Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
12.4k
cpes
sequencelengths
0
5.42k
CVE-2022-20420
In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2023-24548
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
[ "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.25.0f:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-32d4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-32p4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-36s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-96:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3a-24d12:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3a-48d6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3a-72:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3a-36:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3a-54:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3ak-36:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3ak-54:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3am-36:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3am-54:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280pr3-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280sr3-40yc6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280tr3-40c6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3k-48y4d:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3-36d:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3a-36d:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3a-36dm:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3a-36p:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3a-36pm:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3ak-36dm:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3ak-36pm:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3k-36dm:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3k-48cqms:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3k-72y7512r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7812r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7816r3:-:*:*:*:*:*:*:*" ]
GHSA-xhx4-fvj6-gvh5
libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24310423.
[]
GHSA-fr75-x856-q6j8
Octobot mishandles Tentacles upload
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
[]
CVE-2023-38207
Adobe Commerce XML Injection (aka Blind XPath Injection) Arbitrary file system read
Adobe Commerce versions 2.4.6-p1 (and earlier), 2.4.5-p3 (and earlier) and 2.4.4-p4 (and earlier) are affected by a XML Injection (aka Blind XPath Injection) vulnerability that could lead in minor arbitrary file system read. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*" ]
GHSA-9pg7-c56m-xqjx
In the Linux kernel, the following vulnerability has been resolved:wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue.The problem is the number of entries in the pre-allocated sgtable, it is nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) >> 4 + 1. Given the default [rt]xglom_size=32 it's actually 35 which is too small. Worst case, the pkt queue can end up with 64 SKBs. This occurs when a new SKB is added for each original SKB if tailroom isn't enough to hold tail_pad. At least one sg entry is needed for each SKB. So, eventually the "skb_queue_walk loop" in brcmf_sdiod_sglist_rw may run out of sg entries. This makes sg_next return NULL and this causes the oops.The patch sets nents to max(rxglom_size, txglom_size) * 2 to be able handle the worst-case. Btw. this requires only 64-35=29 * 16 (or 20 if CONFIG_NEED_SG_DMA_LENGTH) = 464 additional bytes of memory.
[]
GHSA-qxf3-w2rf-mhmm
MyBB 1.8.19 allows remote attackers to obtain sensitive information because it discloses the username upon receiving a password-reset request that lacks the code parameter.
[]
GHSA-jf8f-pphx-pmfh
Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
GHSA-qwhf-6m85-fm6c
Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information Block (FIB) of a Word file, which triggers length calculation errors and memory corruption.
[]
CVE-2014-125008
FFmpeg oggparsevorbis.c vorbis_header memory corruption
A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
[ "cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*" ]
CVE-2021-22927
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
[ "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*" ]
CVE-2021-33333
The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19 and 7.2 before fix pack 6, does not properly check user permission, which allows remote authenticated users to view and delete workflow submissions via crafted URLs.
[ "cpe:2.3:a:liferay:dxp:7.0:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_13:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_14:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_24:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_25:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_26:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_27:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_28:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_3\\+:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_30:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_33:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_35:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_36:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_39:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_40:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_41:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_42:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_43:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_44:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_45:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_46:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_47:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_48:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_49:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_50:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_51:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_52:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_53:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_54:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_56:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_57:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_58:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_59:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_60:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_61:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_64:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_65:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_66:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_67:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_68:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_69:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_70:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_71:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_72:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_73:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_75:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_76:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_78:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_79:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_80:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_81:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_82:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_83:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_84:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_85:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_86:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_87:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_88:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_89:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_90:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_91:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.0:fix_pack_92:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*" ]
GHSA-jpjf-6xrf-gp68
The Car Insurance Quote Comparison (aka com.seopa.quotezone) application 2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2022-38141
WordPress Sales Report Email for WooCommerce Plugin <= 2.8 is vulnerable to Broken Access Control
Missing Authorization vulnerability in Zorem Sales Report Email for WooCommerce.This issue affects Sales Report Email for WooCommerce: from n/a through 2.8.
