Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2021-0505
In the Settings app, there is a possible way to disable an always-on VPN due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-179975048
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
GHSA-c888-w76p-vhx3
Investintech.com SlimPDF Reader does not prevent faulting-address data from affecting branch selection, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
[]
CVE-2016-9389
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
[ "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*" ]
CVE-2020-9923
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, watchOS 6.2.8. A malicious application may be able to execute arbitrary code with system privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-5xg3-j2j6-rcx4
Relative Path Traversal in git-delta
git-delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.
[]
CVE-2020-0796
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*" ]
CVE-2018-13757
The mintToken function of a smart contract implementation for Coinquer, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:coinquer_project:coinquer:-:*:*:*:*:*:*:*" ]
GHSA-5j2x-98q5-4hpv
Buffer overflow in the HTTP proxy service for 3proxy 0.5 to 0.5.3g, and 0.6b-devel before 20070413, might allow remote attackers to execute arbitrary code via crafted transparent requests.
[]
CVE-2024-33253
Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function.
[ "cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:openeclass:openeclass:*:*:*:*:*:*:*:*" ]
CVE-2023-39956
Electron: Out-of-package code execution when launched with arbitrary cwd
Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.
[ "cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha1:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha2:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha3:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha4:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha5:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha6:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha7:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:alpha8:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta1:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta10:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta11:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta12:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta2:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta3:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta4:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta5:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta6:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta7:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta8:*:*:*:node.js:*:*", "cpe:2.3:a:electronjs:electron:26.0.0:beta9:*:*:*:node.js:*:*" ]
GHSA-9224-ggvw-wh7v
VM images built with Image Builder and Proxmox provider use default credentials in github.com/kubernetes-sigs/image-builder
A security issue was discovered in the Kubernetes Image Builder versions <= v0.1.37 where default credentials are enabled during the image build process. Virtual machine images built using the Proxmox provider do not disable these default credentials, and nodes using the resulting images may be accessible via these default credentials. The credentials can be used to gain root access. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project with its Proxmox provider.
[]
GHSA-2rvv-92pm-m5p9
A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.
[]
CVE-2016-10802
cPanel before 58.0.4 allows code execution in the context of other user accounts through the PHP CGI handler (SEC-142).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2004-1214
Format string vulnerability in Kreed 1.05 and earlier allows remote attackers to execute arbitrary code via format specifiers in (1) a nickname or (2) message text.
[ "cpe:2.3:a:burut:kreed:1.5:*:*:*:*:*:*:*" ]
GHSA-p7vc-qhf7-x87j
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If a user logs in to CLI of the affected product, an arbitrary OS command may be executed.
[]
CVE-2019-14883
A vulnerability was found in Moodle 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
GHSA-4vcg-74p8-q3gx
Multiple SQL injection vulnerabilities in war.php in Virtual War (VWar) 1.5.0 R14 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) s, (2) showgame, (3) sortorder, and (4) sortby parameters.
[]
GHSA-qp25-xm2x-r33g
Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox < 68.
[]
CVE-2024-44028
WordPress NiceJob plugin < 3.6.5 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Nicejob NiceJob allows Stored XSS.This issue affects NiceJob: from n/a before 3.6.5.
[]
CVE-2002-0977
Buffer overflow in Microsoft File Transfer Manager (FTM) ActiveX control before 4.0 allows remote attackers to execute arbitrary code via a long TS value.
[ "cpe:2.3:a:microsoft:file_transfer_manager:*:*:*:*:*:*:*:*" ]
GHSA-pgc8-5qmg-9q4q
SQL injection vulnerability in adminlogin.asp in XTREME ASP Photo Gallery 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.
[]
GHSA-8c5x-9gh7-8vm2
Cross-Site Request Forgery (CSRF) vulnerability in Phoetry phZoom allows Stored XSS.This issue affects phZoom: from n/a through 1.2.92.
