id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2006-0328 | Format string vulnerability in Tftpd32 2.81 allows remote attackers to cause a denial of service via format string specifiers in a filename in a (1) GET or (2) SEND request. | [
"cpe:2.3:a:philippe_jounin:tftpd32:2.81:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-pmpf-mg57-995x | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | [] | null | 6.5 | null | null |
|
CVE-2011-0826 | Unspecified vulnerability in Oracle PeopleSoft Enterprise 8.8 Bundle #13, 8.9 Bundle #7, 9.0 Bundle #7, and 9.1 Bundle #4 allows remote authenticated users to affect integrity via unknown vectors related to Application Portal. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.8:bundle13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.9:bundle7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:9.0:bundle7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:9.1:bundle4:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-ppr8-5788-fjf2 | Rejected reason: Red Hat Product Security does not consider this to be a vulnerability. Upstream has not acknowledged this issue as a security flaw. | [] | null | null | null | null |
|
CVE-2004-0596 | The Equalizer Load-balancer for serial network interfaces (eql.c) in Linux kernel 2.6.x up to 2.6.7 allows local users to cause a denial of service via a non-existent device name that triggers a null dereference. | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2021-1853 | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3. A local attacker may be able to elevate their privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-r7wc-c46x-5q6f | In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. | [] | null | null | 6.5 | null |
|
GHSA-gh4f-q8m6-qhhw | Auth. Stored Cross-Site Scripting (XSS) in Oi Yandex.Maps for WordPress <= 3.2.7 versions. | [] | null | 5.4 | null | null |
|
CVE-2018-13082 | The mintToken function of a smart contract implementation for MODI Token (MODI), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:moditokenerc20_project:moditokenerc20:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2020-22016 | A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences. | [
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:-:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2024-34591 | Improper input validation in parsing an item data from RTCP SDES packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability. | [
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2021-44525 | Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required. | [
"cpe:2.3:a:zohocorp:manageengine_pam360:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.0:build4002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.1:build4101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:4.5:build4501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.0:build5004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.1:build5100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.2:build5200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5301:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_pam360:5.3:build5302:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-9f8c-f7h4-xghf | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180. | [] | null | 8.1 | null | null |
CVE-2024-45626 | Apache James: denial of service through JMAP HTML to text conversion | Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service.
Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue. | [] | null | 6.5 | null | null |
CVE-2022-44017 | An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout. | [
"cpe:2.3:a:simmeth:lieferantenmanager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-whrx-hm99-jg66 | Unrestricted file upload in /novel-admin/src/main/java/com/java2nb/common/controller/FileController.java in novel-plus all versions allows allows an attacker to upload malicious JSP files. | [] | null | 9.8 | null | null |
|
GHSA-vrq2-jwj7-6vrf | The Arris Touchstone DG950A cable modem with software 7.10.131 has an SNMP community of public, which allows remote attackers to obtain sensitive password, key, and SSID information via an SNMP request. | [] | null | null | null | null |
|
GHSA-353g-73mj-6wf9 | oVirt 3.2.2 through 3.5.0 does not invalidate the restapi session after logout from the webadmin, which allows remote authenticated users with knowledge of another user's session data to gain that user's privileges by replacing their session token with that of another user. | [] | null | null | 7.5 | null |
|
GHSA-47wv-vjpm-2h95 | The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands. | [] | null | null | null | null |
|
GHSA-p57h-3968-wf74 | Unspecified vulnerability in Futomi's CGI Cafe MP Form Mail CGI eCommerce 1.3.0 and earlier, and CGI Professional 3.2.2 and earlier, allows remote attackers to gain administrative privileges via unknown attack vectors. | [] | null | null | null | null |
|
GHSA-725m-hf23-77j7 | Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via /goform/SysToolRestoreSet . | [] | null | 8.8 | null | null |
|
GHSA-xfhf-q7xr-xpw6 | A buffer overflow in SkiaGl caused when a GrGLBuffer is truncated during allocation. Later writers will overflow the buffer, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 50.1. | [] | null | null | 7.5 | null |
|
GHSA-rrp2-4g3f-vv2g | Cross-site scripting (XSS) vulnerability in compat.php in Serendipity before 0.7.1 allows remote attackers to inject arbitrary web script or HTML via the searchTerm variable. | [] | null | null | null | null |