[ "cpe:2.3:a:zorem:sales_report_email_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
CVE-2020-14563
Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications Applications (component: WebGUI). Supported versions that are affected are 3.0.0-3.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Communications Broker. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Communications Broker, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Communications Broker accessible data as well as unauthorized read access to a subset of Oracle Enterprise Communications Broker accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*" ]
CVE-2023-52450
perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() Get logical socket id instead of physical id in discover_upi_topology() to avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line that leads to NULL pointer dereference in upi_fill_topology()
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2011-4014
The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807.
[ "cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_control_system_software:7.0.172.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_control_system_software:7.0.220.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_control_system_software:7.0.230.0:*:*:*:*:*:*:*" ]
GHSA-9fqh-jpcp-95fv
Mozilla developers reported memory safety bugs present in Firefox 89. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 90.
[]
GHSA-2cqr-c5qf-cc3q
ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation via a POST request with the parameter set to the file path to be written. This can be an executable file that is written to in the arbitrary directory. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.
[]
GHSA-8v7j-86mr-4824
An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
GHSA-hjv5-8xv5-vmfp
In the Linux kernel, the following vulnerability has been resolved:memory: fsl_ifc: fix leak of IO mapping on probe failureOn probe error the driver should unmap the IO memory. Smatch reports:drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev->gregs' not released on lines: 298.
[]
CVE-2022-0302
Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-v3cg-7r9h-r2g6
Field-level security issue with .keyword fields in OpenSearch
Advisory title: Field-level security issue with .keyword fieldsAffected versions:OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1Patched versions:OpenSearch 1.3.8 and 2.5.0Impact:There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields.This issue is only present for authenticated users with read access to the indexes containing the restricted fields.Workaround:FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue.Patches:OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.For more information:If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [aws-security@amazon.com](mailto:aws-security@amazon.com). Please do not create a public GitHub issue.
[]
CVE-2022-47447
WordPress WP-Advanced-Search Plugin <= 3.3.8 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Mathieu Chartier WordPress WP-Advanced-Search plugin <= 3.3.8 versions.
[ "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*" ]
GHSA-jr8m-x5pc-vrvr
A vulnerability in Cisco Webex Teams, formerly Cisco Spark, could allow an authenticated, remote attacker to view and modify data for an organization other than their own organization. The vulnerability exists because the affected software performs insufficient checks for associations between user accounts and organization accounts. An attacker who has administrator or compliance officer privileges for one organization account could exploit this vulnerability by using those privileges to view and modify data for another organization account. No customer data was impacted by this vulnerability.
[]
GHSA-5mmp-v3w4-wjmj
Cisco IOS 12.4MDA before 12.4(24)MDA5 on the Cisco Content Services Gateway - Second Generation (CSG2) allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets, aka Bug ID CSCtl79577.
[]
CVE-2017-12593
ASUS DSL-N10S V2.1.16_APAC devices allow CSRF.
[ "cpe:2.3:o:asus:dsl-n10s_firmware:v2.1.16_apac:*:*:*:*:*:*:*", "cpe:2.3:h:asus:dsl-n10s_router:-:*:*:*:*:*:*:*" ]
CVE-2019-6772
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8231.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-mjw9-3f9f-jq2w
XWiki Platform vulnerable to code injection from view right on XWiki.ClassSheet
ImpactAny user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload.For instance: `Open <xwiki-host>/xwiki/bin/view/%22%2F%7D%7D%7B%7B%2Fhtml%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=XWiki.ClassSheet&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation.PatchesThis has been patched in XWiki 14.4.8, 14.10.3 and 15.0RC1.WorkaroundsThe fix is only impacting Velocity templates and page contents, so applying this [patch](https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee) is enough to fix the issue.Referenceshttps://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfeehttps://jira.xwiki.org/browse/XWIKI-20456For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
[]
CVE-2015-5990
Cross-site request forgery (CSRF) vulnerability on Belkin F9K1102 2 devices with firmware 2.10.17 allows remote attackers to hijack the authentication of arbitrary users.
[ "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*" ]
GHSA-mpj7-7mg7-x95j
Apache NiFi: Missing Complete Authorization for Parameter and Service References
Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups.Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group.Creating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized.This vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation.
