request_commit() when we're putting a set of writes on the commit list to reschedule them after a failed pNFS attempt.
[]
CVE-2024-37776
A cross-site scripting (XSS) vulnerability in Sunbird DCIM dcTrack v9.1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in some admin screens.
[]
CVE-2022-24888
Possible Injection in Nextcloud Server
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*" ]
GHSA-pwg3-f8g7-h57r
a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819
[]
CVE-2025-3750
Network Posts Extended <= 7.7.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via post_height Parameter
The Network Posts Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘post_height’ parameter in all versions up to, and including, 7.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-3v2r-gf9x-wpgw
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 15.7 and iPadOS 15.7, iOS 16.1 and iPadOS 16. An app may be able to access iOS backups.
[]
CVE-2024-13879
Stream <= 4.0.2 - Authenticated (Admin+) Server-Side Request Forgery
The Stream plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.2 due to insufficient validation on the webhook feature. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.
[]
GHSA-jfc7-8mx8-j3w5
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
[]
GHSA-pg83-j9v9-qgmq
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
CVE-2024-43974
WordPress ReviveNews theme <= 1.0.2 - Broken Access Control vulnerability
Missing Authorization vulnerability in CozyThemes ReviveNews allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ReviveNews: from n/a through 1.0.2.
[ "cpe:2.3:a:cozythemes:revivenews:*:*:*:*:*:*:*:*", "cpe:2.3:a:cozythemes:revivenews:*:*:*:*:*:wordpress:*:*" ]
GHSA-cwf6-xj49-wp83
OpenFeature Operator vulnerable to Cluster-level Privilege Escalation
ImpactOn a node controlled by an attacker or malicious user, the lax permissions configured on `open-feature-operator-controller-manager` can be used to further escalate the privileges of any service account in the cluster.The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets.PatchesThe patch mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify.
[]
GHSA-6g96-g4m6-hw69
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
[]
CVE-2024-21505
Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge. An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
[ "cpe:2.3:a:web3:web3-utils:*:*:*:*:*:*:*:*" ]
CVE-2022-46949
Helmet Store Showroom Site v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_helmet.
[ "cpe:2.3:a:helmet_store_showroom_site_project:helmet_store_showroom_site:1.0:*:*:*:*:*:*:*" ]
GHSA-rwm6-qx2j-8fmr
A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image.
[]
GHSA-h42w-vj6w-2rvp
Out of bound memory access during music playback with ALAC modified content due to improper validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
[]
GHSA-vm64-cfqx-3698
Code Injection in jsen
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so it is assumed that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a `Function.apply();`, leading to an Arbitrary Code Execution.PoC
[]
GHSA-ww68-p9c4-2353
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Fusion Middleware MapViewer, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Fusion Middleware MapViewer accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
CVE-2017-6576
A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/campaign-delete.php with the GET Parameter: id.
[ "cpe:2.3:a:mail-masta_project:mail-masta:1.0:*:*:*:*:wordpress:*:*" ]
GHSA-7w8h-97qm-v5g3
Oracle Database 10g uses a NULL pDacl parameter when calling the SetSecurityDescriptorDacl function to create discretionary access control lists (DACLs), which allows local users to gain privileges.
[]
GHSA-xjhh-xcpq-fjx4
IBM Db2 11.2 and 11.5 contains an information disclosure vulnerability, exposing remote storage credentials to privileged users under specific conditions. IBM X-Fporce ID: 201780.
[]
GHSA-83c5-hghm-jg6r
Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format
[]
GHSA-3p4r-x5mr-f32g
TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is discovered to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[]
CVE-2023-5689
Cross-site Scripting (XSS) - DOM in modoboa/modoboa
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2.
[ "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:modoboa:*:*", "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:*" ]
CVE-2022-2778
In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes.
[ "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2005-2014
The "upload a language pack" feature in paFAQ 1.0 Beta 4 allows remote authenticated administrators to execute arbitrary PHP commands by uploading a malicious language pack.