|
CVE-2019-8904 | do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf. | [
"cpe:2.3:a:file_project:file:5.35:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-qr65-6cj5-pxpw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Moss Peadig’s Google +1 Button allows DOM-Based XSS. This issue affects Peadig’s Google +1 Button: from n/a through 0.1.2. | [] | null | 6.5 | null | null |
|
GHSA-633w-6x85-3m7x | A Directory Traversal vulnerability in the Boa webserver of Vilo 5 Mesh WiFi System <= 5.16.1.33 allows remote, unauthenticated attackers to enumerate the existence and length of any file in the filesystem by placing malicious payloads in the path of any HTTP request. | [] | null | 5.3 | null | null |
|
GHSA-553f-pjfm-rx99 | The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat. | [] | null | null | 4.7 | null |
|
GHSA-mghh-jfj9-v2hx | Cross-site scripting (XSS) vulnerability in WebExpert allows remote attackers to inject arbitrary web script or HTML via a crafted User-Agent HTTP header. | [] | null | null | null | null |
|
GHSA-rg5c-8q26-mjhm | Cross-site request forgery (CSRF) vulnerability in IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to hijack the authentication of arbitrary users. | [] | null | null | 8.8 | null |
|
GHSA-cv7g-x7qp-j3gc | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
CVE-2018-11874 | Buffer overflow if the length of passphrase is more than 32 when setting up secure NDP connection in Snapdragon Mobile in version SD 835, SD 845, SD 850, SDA660. | [
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-37191 | A stored cross-site scripting (XSS) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Group and Description parameters. | [
"cpe:2.3:a:issabel:pbx:4.0.0-6:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2020-26411 | A potential DOS vulnerability was discovered in all versions of Gitlab starting from 13.4.x (>=13.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2). Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
RHSA-2021:3468 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 8 | undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS wildfly-core: Invalid Sensitivity Classification of Vault Expression undertow: buffer leak on incoming websocket PONG message may lead to DoS jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 4.8 | null | null |
CVE-2014-5241 | The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.23.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-49r2-2cm3-c4fj | Cross-site scripting (XSS) vulnerability in liste_article.php in Blog Pixel Motion (aka PixelMotion) allows remote attackers to inject arbitrary web script or HTML via the jours parameter. | [] | null | null | null | null |
|
GHSA-774c-xvc2-rpvr | The Ingress Intel Helper (aka com.bb.ingressintel) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-3qp2-xpxj-256j | extract-table.pl in Emacspeak 26 and 28 allows local users to overwrite arbitrary files via a symlink attack on the extract-table.csv temporary file. | [] | null | null | null | null |
|
GHSA-cf3m-48hf-6297 | EVA-L09 smartphones with software Earlier than EVA-L09C25B150CUSTC25D003 versions,Earlier than EVA-L09C440B140 versions,Earlier than EVA-L09C464B361 versions,Earlier than EVA-L09C675B320CUSTC675D004 versions have Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can login the Swype and can perform some operations to update the Google account. As a result, the FRP function is bypassed. | [] | null | null | 4.6 | null |
|
RHSA-2011:0197 | Red Hat Security Advisory: postgresql security update | PostgreSQL: Stack-based buffer overflow by processing certain tokens from SQL query string when intarray module enabled | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-3gjj-f2w8-w88q | modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | [] | null | null | null | null |
|
CVE-2025-0699 | JoeyBling bootplus list sql injection | A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sys/role/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
GHSA-6r8h-8x56-2jqr | A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.We have already fixed the vulnerability in the following versions:
QTS 5.2.3.3006 build 20250108 and later
QuTS hero h5.2.3.3006 build 20250108 and later | [] | 5.1 | 4.7 | null | null |
|
GHSA-xh9r-6fmf-q43q | The leakage of the client secret in Matsuya Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages. | [] | null | 7.5 | null | null |
|
CVE-2024-45510 | An issue was discovered in Zimbra Collaboration (ZCS) through 10.0. Zimbra Webmail (Modern UI) is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper sanitization of user input. This allows an attacker to inject malicious code into specific fields of an e-mail message. When the victim adds the attacker to their contacts, the malicious code is stored and executed when viewing the contact list. This can lead to unauthorized actions such as arbitrary mail sending, mailbox exfiltration, profile picture alteration, and other malicious actions. Proper sanitization and escaping of input fields are necessary to mitigate this vulnerability. | [] | null | 5.4 | null | null |
|
CVE-2024-35194 | Stacklok Minder vulnerable to denial of service from maliciously crafted templates | Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50. | [] | null | 5.3 | null | null |
CVE-2019-19727 | SchedMD Slurm before 18.08.9 and 19.x before 19.05.5 has weak slurmdbd.conf permissions. | [
"cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