[]
CVE-2024-6100
Type Confusion in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2019-2575
Vulnerability in the Oracle AutoVue 3D Professional Advanced component of Oracle Supply Chain Products Suite (subcomponent: Format Handling - 2D). Supported versions that are affected are 21.0.0 and 21.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle AutoVue 3D Professional Advanced. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle AutoVue 3D Professional Advanced accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:autovue_3d_professional_advanced:21.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:autovue_3d_professional_advanced:21.0.1:*:*:*:*:*:*:*" ]
CVE-2021-47363
nexthop: Fix division by zero while replacing a resilient group
In the Linux kernel, the following vulnerability has been resolved: nexthop: Fix division by zero while replacing a resilient group The resilient nexthop group torture tests in fib_nexthop.sh exposed a possible division by zero while replacing a resilient group [1]. The division by zero occurs when the data path sees a resilient nexthop group with zero buckets. The tests replace a resilient nexthop group in a loop while traffic is forwarded through it. The tests do not specify the number of buckets while performing the replacement, resulting in the kernel allocating a stub resilient table (i.e, 'struct nh_res_table') with zero buckets. This table should never be visible to the data path, but the old nexthop group (i.e., 'oldg') might still be used by the data path when the stub table is assigned to it. Fix this by only assigning the stub table to the old nexthop group after making sure the group is no longer used by the data path. Tested with fib_nexthops.sh: Tests passed: 222 Tests failed: 0 [1] divide error: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014 RIP: 0010:nexthop_select_path+0x2d2/0x1a80 [...] Call Trace: fib_select_multipath+0x79b/0x1530 fib_select_path+0x8fb/0x1c10 ip_route_output_key_hash_rcu+0x1198/0x2da0 ip_route_output_key_hash+0x190/0x340 ip_route_output_flow+0x21/0x120 raw_sendmsg+0x91d/0x2e10 inet_sendmsg+0x9e/0xe0 __sys_sendto+0x23d/0x360 __x64_sys_sendto+0xe1/0x1b0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*" ]
CVE-2006-1155
Cross-site scripting (XSS) vulnerability in manas tungare Site Membership Script before 8 March, 2006 allows remote attackers to inject arbitrary web script or HTML via the Error parameter in (1) login.asp and (2) default.asp.
[ "cpe:2.3:a:manas_tungare:site_membership_script:*:*:*:*:*:*:*:*" ]
CVE-2010-1024
SQL injection vulnerability in the TGM-Newsletter (tgm_newsletter) extension 0.0.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:chris_wederka:tgm_newsletter:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
GHSA-96qq-9h7m-67pw
KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones.
[]
GHSA-9fm6-ffj9-f3wc
IBM Platform LSF 9.1 and 10.1, IBM Spectrum LSF Suite 10.2, and IBM Spectrum Suite for HPA 10.2 could allow a local user to escalate their privileges due to weak file permissions when specific debug settings are enabled in a Linux or Unix enviornment. IBM X-Force ID: 176137.
[]
CVE-2019-5294
There is an out of bound read vulnerability in some Huawei products. A remote, unauthenticated attacker may send a corrupt or crafted message to the affected products. Due to a buffer read overflow error when parsing the message, successful exploit may cause some service to be abnormal.
[ "cpe:2.3:o:huawei:ar120-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*" ]
CVE-2013-7471
An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.
[ "cpe:2.3:o:dlink:dir-300_firmware:2.14b01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-300:b:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-645_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-845_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-845:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-865_firmware:1.05b03:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-865:-:*:*:*:*:*:*:*" ]
GHSA-ggv4-4qfx-2gh6
In the Linux kernel, the following vulnerability has been resolved:lib: alloc_tag_module_unload must wait for pending kfree_rcu callsBen Greear reports following splat: ------------[ cut here ]------------ net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0 Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat ... Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020 RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0 codetag_unload_module+0x19b/0x2a0 ? codetag_load_module+0x80/0x80nf_nat module exit calls kfree_rcu on those addresses, but the free operation is likely still pending by the time alloc_tag checks for leaks.Wait for outstanding kfree_rcu operations to complete before checking resolves this warning.Reproducer: unshare -n iptables-nft -t nat -A PREROUTING -p tcp grep nf_nat /proc/allocinfo # will list 4 allocations rmmod nft_chain_nat rmmod nf_nat # will WARN.[akpm@linux-foundation.org: add comment]
[]
CVE-2024-56026
WordPress Simple Proxy plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Greg Priday Simple Proxy allows Reflected XSS.This issue affects Simple Proxy: from n/a through 1.0.