[ "cpe:2.3:a:php_arena:pafaq:1.0_beta_4:*:*:*:*:*:*:*" ]
CVE-2023-21538
.NET Denial of Service Vulnerability
.NET Denial of Service Vulnerability
[ "cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:microsoft:powershell:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
GHSA-qqp5-v5ph-5jqv
makeXML_ListServices.php in Centreon Web before 2.8.28 allows attackers to perform SQL injections via the host_id parameter.
[]
GHSA-j5m6-wqrx-ch36
A vulnerability was found in Dromara MaxKey up to 4.1.7 and classified as critical. This issue affects the function Add of the file maxkey-webs\maxkey-web-mgt\src\main\java\org\dromara\maxkey\web\apps\contorller\SAML20DetailsController.java of the component Meta URL Handler. The manipulation of the argument post leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-q4pm-3jvq-rm3m
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
[]
GHSA-5c25-x6hc-jh4h
A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability.
[]
GHSA-fm87-86w5-6fp9
The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL.
[]
GHSA-42v8-4h63-pf87
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
GHSA-w5h5-p497-87g9
Server-Side Request Forgery (SSRF) vulnerability in Blubrry PowerPress Podcasting plugin by Blubrry.This issue affects PowerPress Podcasting plugin by Blubrry: from n/a through 11.0.6.
[]
GHSA-7wwr-p84q-qr3q
Typo3 Backend XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in the Backend component in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2012-5788
The PayPal IPN utility does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the PHP fsockopen function.
[ "cpe:2.3:a:paypal:ipn:-:*:*:*:*:*:*:*" ]
CVE-2021-31497
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13311.
[ "cpe:2.3:a:opentext:brava\\!_desktop:16.6.3.84:*:*:*:*:*:*:*" ]
GHSA-4p43-8hvm-wfj7
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges.
[]
CVE-2022-20153
In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2019-8408
OneFileCMS 3.6.13 allows remote attackers to modify onefilecms.php by clicking the Copy button twice.
[ "cpe:2.3:a:onefilecms:onefilecms:3.6.13:*:*:*:*:*:*:*" ]
GHSA-jg35-f72m-4r85
SQL injection vulnerability in rscms_mod_newsview.php in RS-CMS 2.1 allows remote attackers to execute arbitrary SQL commands via the key parameter.
[]
CVE-2013-2048
ownCloud before 5.0.6 does not properly check permissions, which allows remote authenticated users to execute arbitrary API commands via unspecified vectors. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary API commands.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*" ]
CVE-2017-12644
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.6-1:*:*:*:*:*:*:*" ]
CVE-2020-8551
Kubernetes kubelet denial of service
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
[ "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
CVE-2024-37129
Dell Inventory Collector, versions prior to 12.3.0.6 contains a Path Traversal vulnerability. A local authenticated malicious user could potentially exploit this vulnerability, leading to arbitrary code execution on the system.
[ "cpe:2.3:a:dell:command_update:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:update:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:alienware_update:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:inventory_collector:*:*:*:*:*:*:*:*" ]
GHSA-x8w4-347h-wwmw
In the Linux kernel, the following vulnerability has been resolved:video: fbdev: vt8623fb: Check the size of screen before memset_io()In the function vt8623fb_set_par(), the value of 'screen_size' is calculated by the user input. If the user provides the improper value, the value of 'screen_size' may larger than 'info->screen_size', which may cause the following bug:[ 583.339036] BUG: unable to handle page fault for address: ffffc90005000000 [ 583.339049] #PF: supervisor write access in kernel mode [ 583.339052] #PF: error_code(0x0002) - not-present page [ 583.339074] RIP: 0010:memset_orig+0x33/0xb0 [ 583.339110] Call Trace: [ 583.339118] vt8623fb_set_par+0x11cd/0x21e0 [ 583.339146] fb_set_var+0x604/0xeb0 [ 583.339181] do_fb_ioctl+0x234/0x670 [ 583.339209] fb_ioctl+0xdd/0x130Fix the this by checking the value of 'screen_size' before memset_io().