GHSA-w5gj-ccxg-c83p | Twigmo bundled with CS-Cart 4.3.9 and earlier and Twigmo bundled with CS-Cart Multi-Vendor 4.3.9 and earlier allow remote authenticated users to execute arbitrary PHP code on the servers. | [] | null | null | 8.8 | null |
|
CVE-2019-8128 | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can exploit it by injecting malicious Javascript into the name of main website. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-m843-mrw3-f2mr | Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c. | [] | null | null | null | null |
|
GHSA-36x9-82rm-pg8f | man-db 2.3.12 and 2.3.18 to 2.4.1 uses certain user-controlled DEFINE directives from the ~/.manpath file, even when running setuid, which could allow local users to gain privileges. | [] | null | null | null | null |
|
GHSA-qv2m-4wv2-f33h | Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `Initial Context Setup Response` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service. | [] | null | 5.3 | null | null |
|
CVE-2024-39698 | Code Signing Bypass on Windows in electron-updater < 6.3.0-alpha.6 | electron-updater allows for automatic updates for Electron apps. The file `packages/electron-updater/src/windowsExecutableCodeSignatureVerifier.ts` implements the signature validation routine for Electron applications on Windows. Because of the surrounding shell, a first pass by `cmd.exe` expands any environment variable found in command-line above. This creates a situation where `verifySignature()` can be tricked into validating the certificate of a different file than the one that was just downloaded. If the step is successful, the malicious update will be executed even if its signature is invalid. This attack assumes a compromised update manifest (server compromise, Man-in-the-Middle attack if fetched over HTTP, Cross-Site Scripting to point the application to a malicious updater server, etc.). The patch is available starting from 6.3.0-alpha.6. | [
"cpe:2.3:a:electron:electron:*:*:*:*:*:*:*:*",
"cpe:2.3:a:electron:electron-builder:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha0:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha1:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha2:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha3:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha4:*:*:*:node.js:*:*",
"cpe:2.3:a:electron:electron-builder:6.3.0:alpha5:*:*:*:node.js:*:*"
] | null | 7.5 | null | null |
GHSA-9vvh-9hhr-7gvr | Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 3.3 | null | null |
|
GHSA-m5m5-h3mf-ph9j | The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ultimate_pricing shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2007-3538 | SQL injection vulnerability in qtg_msg_view.php in QuickTalk guestbook 1.2 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:qt-cute:quicktalk_guestbook:1.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-21526 | All versions of the package speaker are vulnerable to Denial of Service (DoS) when providing unexpected input types to the channels property of the Speaker object makes it possible to reach an assert macro. Exploiting this vulnerability can lead to a process crash. | [
"cpe:2.3:a:tootallnate:node-speaker:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-wfr6-fwjh-5jx6 | Missing Authorization vulnerability in Jogesh Responsive Google Map allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Responsive Google Map: from n/a through 3.1.5. | [] | null | 5.3 | null | null |
|
CVE-2022-0582 | Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
GHSA-q5j9-f95w-f4pr | TERASOLUNA Server Framework vulnerable to ClassLoader manipulation | TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to ClassLoader manipulation due to using the old version of Spring Framework which contains the vulnerability. The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.When using TERASOLUNA Global Framework 1.0.0 (Public review version), update to TERASOLUNA Server Framework for Java 5.7.1.SP1 (using Spring Framework 5.3.18). This vulnerability alone can be addressed by updating to TERASOLUNA Global Framework 1.0.1 (using Spring Framework 3.2.10) or later. | [] | null | 7.8 | null | null |
CVE-2019-2417 | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Performance Monitor). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.4 |
|
GHSA-88g2-xgh9-4ph2 | OroCommerce get-totals-for-checkout API endpoint returns unwanted data | Detailed Checkout totals information may be received by Checkout ID | [] | null | 5.8 | null | null |
GHSA-h26m-qmpx-mvhh | In the Linux kernel, the following vulnerability has been resolved:udp: Fix multiple wraparounds of sk->sk_rmem_alloc.__udp_enqueue_schedule_skb() has the following condition:if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf)
goto drop;sk->sk_rcvbuf is initialised by net.core.rmem_default and later can
be configured by SO_RCVBUF, which is limited by net.core.rmem_max,
or SO_RCVBUFFORCE.If we set INT_MAX to sk->sk_rcvbuf, the condition is always false
as sk->sk_rmem_alloc is also signed int.Then, the size of the incoming skb is added to sk->sk_rmem_alloc
unconditionally.This results in integer overflow (possibly multiple times) on
sk->sk_rmem_alloc and allows a single socket to have skb up to
net.core.udp_mem[1].For example, if we set a large value to udp_mem[1] and INT_MAX to
sk->sk_rcvbuf and flood packets to the socket, we can see multiple
overflows:cat /proc/net/sockstat | grep UDP:UDP: inuse 3 mem 7956736 <-- (7956736 << 12) bytes > INT_MAX * 15
^- PAGE_SHIFTss -uamState Recv-Q ...