[]
GHSA-xhm7-9r8j-q773
Stack-based buffer overflow in Live for Speed 0.5X10 and earlier allows remote authenticated users to cause a denial of service (client crash) and possibly execute arbitrary code via a long skin name.
[]
CVE-2017-5368
ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others).
[ "cpe:2.3:a:zoneminder:zoneminder:1.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:zoneminder:zoneminder:1.30.0:*:*:*:*:*:*:*" ]
CVE-2018-17448
An Incorrect Access Control issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4.
[ "cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:sd-wan:10.1.0:*:*:*:*:*:*:*" ]
CVE-2017-4987
In EMC VNX2 versions prior to OE for File 8.1.9.211 and VNX1 versions prior to OE for File 7.1.80.8, a local authenticated user can load a maliciously crafted file in the search path which may potentially allow the attacker to execute arbitrary code on the targeted VNX Control Station system, aka an uncontrolled search path vulnerability.
[ "cpe:2.3:o:emc:vnx2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:emc:vnx2:-:*:*:*:*:*:*:*", "cpe:2.3:o:emc:vnx1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:emc:vnx1:-:*:*:*:*:*:*:*" ]
GHSA-pc5m-rr8v-2phw
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
GHSA-f58g-762j-2j4p
The check_diskio plugin 3.2.6 and earlier for Nagios and Icinga allows local users to write to arbitrary files via a symlink attack on a temporary file with a predictable name (tmp/check_diskio_status-*-*).
[]
GHSA-55x8-g885-q727
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
[]
GHSA-h9hg-759g-265v
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
[]
GHSA-v4wv-v525-p5gq
A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.
[]
CVE-2021-30190
CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.
[ "cpe:2.3:a:codesys:v2_web_server:*:*:*:*:*:*:*:*" ]
CVE-2012-0277
Heap-based buffer overflow in XnView before 1.99 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PCT image.
[ "cpe:2.3:a:xnview:xnview:*:*:*:*:*:*:*:*" ]
CVE-2021-31718
The server in npupnp before 4.1.4 is affected by DNS rebinding in the embedded web server (including UPnP SOAP and GENA endpoints), leading to remote code execution.
[ "cpe:2.3:a:npupnp_project:npupnp:*:*:*:*:*:*:*:*" ]
CVE-2003-1091
Integer overflow in MP3Broadcaster for Apple QuickTime/Darwin Streaming Server 4.1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed ID3 tags in MP3 files.
[ "cpe:2.3:a:apple:quicktime_broadcaster:4.1.3:*:*:*:*:*:*:*" ]
GHSA-j8h4-w7cf-hch5
Filebeat versions through 7.17.9 and 8.6.2 have a flaw in httpjson input that allows the http request Authorization or Proxy-Authorization header contents to be leaked in the logs when debug logging is enabled.
[]
CVE-2024-20767
ColdFusion | Improper Access Control (CWE-284)
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
[ "cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*" ]
CVE-2001-0772
Buffer overflows and other vulnerabilities in multiple Common Desktop Environment (CDE) modules in HP-UX 10.10 through 11.11 allow attackers to cause a denial of service and possibly gain additional privileges.
[ "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*" ]
CVE-2020-11707
An issue was discovered in ProVide (formerly zFTPServer) through 13.1. It doesn't enforce permission over Windows Symlinks or Junctions. As a result, a low-privileged user (non-admin) can craft a Junction Link in a directory he has full control of, breaking out of the sandbox.
[ "cpe:2.3:a:provideserver:provide_ftp_server:*:*:*:*:*:windows:*:*" ]
CVE-2024-38135
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
CVE-2009-2838
Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
[ "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:server:*:*:*:*:*" ]
GHSA-83r4-rqg9-v5p9
In NFA_SendRawFrame of nfa_dm_api.cc, there is a possible out-of-bound write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120664978
[]
CVE-2019-13153
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the Private Port in Add Virtual Server.
