Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
12.4k
cpes
sequencelengths
0
5.42k
CVE-2015-9212
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, and SD 800, lack of input validation while processing TZ_PR_CMD_SAVE_KEY command could lead to a buffer overread.
[ "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*" ]
CVE-2005-2593
Parlano MindAlign 5.0 and later versions uses weak encryption, with unknown impact and attack vectors.
[ "cpe:2.3:a:parlano:mindalign:5.0:*:*:*:*:*:*:*" ]
CVE-2019-16348
marc-q libwav through 2017-04-20 has a NULL pointer dereference in gain_file() at wav_gain.c.
[ "cpe:2.3:a:libwav_project:libwav:*:*:*:*:*:*:*:*" ]
GHSA-74x8-g586-9p62
Cryptocat has an Unspecified Chat Participant User List Disclosure
[]
GHSA-8464-8v52-xm79
A vulnerability classified as critical has been found in zhenfeng13 My-Blog 1.0. Affected is the function uploadFileByEditomd of the file src/main/java/com/site/blog/my/core/controller/admin/BlogController.java. The manipulation of the argument editormd-image-file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2024-49017
SQL Server Native Client Remote Code Execution Vulnerability
SQL Server Native Client Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*" ]
GHSA-fhqp-78f6-gc8r
SQL injection vulnerability in silentum_guestbook.php in Silentum Guestbook 2.0.2 allows remote attackers to execute arbitrary SQL commands via the messageid parameter.
[]
CVE-2008-7291
gri before 2.12.18 generates temporary files in an insecure way.
[ "cpe:2.3:a:gri_project:gri:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2024-0853
OCSP verification bypass with TLS session reuse
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
[ "cpe:2.3:a:haxx:curl:8.5.0:*:*:*:*:*:*:*" ]
CVE-2025-3435
MangBoard WP <= 1.8.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via Board Header And Footer
The Mang Board WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the board_header and board_footer parameters in all versions up to, and including, 1.8.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
CVE-2020-9681
Adobe Genuine Service privilege escalation vulnerability
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
[ "cpe:2.3:a:adobe:genuine_service:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-6982-pw6g-235f
The Romeo and Juliet (aka jp.co.cybird.appli.android.rjs) application 1.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-96q8-ww86-7w7p
A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /manage_medicine.php?action=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2018-1000812
Artica Integria IMS version 5.0 MR56 Package 58, likely earlier versions contains a CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Password recovery process, line 45 of general/password_recovery.php that can result in IntegriaIMS web app user accounts can be taken over. This attack appear to be exploitable via Network access to IntegriaIMS web interface . This vulnerability appears to have been fixed in fixed in versions released after commit f2ff0ba821644acecb893483c86a9c4d3bb75047.
[ "cpe:2.3:a:artica:integria_ims:*:*:*:*:*:*:*:*" ]
GHSA-7r4m-c228-wp37
Adobe Photoshop versions 23.0.2 and 22.5.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious JPG file.
[]
CVE-2007-10003
The Hackers Diet Plugin HTTP POST Request ajax_blurb.php sql injection
A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803.
[ "cpe:2.3:a:wp-plugins:the_hackers_diet:*:*:*:*:*:wordpress:*:*" ]
GHSA-2jq3-6582-8qfm
cPanel before 68.0.27 allows attackers to read the SRS secret via exim.conf (SEC-308).
[]
CVE-2005-4359
SQL injection vulnerability in includes/core.inc.php in ODFaq 2.1.0 allows remote attackers to execute arbitrary SQL commands via the (1) cat and (2) srcText parameters to faq.php.
[ "cpe:2.3:a:oodie:odfaq:1.21b:*:*:*:*:*:*:*", "cpe:2.3:a:oodie:odfaq:2.1.0:*:*:*:*:*:*:*" ]
GHSA-q2p3-jh4c-pjx8
Cross-site scripting (XSS) vulnerability in Edit.asp in DB Manager 2.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
[]
CVE-2017-0480
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705429.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ]
CVE-2019-15099
drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" ]
CVE-2022-37172
Incorrect access control in the install directory (C:\msys64) of Msys2 v20220603 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
[ "cpe:2.3:a:msys2:msys2:*:*:*:*:*:*:*:*" ]
GHSA-773p-m7cr-6h5f
Cross-site request forgery (CSRF) vulnerability in AQUOS Photo Player HN-PP150 1.02.00.04 through 1.03.01.04 allows remote attackers to hijack the authentication of arbitrary users.