UNCONN -1757018048 ... <-- flipping the sign repeatedly
skmem:(r2537949248,rb2147483646,t0,tb212992,f1984,w0,o0,bl0,d0)Previously, we had a boundary check for INT_MAX, which was removed by
commit 6a1f12dd85a8 ("udp: relax atomic operation on sk->sk_rmem_alloc").A complete fix would be to revert it and cap the right operand by
INT_MAX:rmem = atomic_add_return(size, &sk->sk_rmem_alloc);
if (rmem > min(size + (unsigned int)sk->sk_rcvbuf, INT_MAX))
goto uncharge_drop;but we do not want to add the expensive atomic_add_return() back just
for the corner case.Casting rmem to unsigned int prevents multiple wraparounds, but we still
allow a single wraparound.cat /proc/net/sockstat | grep UDP:UDP: inuse 3 mem 524288 <-- (INT_MAX + 1) >> 12ss -uamState Recv-Q ...
UNCONN -2147482816 ... <-- INT_MAX + 831 bytes
skmem:(r2147484480,rb2147483646,t0,tb212992,f3264,w0,o0,bl0,d14468947)So, let's define rmem and rcvbuf as unsigned int and check skb->truesize
only when rcvbuf is large enough to lower the overflow possibility.Note that we still have a small chance to see overflow if multiple skbs
to the same socket are processed on different core at the same time and
each size does not exceed the limit but the total size does.Note also that we must ignore skb->truesize for a small buffer as
explained in commit 363dc73acacb ("udp: be less conservative with
sock rmem accounting"). | [] | null | 5.5 | null | null |
|
GHSA-w569-jf9w-w6mg | Cross-site scripting (XSS) vulnerability in index.php in eTicket 1.5.6-RC4 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] | null | null | null | null |
|
CVE-2024-35847 | irqchip/gic-v3-its: Prevent double free on error | In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Prevent double free on error
The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.
Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().
[ tglx: Massaged change log ] | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2019-20735 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.75, D6000 before V1.0.0.75, D6100 before V1.0.0.63, R7800 before v1.0.2.52, R8900 before v1.0.4.2, R9000 before v1.0.4.2, RBK50 before v2.3.0.32, RBR50 before v2.3.0.32, RBS50 before v2.3.0.32, WNDR3700v4 before V1.0.2.102, WNDR4300v1 before V1.0.2.104, WNDR4300v2 before v1.0.0.58, WNDR4500v3 before v1.0.0.58, WNR2000v5 before v1.0.0.68, and XR500 before V2.3.2.32. | [
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v1:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
|
GHSA-674v-3g2w-84gx | Sandbox bypass in fenom | In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true. | [] | null | 10 | null | null |
cisco-sa-iosxr-info-GXp7nVcP | Cisco IOS XR Software Model-Driven Programmability Behavior with AAA Authorization | Cisco IOS XR Software supports a programmatic way of configuring and collecting operational data on a network device using data models. Data models provide access to the capabilities of the devices in a network using NETCONF or gRPC.