[]
CVE-2023-30767
Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2021-38113
In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS.
[ "cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:enigma2:*:*" ]
GHSA-h342-5v8g-h229
Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js.
[]
CVE-2025-31003
WordPress Squeeze plugin <= 1.6 - Full Path Disclosure (FPD) vulnerability
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6.
[]
GHSA-pj2r-jq64-j78p
Microsoft PowerPoint 2007 SP2 and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate TimeColorBehaviorContainer Floating Point records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document containing an invalid record, aka "Floating Point Techno-color Time Bandit RCE Vulnerability."
[]
CVE-2020-21667
In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection.
[ "cpe:2.3:a:fastadmin-tp6_project:fastadmin-tp6:1.0:*:*:*:*:*:*:*" ]
CVE-2010-3702
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
[ "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" ]
CVE-2019-12653
Cisco IOS XE Software Raw Socket Transport Denial of Service Vulnerability
A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.
[ "cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*" ]
CVE-2006-3183
Cross-site scripting (XSS) vulnerability in index.php in MobeScripts Mobile Space Community 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) browse parameter, which is not filtered in the resulting error message, and multiple unspecified input fields, including those involved when (2) updating a profile, (3) posting comments or entries in a blog, (4) uploading files, (5) picture captions, and (6) sending a private message (PM).
[ "cpe:2.3:a:mobescripts:mobile_space_community:2.0:*:*:*:*:*:*:*" ]
GHSA-g2h3-9497-7mxh
The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image.
[]
CVE-2024-42377
Multiple Missing Authorization Check vulnerabilities in SAP Shared Service Framework
SAP shared service framework allows an authenticated non-administrative user to call a remote-enabled function, which will allow them to insert value entries into a non-sensitive table, causing low impact on integrity of the application
[ "cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_702:*:*:*:*:*:*:*", "cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_746:*:*:*:*:*:*:*", "cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_747:*:*:*:*:*:*:*", "cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_748:*:*:*:*:*:*:*" ]
CVE-2017-5136
An issue was discovered on SendQuick Entera and Avera devices before 2HF16. The application failed to check the access control of the request which could result in an attacker being able to shutdown the system.
[ "cpe:2.3:o:sendquick:entera_sms_gateway_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sendquick:entera_sms_gateway:-:*:*:*:*:*:*:*", "cpe:2.3:o:sendquick:avera_sms_gateway_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sendquick:avera_sms_gateway:-:*:*:*:*:*:*:*" ]
CVE-2023-39558
AudimexEE v15.0 was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the Show Kai Data component.
[ "cpe:2.3:a:web-audimex:audimexee:15.0:*:*:*:*:*:*:*" ]
GHSA-p7jx-q735-v62j
Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
[]
CVE-2023-42653
In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges
[ "cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
CVE-2024-7764
SQL Injection in vanna-ai/vanna
Vanna-ai v0.6.2 is vulnerable to SQL Injection due to insufficient protection against injecting additional SQL commands from user requests. The vulnerability occurs when the `generate_sql` function calls `extract_sql` with the LLM response. An attacker can include a semi-colon between a search data field and their own command, causing the `extract_sql` function to remove all LLM generated SQL and execute the attacker's command if it passes the `is_sql_valid` function. This allows the execution of user-defined SQL beyond the expected boundaries, notably the trained schema.
[]
GHSA-qvf9-958h-6h8p
In the Linux kernel, the following vulnerability has been resolved:bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relosIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL referencing a non-existing BTF type, function bpf_core_calc_relo_insn would cause a null pointer deference.Fix this by adding a proper check upper in call stack, as malformed relocation records could be passed from user space.Simplest reproducer is a program:With a single relocation record:See the link for original reproducer or next commit for a test case.
[]
CVE-2019-2015
In rw_t3t_act_handle_check_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120503926
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
CVE-2017-11847
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
GHSA-x5rg-6gf6-5wg5
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. Due to command-line parameter injection and an undocumented debug feature flag, an attacker can utilize the DICOM sensor to write arbitrary data to the disk. This can be utilized to write a custom EXE(.bat) sensor, that will then run. This primitive gives remote code execution.
[]
CVE-2021-37081
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash.
[ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ]
GHSA-7p9v-555g-5hgg
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality.
[]
CVE-2024-31582
FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input.