[]
GHSA-6q5m-66wv-m3p2
Secure Boot Security Feature Bypass Vulnerability
[]
GHSA-f4hc-7j8c-cj6p
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in Dotclear version 2.29. The flaw exists within the Search functionality of the Admin Panel.
[]
CVE-2024-22333
IBM Maximo Application Suite information disclosure
IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973.
[ "cpe:2.3:a:ibm:maximo_application_suite:8.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_application_suite:8.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*" ]
GHSA-6jp7-m35q-p736
SQL injection vulnerability in the Trade module in Maxtrade AIO 1.3.23 allows remote attackers to execute arbitrary SQL commands via the categori parameter in a pocategorisell action to modules.php.
[]
CVE-2010-0239
The TCP/IP implementation in Microsoft Windows Vista Gold, SP1, and SP2 and Server 2008 Gold and SP2, when IPv6 is enabled, does not properly perform bounds checking on ICMPv6 Router Advertisement packets, which allows remote attackers to execute arbitrary code via crafted packets, aka "ICMPv6 Router Advertisement Vulnerability."
[ "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*" ]
CVE-2015-5302
libreport 2.0.7 before 2.6.3 only saves changes to the first file when editing a crash report, which allows remote attackers to obtain sensitive information via unspecified vectors related to the (1) backtrace, (2) cmdline, (3) environ, (4) open_fds, (5) maps, (6) smaps, (7) hostname, (8) remote, (9) ks.cfg, or (10) anaconda-tb file attachment included in a Red Hat Bugzilla bug report.
[ "cpe:2.3:a:redhat:libreport:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libreport:2.6.2:*:*:*:*:*:*:*" ]
CVE-2022-35992
`CHECK` fail in `TensorListFromTensor` in TensorFlow
TensorFlow is an open source platform for machine learning. When `TensorListFromTensor` receives an `element_shape` of a rank greater than one, it gives a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit 3db59a042a38f4338aa207922fa2f476e000a6ee. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*" ]
GHSA-mm2j-wr48-jg44
VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack.
[]
CVE-2025-26508
Certain HP LaserJet Pro, HP LaserJet Enterprise, HP LaserJet Managed Printers – Potential Remote Code Execution and Potential Elevation of Privilege
Certain HP LaserJet Pro, HP LaserJet Enterprise, and HP LaserJet Managed Printers may potentially be vulnerable to Remote Code Execution and Elevation of Privilege when processing a PostScript print job.
[]
CVE-2025-31197
The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination.
[]
GHSA-646p-7ppf-pw4m
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[]
GHSA-c6vh-7mwq-c4gc
The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
[]
GHSA-w43g-7q27-j39g
Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files by changing the extension of the uploaded file.
[]
GHSA-hv4w-qf5w-5wqc
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
[]
GHSA-m42v-qv3c-h6j7
Cross-site Scripting in JFinalCMS
JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the navigation management department.
[]
CVE-2018-10924
It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.
[ "cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*" ]
CVE-2012-6633
Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*" ]
CVE-2006-0630
RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.
[ "cpe:2.3:a:ritlabs:the_bat:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ritlabs:the_bat:3.0.0.14:*:*:*:*:*:*:*" ]
CVE-2011-1890
Cross-site scripting (XSS) vulnerability in EditForm.aspx in Microsoft Office SharePoint Server 2010 and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via a post, aka "Editform Script Injection Vulnerability."
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*" ]
GHSA-86cp-mgj2-w853
Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote unauthenticated attacker to create a reverse shell with administrator privileges on the DBSec server via carefully constructed Java serialized object sent to the DBSec server.