According to Cisco IOS XR Software configuration guides, if NETCONF or gRPC are enabled on a device, authentication, authorization, and accounting (AAA) authorization should be configured to prevent unauthorized access:
Configure AAA authorization to restrict users from uncontrolled access. If AAA authorization is not configured, the command and data rules associated to the groups that are assigned to the user are bypassed. An IOS-XR user can have full read-write access to the IOS-XR configuration through Network Configuration Protocol (NETCONF), google-defined Remote Procedure Calls (gRPC) or any YANG-based agents. In order to avoid granting uncontrolled access, enable AAA authorization using aaa authorization exec command before setting up any configuration
This informational advisory describes the impact of not having AAA authorization configured on a device when NETCONF or gRPC (gRPC Network Management Interface or gRPC Network Operations Interface) are configured.
This advisory is part of the September 2023 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75241"]. | [] | null | null | null | null |
RHSA-2013:0521 | Red Hat Security Advisory: pam security, bug fix, and enhancement update | (pam_env): Stack-based buffer overflow by parsing user's pam_environment file (pam_env): Infinite loop by expanding certain arguments | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-jcw9-xh9j-x87m | gforge 3.1 and 4.5.14 allows local users to truncate arbitrary files via a symlink attack on temporary files. | [] | null | null | null | null |
|
CVE-2024-47116 | IBM Sterling B2B Integrator cross-site scripting | IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.5:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.3:*:*:*:standard:*:*:*"
] | null | 5.4 | null | null |
GHSA-m9fv-32mm-97pv | Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability. | [] | null | 4.3 | null | null |
|
GHSA-9rxr-pq32-x932 | A Denial of Service vulnerability in the SIP application layer gateway (ALG) component of Junos OS based platforms allows an attacker to crash MS-PIC, MS-MIC, MS-MPC, MS-DPC or SRX flow daemon (flowd) process. This issue affects Junos OS devices with NAT or stateful firewall configuration in combination with the SIP ALG enabled. SIP ALG is enabled by default on SRX Series devices except for SRX-HE devices. SRX-HE devices have SIP ALG disabled by default. The status of ALGs in SRX device can be obtained by executing the command: show security alg status Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D77; 12.3X48 versions prior to 12.3X48-D70; 15.1X49 versions prior to 15.1X49-D140; 15.1 versions prior to 15.1R4-S9, 15.1R7-S1; 15.1F6; 16.1 versions prior to 16.1R4-S9, 16.1R6-S1, 16.1R7; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R1-S6, 17.2R2-S4, 17.2R3; 17.3 versions prior to 17.3R1-S5, 17.3R2-S2, 17.3R3; 17.4 versions prior to 17.4R2. No other Juniper Networks products or platforms are affected by this issue. | [] | null | null | 5.9 | null |
|
CVE-2016-7528 | The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2020-12023 | Philips IntelliBridge Enterprise IBE Insertion of Sensitive Information into Log File | Philips IntelliBridge Enterprise (IBE), Versions B.12 and prior, IntelliBridge Enterprise system integration with SureSigns (VS4), EarlyVue (VS30) and IntelliVue Guardian (IGS). Unencrypted user credentials received in the IntelliBridge Enterprise (IBE) are logged within the transaction logs, which are secured behind the login based administrative web portal. The unencrypted user credentials sent from the affected products listed above, for the purpose of handshake or authentication with the Enterprise Systems, are logged as the payload in IntelliBridge Enterprise (IBE) within the transaction logs. An attacker with administrative privileges could exploit this vulnerability to read plain text credentials from log files. | [
"cpe:2.3:a:philips:intellibridge_enterprise:*:*:*:*:*:*:*:*"
] | null | 2 | null | null |
CVE-2022-43391 | A buffer overflow vulnerability in the parameter of the CGI program in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted HTTP request.