[ "cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*" ]
GHSA-vfh4-r4qr-3v5f
Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30441 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2022-2464
ISaGRAF Workbench Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-22
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.
[ "cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*" ]
CVE-2024-32840
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
[ "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2022:su5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:endpoint_manager:2024:-:*:*:*:*:*:*" ]
CVE-2013-3585
Samsung Web Viewer for Samsung DVR devices stores credentials in cleartext, which allows context-dependent attackers to obtain sensitive information via vectors involving (1) direct access to a file or (2) the user-setup web page.
[ "cpe:2.3:a:samsung:smart_viewer:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:dvr:-:*:*:*:*:*:*:*" ]
CVE-2024-3055
Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.102 - Authenticated (Contributor+) SQL Injection
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.102 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:*:*:*" ]
GHSA-f5rx-rq8h-4w7v
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113508105
[]
GHSA-5x89-75r7-8rjh
XSS vulnerability in Jenkins useMango Runner Plugin
Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.useMango Runner Plugin 1.5 escapes all values received from the useMango service in form validation messages.
[]
GHSA-4873-36h9-wv49
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime
ImpactThere was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime.To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint wherethere are no live references at this safepoint, andthere is a safepoint with live references earlier in this frame's function.Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes.Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug.We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare.PatchesThis bug has been patched and users should upgrade to Wasmtime version 0.30.0.Additionally, we have updated [our primary `externref` fuzz target](https://github.com/bytecodealliance/wasmtime/blob/37c094faf53f1b356aab3c79d451395e4f7edb34/fuzz/fuzz_targets/table_ops.rs) such that it better exercises these code paths and we can have greater confidence in their correctness going forward.WorkaroundsIf you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to [`wasmtime::Config::wasm_reference_types`](https://docs.rs/wasmtime/0.29.0/wasmtime/struct.Config.html#method.wasm_reference_types)References[The Wasm reference types proposal, which introduces `externref`](https://github.com/WebAssembly/reference-types/)For more informationIf you have any questions or comments about this advisory:Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)Open an issue in [the `bytecodealliance/wasmtime` repository](https://github.com/bytecodealliance/wasmtime/)
[]
GHSA-3rp6-rjw4-cq39
Cross-origin Resource Sharing bypass in ASP.NET Core
ASP.NET Core 1.0, 1.1, and 2.0 allow an attacker to bypass Cross-origin Resource Sharing (CORS) configurations and retrieve normally restricted content from a web application, aka "ASP.NET Core Information Disclosure Vulnerability".
[]
CVE-1999-0465
Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
[]
GHSA-7crw-x45h-8wwx
Google Chrome before 6.0.472.53 does not properly restrict the characters in URLs, which allows remote attackers to spoof the appearance of the URL bar via homographic sequences.
[]
GHSA-pm5g-pw4v-3mv8
MongoDB 3.4.x before 3.4.10, and 3.5.x-development, has a disabled-by-default configuration setting, networkMessageCompressors (aka wire protocol compression), which exposes a vulnerability when enabled that could be exploited by a malicious attacker to deny service or modify memory.
[]
GHSA-j2c3-fc72-4vf3
SQL injection vulnerability in detail.asp in DUware DUpaypal 3.1, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the iType parameter. NOTE: the iState parameter is already covered by CVE-2005-3976 and the iPro parameter is already covered by CVE-2005-2047.
[]
CVE-2014-1642
The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.
[ "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*" ]
GHSA-rg5g-mjfh-w75q
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
[]
CVE-2011-5312
Multiple cross-site scripting (XSS) vulnerabilities in Gollos 2.8 allow remote attackers to inject arbitrary web script or HTML via the returnurl parameter to (1) register.aspx, (2) publication/info.aspx, or (3) user/add.aspx, or (4) the q parameter to product/list.aspx.
[ "cpe:2.3:a:gollos:gollos:2.8:*:*:*:*:*:*:*" ]
GHSA-3pw5-42hr-wxmc
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
[]
GHSA-fhwr-83wg-jjhq
Directory traversal vulnerability in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows has unspecified impact and attack vectors.