[]
GHSA-9jmq-rx5f-8jwq
nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Most of the fixes will be in this repo, though, so having it here gives us the private fork to work on patchesBelow is currently a duplicate of the original report:Received on [email protected] unedited, I'm not sure if we want to make it separate advisories.Pasted raw for now, feel free to edit or make separate advisories if you have the rights to.I think the most important is to switch back from nbviewer.jupyter.org -> nbviewer.org at the cloudflare level I guess ? There might be fastly involved as well.Impact_What kind of vulnerability is it? Who is impacted?_Patches_Has the problem been patched? What versions should users upgrade to?_Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Open an issue in [example link to repo](http://example.com)Email us at [example email address](mailto:[email protected])GitHub Security Lab (GHSL) Vulnerability ReportThe [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [nbconvert](https://github.com/jupyter/nbconvert).We are committed to working with you to help resolve these issues. In this report you will find everything you need to effectively coordinate a resolution of these issues with the GHSL team.If at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `[email protected]` (please include `GHSL-2021-1013`, `GHSL-2021-1014`, `GHSL-2021-1015`, `GHSL-2021-1016`, `GHSL-2021-1017`, `GHSL-2021-1018`, `GHSL-2021-1019`, `GHSL-2021-1020`, `GHSL-2021-1021`, `GHSL-2021-1022`, `GHSL-2021-1023`, `GHSL-2021-1024`, `GHSL-2021-1025`, `GHSL-2021-1026`, `GHSL-2021-1027` or `GHSL-2021-1028` as a reference).If you are _NOT_ the correct point of contact for this report, please let us know!SummaryWhen using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to Cross-Site Scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer)ProductnbconvertTested Version[v5.5.0](https://github.com/jupyter/nbconvert/releases/tag/5.5.0)DetailsIssue 1: XSS in notebook.metadata.language_info.pygments_lexer (`GHSL-2021-1013`)Attacker in control of a notebook can inject arbitrary unescaped HTML in the `notebook.metadata.language_info.pygments_lexer` field such as the following:This node is read in the [`from_notebook_node`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/exporters/html.py#L135-L140) method:It is then assigned to `language` var and passed down to [`_pygments_highlight`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/filters/highlight.py#L90)In this method, the `language` variable is [concatenated to `highlight hl-` string to conform the `cssclass`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/nbconvert/filters/highlight.py#L56) passed to the `HTMLFormatter` constructor:The `cssclass` variable is then [concatenated in the outer div class attribute](https://github.com/pygments/pygments/blob/30cfa26201a27dee1f8e6b0d600cad1138e64507/pygments/formatters/html.py#L791)Note that the `cssclass` variable is also used in other unsafe places such as [`'<table class="%stable">' % self.cssclass + filename_tr +`](https://github.com/pygments/pygments/blob/30cfa26201a27dee1f8e6b0d600cad1138e64507/pygments/formatters/html.py#L711))Issue 2: XSS in notebook.metadata.title (`GHSL-2021-1014`)The `notebook.metadata.title` node is rendered directly to the [`index.html.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/lab/index.html.j2#L12-L13) HTML template with no escaping:The following `notebook.metadata.title` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 3: XSS in notebook.metadata.widgets(`GHSL-2021-1015`)The `notebook.metadata.widgets` node is rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/lab/index.html.j2#L12-L13) HTML template with no escaping:The following `notebook.metadata.widgets` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 4: XSS in notebook.cell.metadata.tags(`GHSL-2021-1016`)The `notebook.cell.metadata.tags` nodes are output directly to the [`celltags.j2`](https://github.com/jupyter/nbconvert/blob/3c0f82d1acbcf2264ae0fa892141a037563aabd0/share/jupyter/nbconvert/templates/base/celltags.j2#L4) HTML template with no escaping:The following `notebook.cell.metadata.tags` node will execute arbitrary javascript:Note: this issue also affect other templates, not just the `lab` one.Issue 5: XSS in output data text/html cells(`GHSL-2021-1017`)Using the `text/html` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a cell with `text/html` output executing arbitrary javascript code:Issue 6: XSS in output data image/svg+xml cells(`GHSL-2021-1018`)Using the `image/svg+xml` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["image/svg+xml"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["image/svg+xml"]` node will execute arbitrary javascript:Issue 7: XSS in notebook.cell.output.svg_filename(`GHSL-2021-1019`)The `cell.output.svg_filename` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.svg_filename` node will escape the `img` tag context and execute arbitrary javascript:Issue 8: XSS in output data text/markdown cells(`GHSL-2021-1020`)Using the `text/markdown` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["text/markdown"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["text/markdown"]` node will execute arbitrary javascript:Issue 9: XSS in output data application/javascript cells(`GHSL-2021-1021`)Using the `application/javascript` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The `cell.output.data["application/javascript"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escapingThe