Wind River Support Network

HomeCVE Database

The Common Vulnerabilities and Exposures (CVE) project, maintained by the MITRE Corporation, is a list of all standardized names for vulnerabilities and security exposures.

Reset
Showing
of 223178 entries
IDDescriptionPriorityModified dateFixed Release
CVE-2023-21680 Windows Win32k Elevation of Privilege Vulnerability -- Jan 11, 2023 n/a
CVE-2022-41109 Windows Win32k Elevation of Privilege Vulnerability -- Nov 10, 2022 n/a
CVE-2022-41092 Windows Win32k Elevation of Privilege Vulnerability -- Nov 10, 2022 n/a
CVE-2022-37986 Windows Win32k Elevation of Privilege Vulnerability -- Oct 12, 2022 n/a
CVE-2022-24542 Windows Win32k Elevation of Privilege Vulnerability MEDIUM Apr 15, 2022 n/a
CVE-2022-24474 Windows Win32k Elevation of Privilege Vulnerability MEDIUM Apr 15, 2022 n/a
CVE-2021-26863 Windows Win32k Elevation of Privilege Vulnerability HIGH Mar 13, 2021 n/a
CVE-2021-26900 Windows Win32k Elevation of Privilege Vulnerability HIGH Mar 11, 2021 n/a
CVE-2021-26875 Windows Win32k Elevation of Privilege Vulnerability MEDIUM Mar 11, 2021 n/a
CVE-2021-27077 Windows Win32k Elevation of Privilege Vulnerability HIGH Mar 11, 2021 n/a
CVE-2021-1698 Windows Win32k Elevation of Privilege Vulnerability MEDIUM Feb 26, 2021 n/a
CVE-2021-1732 Windows Win32k Elevation of Privilege Vulnerability MEDIUM Feb 26, 2021 n/a
CVE-2021-1709 Windows Win32k Elevation of Privilege Vulnerability HIGH Jan 12, 2021 n/a
CVE-2020-17057 Windows Win32k Elevation of Privilege Vulnerability HIGH Nov 12, 2020 n/a
CVE-2022-34699 Windows Win32k Elevation of Privilege Vulnerability. -- Aug 12, 2022 n/a
CVE-2023-36905 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability -- Aug 8, 2023 n/a
CVE-2022-29121 Windows WLAN AutoConfig Service Denial of Service Vulnerability LOW May 11, 2022 n/a
CVE-2021-36967 Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability MEDIUM Sep 15, 2021 n/a
CVE-2022-26935 Windows WLAN AutoConfig Service Information Disclosure Vulnerability LOW May 11, 2022 n/a
CVE-2021-36965 Windows WLAN AutoConfig Service Remote Code Execution Vulnerability HIGH Sep 15, 2021 n/a
CVE-2021-28316 Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability LOW Apr 15, 2021 n/a
CVE-2022-37984 Windows WLAN Service Elevation of Privilege Vulnerability -- Oct 12, 2022 n/a
CVE-2021-1646 Windows WLAN Service Elevation of Privilege Vulnerability HIGH Jan 15, 2021 n/a
CVE-2022-26807 Windows Work Folder Service Elevation of Privilege Vulnerability MEDIUM Apr 15, 2022 n/a
CVE-2021-25749 Windows workloads can run as ContainerAdministrator even when those workloads set the runAsNonRoot option to true. -- Sep 16, 2022 n/a
CVE-2022-38034 Windows Workstation Service Elevation of Privilege Vulnerability -- Oct 12, 2022 n/a
CVE-2017-16003 windows-build-tools is a module for installing C++ Build Tools for Windows using npm. windows-build-tools versions below 1.0.0 download resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. HIGH May 29, 2018 n/a
CVE-2016-10696 windows-latestchromedriver downloads the latest version of chromedriver.exe. windows-latestchromedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. HIGH Jun 4, 2018 n/a
CVE-2016-10687 windows-selenium-chromedriver is a module that downloads the Selenium Jar file. windows-selenium-chromedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. HIGH Jun 4, 2018 n/a
CVE-2016-10691 windows-seleniumjar is a module that downloads the Selenium Jar file windows-seleniumjar downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. HIGH Jun 4, 2018 n/a
CVE-2016-10670 windows-seleniumjar-mirror downloads the Selenium Jar file windows-seleniumjar-mirror downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. HIGH Jun 4, 2018 n/a
CVE-2022-22045 Windows.Devices.Picker.dll Elevation of Privilege Vulnerability MEDIUM Jul 16, 2022 n/a