[]
GHSA-2wgc-48g2-cj5w
vantage6 has insecure SSH configuration for node and server containers
ImpactNodes and servers get a ssh config by default that permits root login with password authentication. In a proper deployment, the SSH service is not exposed so there is no risk, but not all deployments are ideal. The default should therefore be less permissive.We will probably opt to completely remove the ssh option as it is only used for debugging. Later, we can add a debug mode where we can activate it if necessary.WorkaroundsRemove the ssh part from the docker file and build your own docker image
[]
GHSA-mq7v-47j3-rc24
A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
[]
GHSA-hjmv-v6c5-x23j
An issue in Via Browser 6.1.0 allows a a remote attacker to execute arbitrary code via the mark.via.Shell component.
[]
GHSA-j7x4-332g-hq3w
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin <= 1.5.48 versions.
[]
GHSA-vgh7-9mhq-v768
Transient DOS in Data Modem during DTLS handshake.
[]
CVE-2021-25201
SQL injection vulnerability in Learning Management System v 1.0 allows remote attackers to execute arbitrary SQL statements through the id parameter to obtain sensitive database information.
[ "cpe:2.3:a:learning_management_system_project:learning_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-qcgq-r45c-jwv8
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-34198931. References: B-RB#112597.
[]
GHSA-65vw-3j28-v49q
ftpd before "NetBSD-ftpd 20230930" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable.
[]
CVE-2020-0332
In libstagefright, there is a possible dead loop due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-124783982
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
GHSA-7j9m-fcrr-vgjh
An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.
[]
CVE-2005-0515
Smc.exe in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before launching the Log Viewer export functionality, which allows local users to corrupt arbitrary files by saving log files.
[ "cpe:2.3:a:webroot_software:my_firewall_plus:5.0:*:*:*:*:*:*:*" ]
CVE-2019-0035
Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes
When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on systems booted from an OAM (Operations, Administration, and Maintenance) volume, leading to a possible administrative bypass with physical access to the console. OAM volumes (e.g. flash drives) are typically instantiated as /dev/gpt/oam, or /oam for short. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D68; 16.1 versions prior to 16.1R3-S10, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S8; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S3; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2. This issue does not affect Junos OS releases prior to 15.1.
[ "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d56:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2x75:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*" ]
GHSA-229r-pqp6-8w6g
sprout Arbitrary Code Execution vulnerability
The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
[]
GHSA-rjwx-r4qm-9x8f
Novell iChain 2.2 before Support Pack 1 does not properly verify that URL redirects match the DNS name of an accelerator, which allows attackers to redirect URLs to malicious web sites.
[]
GHSA-7ghm-6p42-h226
TeamPass Improper Privilege Management
TeamPass before 2.1.27.9 does not properly enforce item access control when requesting items.queries.php. It is then possible to copy any arbitrary item into a directory controlled by the attacker, edit any item within a read-only directory, delete an arbitrary item, delete the file attachments of an arbitrary item, copy the password of an arbitrary item to the copy/paste buffer, access the history of an arbitrary item, and edit attributes of an arbitrary directory. To exploit the vulnerability, an authenticated attacker must tamper with the requests sent directly, for example by changing the "item_id" parameter when invoking "copy_item" on items.queries.php.
[]
CVE-2018-6124
Type confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
CVE-2020-1516
Windows Work Folders Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*" ]
GHSA-3637-fm63-jqpr
Cross-site scripting (XSS) vulnerability in EMC RSA Authentication Manager before 8.1 SP1 P14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-0901.
[]
CVE-2022-44682
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*" ]
GHSA-955m-fqx8-5hp6
SQL Injection vulnerability exists in tp-shop 2.x-3.x via the /index.php/home/api/shop fBill parameter.
[]
GHSA-vjjf-3rvg-gv3v
Dulwich Buffer Overflow when handling pack files
Buffer overflow in the C implementation of the `apply_delta` function `in _pack.c` in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a crafted pack file.