following `cell.output.data["application/javascript"]` node will execute arbitrary javascript:Issue 10: XSS is output.metadata.filenames image/png and image/jpeg(`GHSL-2021-1022`)The `cell.output.metadata.filenames["images/png"]` and `cell.metadata.filenames["images/jpeg"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `filenames` node will execute arbitrary javascript:Issue 11: XSS in output data image/png and image/jpeg cells(`GHSL-2021-1023`)Using the `image/png` or `image/jpeg` output data mime type allows arbitrary javascript to be executed when rendering an HTML notebook.The `cell.output.data["images/png"]` and `cell.output.data["images/jpeg"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["image/png"]` node will execute arbitrary javascript:Issue 12: XSS is output.metadata.width/height image/png and image/jpeg(`GHSL-2021-1024`)The `cell.output.metadata.width` and `cell.output.metadata.height` nodes of both `image/png` and `image/jpeg` cells are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `output.metadata.width` node will execute arbitrary javascript:Issue 13: XSS in output data application/vnd.jupyter.widget-state+json cells(`GHSL-2021-1025`)The `cell.output.data["application/vnd.jupyter.widget-state+json"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["application/vnd.jupyter.widget-state+json"]` node will execute arbitrary javascript:Issue 14: XSS in output data application/vnd.jupyter.widget-view+json cells(`GHSL-2021-1026`)The `cell.output.data["application/vnd.jupyter.widget-view+json"]` nodes are rendered directly to the [`base.html.j2`](https://github.com/jupyter/nbconvert/blob/main/share/jupyter/nbconvert/templates/classic/base.html.j2) HTML template with no escaping:The following `cell.output.data["application/vnd.jupyter.widget-view+json"]` node will execute arbitrary javascript:Issue 15: XSS in raw cells(`GHSL-2021-1027`)Using a `raw` cell type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a `raw` cell executing arbitrary javascript code:Issue 16: XSS in markdown cells(`GHSL-2021-1028`)Using a `markdown` cell type allows arbitrary javascript to be executed when rendering an HTML notebook. This is probably by design, however, it would be nice to enable an option which uses an HTML sanitizer preprocessor to strip down all javascript elements:The following is an example of a `markdown` cell executing arbitrary javascript code:Proof of ConceptThese vulnerabilities may affect any server using nbconvert to generate HTML and not using a secure content-security-policy (CSP) policy. For example [nbviewer](https://nbviewer.jupyter.org) is vulnerable to the above mentioned XSS issues:Create Gist with payload. eg:`https://gist.github.com/pwntester/ff027d91955369b85f99bb1768b7f02c`Then load gist on nbviewer. eg:`https://nbviewer.jupyter.org/gist/pwntester/ff027d91955369b85f99bb1768b7f02c`Note: response is served with `content-security-policy: connect-src 'none';`GitHub Security AdvisoriesWe recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for these findings. This also allows you to invite the GHSL team to collaborate and further discuss these findings in private before they are [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory).CreditThese issues were discovered and reported by GHSL team member [@pwntester (Alvaro Muñoz)](https://github.com/pwntester).ContactYou can contact the GHSL team at `[email protected]`, please include a reference to `GHSL-2021-1013`, `GHSL-2021-1014`, `GHSL-2021-1015`, `GHSL-2021-1016`, `GHSL-2021-1017`, `GHSL-2021-1018`, `GHSL-2021-1019`, `GHSL-2021-1020`, `GHSL-2021-1021`, `GHSL-2021-1022`, `GHSL-2021-1023`, `GHSL-2021-1024`, `GHSL-2021-1025`, `GHSL-2021-1026`, `GHSL-2021-1027` or `GHSL-2021-1028` in any communication regarding these issues.Disclosure PolicyThis report is subject to our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).
[]
GHSA-mrhr-c569-5wjh
Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.
[]
GHSA-h46f-q7jf-wgr6
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Trending/Popular Post Slider and Widget allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Trending/Popular Post Slider and Widget: from n/a through 1.5.7.
[]
CVE-2022-28579
It is found that there is a command injection vulnerability in the setParentalRules interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
[ "cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*" ]
GHSA-9xcf-m8h7-wccj
PHP remote file inclusion vulnerability in install3.php in WEBInsta Mailing List Manager 1.3e allows remote attackers to execute arbitrary PHP code via a URL in the cabsolute_path parameter.
[]
CVE-2024-21911
Cross-site scripting vulnerability in TinyMCE
TinyMCE versions before 5.6.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser.
[ "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*" ]
CVE-2022-34937
Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code.
[ "cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*" ]
CVE-2019-25050
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
[ "cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*" ]
CVE-2014-7177
XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/.
[ "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*" ]
CVE-2006-2692
Multiple unspecified vulnerabilities in aMuleWeb for AMule before 2.1.2 allow remote attackers to read arbitrary image, HTML, or PHP files via unknown vectors, probably related to directory traversal.