[ "cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*" ]
GHSA-qrgr-qfr9-4xfh
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
[]
CVE-2019-2106
In ihevcd_sao_shift_ctb of ihevcd_sao.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130023983.
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
GHSA-mr5j-qcjf-p9xm
BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space.
[]
CVE-2006-3767
Cross-site scripting (XSS) vulnerability in showprofile.php in Darren's $5 Script Archive osDate 1.1.7 and earlier allows remote attackers to inject arbitrary web script or HTML via the onerror attribute in an HTML IMG tag with a non-existent source file in txtcomment parameter, which is used when posting a comment.
[ "cpe:2.3:a:darrens_5-dollar_script_archive:osdate:*:*:*:*:*:*:*:*", "cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.6:*:*:*:*:*:*:*" ]
CVE-2021-23264
Transmission of Private Resources into a New Sphere ('Resource Leak') and Exposure of Resource to Wrong Sphere in Crafter Search
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.
[ "cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*" ]
GHSA-pc25-5426-q5x9
Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-9622-pfwg-vcxc
Integer signedness error in Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving JavaScript array indices that trigger an out-of-bounds access, a different vulnerability than CVE-2008-2307.
[]
CVE-2002-1236
The remote management web server for Linksys BEFSR41 EtherFast Cable/DSL Router before firmware 1.42.7 allows remote attackers to cause a denial of service (crash) via an HTTP request to Gozila.cgi without any arguments.
[ "cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*" ]
GHSA-3jw5-8hpm-44m2
Improper input validation vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to read files upload via network..
[]
GHSA-f86m-4hjx-mgqr
Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.17 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) error_msg parameter to usercp_register.php, (2) forward_page parameter to login.php, and (3) list_cat parameter to search.php, which are not initialized as variables.
[]
GHSA-w6fj-qr27-8g23
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Booking Calendar Contact Form allows Stored XSS. This issue affects Booking Calendar Contact Form: from n/a through 1.2.55.
[]
GHSA-rhxf-q9p5-8h29
Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x and 3.x before 3.0.1.6 iFix4, 4.x before 4.0.7 iFix3, and 5.x before 5.0.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-0124.
[]
CVE-2017-3616
Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:berkeley_db:*:*:*:*:*:*:*:*" ]
GHSA-mc6x-37m5-73h5
A vulnerability has been identified in JT2Go (All versions), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
[]
CVE-2023-38132
LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service.
[ "cpe:2.3:a:logitec:lan-w451ngr:*:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:lan-w451ngr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:lan-w451ngr:-:*:*:*:*:*:*:*" ]
GHSA-7fm8-x8h8-39g3
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629573; Issue ID: ALPS07629573.
[]
GHSA-63fq-p354-4c4w
Dell SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain a privilege escalation vulnerability. A local authenticated malicious user could potentially exploit this vulnerability to elevate privileges and gain total control of the system.
[]
GHSA-rff2-25mx-hcq2
Multiple SQL injection vulnerabilities in includes/functions.php in Pro Chat Rooms Text Chat Rooms 8.2.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) password, (2) email, or (3) id parameter.
[]
CVE-2024-4291
Tenda A301 setBlackRule formAddMacfilterRule stack-based overflow
A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as critical. This issue affects the function formAddMacfilterRule of the file /goform/setBlackRule. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262223. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*" ]
CVE-2022-29537
gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
[ "cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*" ]
GHSA-3m87-5598-2v4f
Withdrawn Advisory: Prometheus XSS Vulnerability
Withdrawn AdvisoryThis advisory has been withdrawn because the vulnerability does not apply to the Prometheus golang package. This link is maintained to preserve external references.Original DescriptionA stored, DOM based, cross-site scripting (XSS) flaw was found in Prometheus before version 2.7.1. An attacker could exploit this by convincing an authenticated user to visit a crafted URL on a Prometheus server, allowing for the execution and persistent storage of arbitrary scripts.
[]
CVE-2023-26334
ZDI-CAN-20149: Adobe Dimension USD File Parsing Uninitialized Pointer Information Disclosure Vulnerability
Adobe Dimension versions 3.4.7 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2005-1745
The UserLogin control in BEA WebLogic Portal 8.1 through Service Pack 3 prints the password to standard output when an incorrect login attempt is made, which could make it easier for attackers to guess the correct password.