[]
GHSA-59vv-g2mq-64c5
An arbitrary code execution vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to upload a malicious script file by constructing a POST type request and writing a payload in the request parameters as an instruction to write a file.
[]
CVE-2018-5273
In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).
[ "cpe:2.3:a:malwarebytes:malwarebytes:3.3.1.2183:*:*:*:premium:*:*:*" ]
GHSA-2f83-vmch-qqv5
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x00000000000e7326."
[]
CVE-2014-9443
Cross-site scripting (XSS) vulnerability in the Relevanssi plugin before 3.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:relevanssi:relevanssi:3.3.7.1:*:*:*:*:wordpress:*:*" ]
GHSA-vm2w-gxx4-c9vc
The Quick Restaurant Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-f9cp-vx85-2fm6
The User Registration WordPress plugin before 2.0.2 does not properly sanitise the user_registration_profile_pic_url value when submitted directly via the user_registration_update_profile_details AJAX action. This could allow any authenticated user, such as subscriber, to perform Stored Cross-Site attacks when their profile is viewed
[]
CVE-2025-5430
AssamLook CMS product.php sql injection
A vulnerability, which was classified as critical, has been found in AssamLook CMS 1.0. This issue affects some unknown processing of the file /product.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-9xv4-r2hf-26gh
Mercurial Improper Input Validation vulnerability
The `mpatch_apply` function in `mpatch.c` in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004.
[]
CVE-2012-1454
The ELF file parser in Dr.Web 5.0.2.03300, eSafe 7.0.17.0, McAfee Gateway (formerly Webwasher) 2010.1C, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified ei_version field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
[ "cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:drweb:dr.web_antivirus:5.0.2.03300:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:gateway:2010.1c:*:*:*:*:*:*:*", "cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:rising-global:rising_antivirus:22.83.00.03:*:*:*:*:*:*:*" ]
GHSA-rf4g-4vxr-q8px
BeOS allows remote attackers to cause a denial of service via malformed packets whose length field is less than the length of the headers.
[]
GHSA-xj26-gx3h-x793
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials.  Affected products:ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
[]
CVE-2022-23719
PingID Windows Login prior to 2.8 does not authenticate communication with a local Java service used to capture security key requests
PingID Windows Login prior to 2.8 does not authenticate communication with a local Java service used to capture security key requests. An attacker with the ability to execute code on the target machine maybe able to exploit and spoof the local Java service using multiple attack vectors. A successful attack can lead to code executed as SYSTEM by the PingID Windows Login application, or even a denial of service for offline security key authentication.
[ "cpe:2.3:a:pingidentity:pingid_integration_for_windows_login:*:*:*:*:*:*:*:*" ]
GHSA-28c2-w47p-wc76
JPEGDEC commit be4843c was discovered to contain a global buffer overflow via JPEGDecodeMCU at /src/jpeg.inl.
[]
GHSA-q4r6-mc36-rg96
Unspecified vulnerability in weblog.pl in PerlBlog 1.09b and earlier allows remote attackers to create arbitrary files and possibly execute arbitrary code via unspecified attack vectors related to improper handling of (1) the reply parameter, possibly involving injection of (2) the name parameter and (3) the body parameter.
[]
GHSA-p3ph-6245-4wfc
Cross-site Scripting in JFinalcms
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).
[]
CVE-2020-16985
Azure Sphere Information Disclosure Vulnerability
Azure Sphere Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*" ]
GHSA-cw39-pmcv-pmfj
An issue was discovered in the bestsoftinc Car Rental System plugin through 1.3 for WordPress. Persistent XSS can occur via any of the registration fields.
[]
CVE-2010-0319
Cross-site scripting (XSS) vulnerability in index.php in Docmint 1.0 and 2.1 allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:docmint:docmint:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:docmint:docmint:2.1:*:*:*:*:*:*:*" ]