[ "cpe:2.3:a:amule:amule:*:*:*:*:*:*:*:*" ]
CVE-2022-28648
In JetBrains YouTrack before 2022.1.43563 HTML code from the issue description was being rendered
[ "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*" ]
GHSA-cc87-35fp-2jp7
Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
[]
CVE-2002-1138
Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka "Flaw in Output File Handling for Scheduled Jobs."
[ "cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*" ]
CVE-2024-12510
LDAP Authentication Sever Pass-back attack
If LDAP settings are accessed, authentication could be redirected to another server, potentially exposing credentials. This requires admin access and an active LDAP setup.
[]
GHSA-9q9g-6mgq-4cf7
ZSATray passes the previousInstallerName as a config parameter to TrayManager, and TrayManager constructs the path and appends previousInstallerName to get the full path of the exe. Fixed Version: Win ZApp 4.3.0.121 and later.
[]
GHSA-hp52-5qr2-jq2v
An issue was discovered in Softing Industrial Automation uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) or login as an anonymous user (bypassing security checks) by sending crafted messages to a OPC/UA server. The server process may crash unexpectedly because of an invalid type cast, and must be restarted.
[]
GHSA-g624-89xp-hmx8
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
[]
GHSA-3h4v-m4g6-c2v8
Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.
[]
GHSA-9387-39pg-qwg6
Cross-site scripting (XSS) vulnerability in index.php in WampServer 2.0i allows remote attackers to inject arbitrary web script or HTML via the lang parameter.
[]
GHSA-cmw2-fm8j-qp55
This issue was addressed with improved checks. This issue is fixed in iOS 15.4 and iPadOS 15.4. A person with physical access to an iOS device may be able to see sensitive information via keyboard suggestions.
[]
GHSA-f5w8-64gg-hq58
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
CVE-2013-3613
Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.
[ "cpe:2.3:h:dahuasecurity:dvr0404hd-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-u:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-l-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-l-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404hf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404lf-al:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404lf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204hf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204lf-al:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204lf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3224l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3232l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5204a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5204l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5208a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5208l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5216a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5216l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5404:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5408:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5416:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5804:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5808:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5816:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr6404lf-s:-:*:*:*:*:*:*:*" ]
GHSA-48wc-9j2c-rwp5
Dell SmartFabric OS10 Software, version(s) 10.5.5.4 through 10.5.5.10 and 10.5.6.x, contain(s) an Use of Hard-coded Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Client-side request forgery and Information disclosure.
[]
CVE-2021-2177
Vulnerability in the Oracle Secure Global Desktop product of Oracle Virtualization (component: Gateway). The supported version that is affected is 5.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop. While the vulnerability is in Oracle Secure Global Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Secure Global Desktop.
[ "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*" ]
CVE-2024-23558
HCL DevOps Deploy / HCL Launch does not invalidate all session authentication cookies after logout
HCL DevOps Deploy / HCL Launch does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.
[ "cpe:2.3:a:hcltechsw:hcl_launch:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltechsw:hcl_devops_deploy:8.0.0.0:*:*:*:*:*:*:*" ]
GHSA-342r-v98v-xjfv
A pendingIntent hijacking vulnerability in Secure Folder prior to SMR APR-2021 Release 1 allows unprivileged applications to access contact information.
[]
CVE-2015-2143
Multiple cross-site request forgery (CSRF) vulnerabilities in Issuetracker phpBugTracker before 1.7.0 allow remote attackers to hijack the authentication of users for requests that cause an unspecified impact via unknown parameters.
[ "cpe:2.3:a:phpbugtracker_project:phpbugtracker:*:*:*:*:*:*:*:*" ]
GHSA-5884-8f6m-9wpp
SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
[]
GHSA-mgqh-3qm7-gx82
IBAX go-ibax vulnerable to SQL injection
A vulnerability classified as critical has been found in IBAX go-ibax. Affected is an unknown function of the file /api/v2/open/tablesInfo. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212634 is the identifier assigned to this vulnerability.
[]
CVE-2001-1382
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
[ "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*" ]
CVE-2013-6997
Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange (OX) AppSuite 7.4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an HTML email with crafted CSS code containing wildcards or (2) office documents containing "crafted hyperlinks with script URL handlers."
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:*:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:6.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:6.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.2.2:*:*:*:*:*:*:*" ]
CVE-2011-0385
The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.