[]
CVE-2018-12473
path traversal in obs-service-tar_scm
A path traversal traversal vulnerability in obs-service-tar_scm of Open Build Service allows remote attackers to cause access files not in the current build. On the server itself this is prevented by confining the worker via KVM. Affected releases are openSUSE Open Build Service: versions prior to 70d1aa4cc4d7b940180553a63805c22fc62e2cf0.
[ "cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*" ]
CVE-2021-23417
Prototype Pollution
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
[ "cpe:2.3:a:deepmergefn_project:deepmergefn:*:*:*:*:*:node.js:*:*" ]
CVE-2018-7032
webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
[ "cpe:2.3:a:myrepos_project:myrepos:*:*:*:*:*:*:*:*" ]
CVE-2024-6316
Generate PDF using Contact Form 7 <= 4.0.6 - Cross-Site Request Forgery to Arbitrary File Upload
The Generate PDF using Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 4.0.6. This is due to missing nonce validation and missing file type validation in the 'wp_cf7_pdf_dashboard_html_page' function. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:zealousweb:generate_pdf_using_contact_form_7:1.0:*:*:*:*:wordpress:*:*" ]
GHSA-7vqj-84j6-x8w8
Cross-Site Request Forgery (CSRF) vulnerability in Broadstreet Broadstreet allows Cross Site Request Forgery. This issue affects Broadstreet: from n/a through 1.51.1.
[]
GHSA-wg4w-j824-5xvr
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darshan Saroya Color Your Bar allows Stored XSS. This issue affects Color Your Bar: from n/a through 2.0.
[]
GHSA-5m3j-pxh7-455p
Apache CXF: SSRF vulnerability via WADL stylesheet parameter
A SSRF vulnerability in WADL service description in versions of Apache CXF before 4.0.5, 3.6.4 and 3.5.9 allows an attacker to perform SSRF style attacks on REST webservices. The attack only applies if a custom stylesheet parameter is configured.
[]
CVE-2015-5308
Multiple SQL injection vulnerabilities in cs_admin_users.php in the wp-championship plugin 5.8 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) user, (2) isadmin, (3) mail service, (4) mailresceipt, (5) stellv, (6) champtipp, (7) tippgroup, or (8) userid parameter.
[ "cpe:2.3:a:wp-championship_project:wp-championship:5.8:*:*:*:*:wordpress:*:*" ]
GHSA-cf2r-vpqc-55g6
An attacker with access to an HX 10.0.0 and previous versions, may send specially-crafted data to the HX console. The malicious detection would then trigger file parsing containing exponential entity expansions in the consumer process thus causing a Denial of Service.
[]
GHSA-w8v8-887q-8x79
Vulnerability in the PeopleSoft Enterprise CS Campus Community product of Oracle PeopleSoft (component: Notification Framework). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the PeopleSoft Enterprise CS Campus Community executes to compromise PeopleSoft Enterprise CS Campus Community. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CS Campus Community accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
GHSA-w8fp-x7hq-xp6c
Boa web server – CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[]
GHSA-9p7f-mx26-x423
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.
[]
GHSA-7286-89wv-v69p
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
[]
CVE-2023-41170
NetScout nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability.
[ "cpe:2.3:a:netscout:ngeniusone:6.3.4:build2298:*:*:*:*:*:*" ]
GHSA-5ppx-g65v-4vfv
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
[]
GHSA-6vwr-x8v3-jm8x
An unprivileged user can craft a bitstream such that the payload encoded in the bitstream gains code execution in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130
[]
GHSA-xmxc-mvx2-q963
On F5 SSL Orchestrator 14.1.0-14.1.0.5, on rare occasions, specific to a certain race condition, TMM may restart when SSL Forward Proxy enforces the bypass action for an SSL Orchestrator transparent virtual server with SNAT enabled.
[]
CVE-2024-26159
Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
GHSA-7g3j-9549-q4ph
The BufStream::lookChar function in Stream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml.
[]