[ "cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.0:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_portal:8.0:*:*:*:*:*:*:*" ]
CVE-2015-7882
Authentication bypass when using LDAP authentication in MongoDB Enterprise Server
Improper handling of LDAP authentication in MongoDB Server versions 3.0.0 to 3.0.6 allows an unauthenticated client to gain unauthorized access.
[ "cpe:2.3:a:mongodb:mongodb:*:*:*:*:enterprise:*:*:*" ]
GHSA-w82j-q9x6-g553
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.
[]
GHSA-64cp-h6cw-59mg
Mozilla Firefox 3.0.10 and earlier on Linux allows remote attackers to cause a denial of service (application crash) via a URI for a large GIF image in the BACKGROUND attribute of a BODY element.
[]
GHSA-5cvx-2qx8-xfqp
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32.
[]
GHSA-mf78-2287-6qf8
A Code Execution Vulnerability exists in UMPlayer 0.98 in wintab32.dll due to insufficient path restrictions when loading external libraries. which could let a malicious user execute arbitrary code.
[]
GHSA-v7q3-h4r2-3g3j
Cloudlog 2.6.15 allows Oqrs.php get_station_info station_id SQL injection.
[]
GHSA-445q-cj49-wrrx
In the Linux kernel, the following vulnerability has been resolved:bpf: Fix accesses to uninit stack slotsPrivileged programs are supposed to be able to read uninitialized stack memory (ever since 6715df8d5) but, before this patch, these accesses were permitted inconsistently. In particular, accesses were permitted above state->allocated_stack, but not below it. In other words, if the stack was already "large enough", the access was permitted, but otherwise the access was rejected instead of being allowed to "grow the stack". This undesired rejection was happening in two places:in check_stack_slot_within_bounds()in check_stack_range_initialized() This patch arranges for these accesses to be permitted. A bunch of tests that were relying on the old rejection had to change; all of them were changed to add also run unprivileged, in which case the old behavior persists. One tests couldn't be updated - global_func16 - because it can't run unprivileged for other reasons.This patch also fixes the tracking of the stack size for variable-offset reads. This second fix is bundled in the same commit as the first one because they're inter-related. Before this patch, writes to the stack using registers containing a variable offset (as opposed to registers with fixed, known values) were not properly contributing to the function's needed stack size. As a result, it was possible for a program to verify, but then to attempt to read out-of-bounds data at runtime because a too small stack had been allocated for it.Each function tracks the size of the stack it needs in bpf_subprog_info.stack_depth, which is maintained by update_stack_depth(). For regular memory accesses, check_mem_access() was calling update_state_depth() but it was passing in only the fixed part of the offset register, ignoring the variable offset. This was incorrect; the minimum possible value of that register should be used instead.This tracking is now fixed by centralizing the tracking of stack size in grow_stack_state(), and by lifting the calls to grow_stack_state() to check_stack_access_within_bounds() as suggested by Andrii. The code is now simpler and more convincingly tracks the correct maximum stack size. check_stack_range_initialized() can now rely on enough stack having been allocated for the access; this helps with the fix for the first issue.A few tests were changed to also check the stack depth computation. The one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.
[]
GHSA-7xj9-3fpx-jwvg
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to a "Possible Stack Corruption starting at Unknown Symbol @ 0x00000000049f0281."
[]
GHSA-7p99-vvwg-793p
Cross-site scripting (XSS) vulnerability in Organic Groups (OG) 5.x-7.x before 5.x-7.4, 5.x-8.x before 5.x-8.1, and 6.x-1.x before 6.x-1.4, a module for Drupal, allows remote authenticated users, with create or edit group nodes permissions, to inject arbitrary web script or HTML via the User-Agent HTTP header, a different issue than CVE-2008-3095.
[]
GHSA-3rv3-jp5p-3jhw
PHPGURUKUL Hospital Management System V 4.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, doctors, patients, change admin password, get appointment history and access all session logs.
[]
GHSA-85q7-2m9w-wq4f
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in assorted[chips] DrawIt (draw.Io) plugin <= 1.1.3 versions.
[]
GHSA-v3gr-mcr8-2wv5
Multiple SHARP routers leave the hidden debug function enabled. An arbitrary OS command may be executed with the root privilege by a remote unauthenticated attacker.
[]