[ "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_recording_server_software:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_recording_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_multipoint_switch_software:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_multipoint_switch:*:*:*:*:*:*:*:*" ]
GHSA-m8cv-83cf-qccx
Apport does not disable python crash handler before entering chroot
[]
GHSA-3m49-jmr4-jpx2
In createSessionInternal of PackageInstallerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-138650665
[]
CVE-2007-6117
Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.
[ "cpe:2.3:a:wireshark:wireshark:0.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*" ]
GHSA-7vj7-47pr-4hg8
Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks.
[]
CVE-2012-1673
SQL injection vulnerability in loginscript.php in e-ticketing allows remote attackers to execute arbitrary SQL commands via the password parameter.
[ "cpe:2.3:a:ola_lasisi:e-ticketing:-:*:*:*:*:*:*:*" ]
CVE-2012-4423
The virNetServerProgramDispatchCall function in libvirt before 0.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and segmentation fault) via an RPC call with (1) an event as the RPC number or (2) an RPC number whose value is in a "gap" in the RPC dispatch table.
[ "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*" ]
GHSA-2g2p-3v97-37x7
Multiple cross-site scripting (XSS) vulnerabilities in PHP Web Statistik 1.4 allows remote attackers to inject arbitrary web script or HTML via (1) the lastnumber parameter to stat.php and (2) the HTTP referer to pixel.php.
[]
GHSA-p45m-hh26-3vgh
Barracuda Message Archiver 2018 has XSS in the error_msg exception-handling value for the ldap_user parameter to the cgi-mod/ldap_load_entry.cgi module. The injection point of the issue is the Add_Update module.
[]
CVE-2016-0007
The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
CVE-2023-48491
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
CVE-2014-5812
The VDM Officiel (aka vdm.activities) application 5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:viedemerde:vdm_officiel:5.0:*:*:*:*:android:*:*" ]
CVE-2024-35230
Welcome and About GeoServer pages communicate version and revision information
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. In affected versions the welcome and about page includes version and revision information about the software in use (including library and components used). This information is sensitive from a security point of view because it allows software used by the server to be easily identified. This issue has been patched in version 2.26.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
GHSA-772g-g522-9m9m
Cross-Site Request Forgery (CSRF) vulnerability in Bjoern WP Performance Pack allows Cross Site Request Forgery. This issue affects WP Performance Pack: from n/a through 2.5.4.
[]
GHSA-fxjx-xx78-2944
SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack.
[]
GHSA-ww8h-6gxx-9jf8
The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2025-3010
Khronos Group glslang Intermediate.cpp isConversionAllowed null pointer dereference
A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
[]
GHSA-rx4h-3hc3-xgx4
Cisco ONS 15454 System Software 10.30 and 10.301 allows remote attackers to cause a denial of service (tNetTask CPU consumption or card reset) via a flood of (1) IP or (2) Ethernet traffic, aka Bug ID CSCus57263.
[]
CVE-2022-23798
[20220306] - Core - Inadequate validation of internal URLs
An issue was discovered in Joomla! 2.5.0 through 3.10.6 & 4.0.0 through 4.1.0. Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
GHSA-hhf8-mrfp-rjvv
A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 5900/tcp. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
GHSA-27fp-c3m4-phwv
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-7vfh-cqpc-4267
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an unauthorized attacker to trigger a gradual degradation in performance.
[]
CVE-2020-0657
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-p2r4-r5h4-fmwq
A vulnerability in the Android media framework (libhevc) related to handling ps_codec_obj memory allocation failures. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68299873.
[]
GHSA-fjv2-wp8j-f9w3
A vulnerability in the network-operator user role implementation for Cisco NX-OS System Software could allow an authenticated, local attacker to improperly delete valid user accounts. The network-operator role should not be able to delete other configured users on the device. The vulnerability is due to a lack of proper role-based access control (RBAC) checks for the actions that a user with the network-operator role is allowed to perform. An attacker could exploit this vulnerability by authenticating to the device with user credentials that give that user the network-operator role. Successful exploitation could allow the attacker to impact the integrity of the device by deleting configured user credentials. The attacker would need valid user credentials for the device. This vulnerability affects the following Cisco products running Cisco NX-OS System Software: Nexus 3000 Series Switches, Nexus 3600 Platform Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvg21120.
[]
CVE-2025-3531
YouDianCMS index.html cross site scripting
A vulnerability classified as problematic has been found in YouDianCMS 9.5.21. This affects an unknown part of the file /App/Tpl/Admin/Default/Log/index.html. The manipulation of the argument UserName/LogType leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]