CVE-2016-4710 WindowServer in Apple OS X before 10.12 allows local users to obtain root access via vectors that leverage type confusion, a different vulnerability than CVE-2016-4709. HIGH Sep 26, 2016 n/a
CVE-2016-4709 WindowServer in Apple OS X before 10.12 allows local users to obtain root access via vectors that leverage type confusion, a different vulnerability than CVE-2016-4710. HIGH Sep 26, 2016 n/a
CVE-2014-1314 WindowServer in Apple OS X through 10.9.2 does not prevent session creation by a sandboxed application, which allows attackers to bypass the sandbox protection mechanism and execute arbitrary code via a crafted application. High Apr 24, 2014 n/a
CVE-2018-10071 windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause a denial of service (BSOD) via a 0x953826DB DeviceIoControl call. MEDIUM Apr 12, 2018 n/a
CVE-2018-10072 windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause a denial of service (BSOD) via a 0x953827bf DeviceIoControl call. MEDIUM Apr 12, 2018 n/a
CVE-2018-9136 windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause a denial of service (BSOD) via a crafted .exe file, a different vulnerability than CVE-2018-8821. HIGH Mar 30, 2018 n/a
CVE-2018-8821 windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause a denial of service (BSOD) via a crafted .exe file. HIGH Mar 20, 2018 n/a
CVE-2018-11334 Windscribe 1.81 creates a named pipe with a NULL DACL that allows Everyone users to gain privileges or cause a denial of service via \.pipeWindscribeService. MEDIUM May 23, 2018 n/a
CVE-2013-7473 Windu CMS 2.2 allows CSRF via admin/users/?mn=admin.message.error to add an admin account. MEDIUM Aug 6, 2019 n/a
CVE-2013-7474 Windu CMS 2.2 allows XSS via the name parameter to admin/content/edit or admin/content/add, or the username parameter to admin/users. MEDIUM Aug 6, 2019 n/a
CVE-2009-0313 winetricks before 20081223 allows local users to overwrite arbitrary files via a symlink attack on the x_showmenu.txt temporary file. Medium Jan 28, 2009 n/a
CVE-2016-0047 WinForms in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 allows remote attackers to obtain sensitive information from process memory via crafted icon data, aka Windows Forms Information Disclosure Vulnerability. MEDIUM Feb 10, 2016 n/a
CVE-2008-5666 WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid NLST -1 command. Low Dec 25, 2008 n/a
CVE-2012-4729 Wing FTP Server before 4.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via two zip commands. Medium Oct 26, 2012 n/a
CVE-2020-8634 Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root. HIGH Mar 9, 2020 n/a
CVE-2020-8635 Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on installation directories and configuration files. This allows local users to arbitrarily create FTP users with full privileges, and escalate privileges within the operating system by modifying system files. HIGH Mar 9, 2020 n/a
CVE-2020-13866 WinGate v9.4.1.5998 has insecure permissions for the installation directory, which allows local users to gain privileges by replacing an executable file with a Trojan horse. HIGH Jun 8, 2020 n/a
CVE-2023-25152 Wings is Pterodactyl\'s server control plane. Affected versions are subject to a vulnerability which can be used to create new files and directory structures on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing server allocated and controlled by the Wings Daemon. This vulnerability has been resolved in version `v1.11.3` of the Wings Daemon, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. There are no known workarounds for this vulnerability. ### Workarounds None at this time. -- Feb 9, 2023 n/a
The 'Fixed Release' column is displayed if a single product version is selected from the filter. The fixed release is applicable in cases when the CVE has been addressed and fixed for that product version. Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online