| [
"cpe:2.3:o:zyxel:lte3301-plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte3301-plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte5388-m804_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte5388-m804:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte5398-m904_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte5398-m904:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7240-m403_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7240-m403:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7461-m602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7461-m602:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7480-m804_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7480-m804:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7480-s905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7480-s905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7485-s905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7485-s905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:lte7490-m904_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:lte7490-m904:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_lte3301-plus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_lte3301-plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_lte7461-m602_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_lte7461-m602:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_nr5101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_nr5101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nebula_nr7101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nebula_nr7101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr5101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr5101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr7101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr7101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:nr7102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nr7102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx3301-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx3301-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx4510-b1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx4510-b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:dx5401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:dx5401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg3525-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg3525-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg5523-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg5523-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:emg5723-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:emg5723-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex3301-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex3301-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex3510-b0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex3510-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5501-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5501-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5510-b0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5510-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5512-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5512-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5600-t1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5600-t1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5601-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5601-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ex5601-t1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ex5601-t1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg3927-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg3927-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg4005-b50a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg4005-b50a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg4005-b60a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg4005-b60a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8623-t50b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8623-t50b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:vmg8825-t50k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg8825-t50k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:ax7501-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:ax7501-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm3100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm3100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm5100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm5100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm7300-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm7300-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pm7320-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pm7320-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5317-t20b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5317-t20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5617-t20b2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5617-t20b2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5617ga_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5617ga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:pmg5622ga_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:pmg5622ga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx3100-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx3100-t0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx3401-b0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx3401-b0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:wx5600-t0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wx5600-t0:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-9h2w-crmf-mr2p | In the Linux kernel, the following vulnerability has been resolved:net: fix NULL pointer in skb_segment_listCommit 3a1296a38d0c ("net: Support GRO/GSO fraglist chaining.")
introduced UDP listifyed GRO. The segmentation relies on frag_list being
untouched when passing through the network stack. This assumption can be
broken sometimes, where frag_list itself gets pulled into linear area,
leaving frag_list being NULL. When this happens it can trigger
following NULL pointer dereference, and panic the kernel. Reverse the
test condition should fix it.[19185.577801][ C1] BUG: kernel NULL pointer dereference, address:
...
[19185.663775][ C1] RIP: 0010:skb_segment_list+0x1cc/0x390
...
[19185.834644][ C1] Call Trace:
[19185.841730][ C1] <TASK>
[19185.848563][ C1] __udp_gso_segment+0x33e/0x510
[19185.857370][ C1] inet_gso_segment+0x15b/0x3e0
[19185.866059][ C1] skb_mac_gso_segment+0x97/0x110
[19185.874939][ C1] __skb_gso_segment+0xb2/0x160
[19185.883646][ C1] udp_queue_rcv_skb+0xc3/0x1d0
[19185.892319][ C1] udp_unicast_rcv_skb+0x75/0x90
[19185.900979][ C1] ip_protocol_deliver_rcu+0xd2/0x200
[19185.910003][ C1] ip_local_deliver_finish+0x44/0x60
[19185.918757][ C1] __netif_receive_skb_one_core+0x8b/0xa0
[19185.927834][ C1] process_backlog+0x88/0x130
[19185.935840][ C1] __napi_poll+0x27/0x150
[19185.943447][ C1] net_rx_action+0x27e/0x5f0
[19185.951331][ C1] ? mlx5_cq_tasklet_cb+0x70/0x160 [mlx5_core]
[19185.960848][ C1] __do_softirq+0xbc/0x25d
[19185.968607][ C1] irq_exit_rcu+0x83/0xb0
[19185.976247][ C1] common_interrupt+0x43/0xa0
[19185.984235][ C1] asm_common_interrupt+0x22/0x40
...
[19186.094106][ C1] </TASK> | [] | null | 5.5 | null | null |
|
GHSA-qrq3-38m6-9m5j | In GetMBheader of combined_decode.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-136175447 | [] | null | 8.8 | null | null |
|
GHSA-v5vc-xx2v-57v7 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, when making a high speed Dual Carrier Downlink Data call in a multicell environment, a buffer overflow may occur. | [] | null | null | 9.8 | null |
|
CVE-2017-16893 | The application Piwigo is affected by an SQL injection vulnerability in version 2.9.2 and possibly prior. This vulnerability allows remote authenticated attackers to obtain information in the context of the user used by the application to retrieve data from the database. tags.php is affected: values of the edit_list parameters are not sanitized; these are used to construct an SQL query and retrieve a list of registered users into the application. | [
"cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-q7w8-7jp2-2p9v | The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message. | [] | null | null | null | null |
|
CVE-2023-3355 | Null pointer dereference in submit_lookup_cmds() in drivers/gpu/drm/msm/msm_gem_submit.c | A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system. | [
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*"
] | null | 4.7 | null | null |
GHSA-fchh-435h-cf8h | IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 257705. | [] | null | 5.4 | null | null |
|
GHSA-hwfj-cvxw-8xw6 | An Incorrect Access Control vulnerability exists in zzcms 8.2, which lets a malicious user bypass authentication by changing the user name in the cookie to use any password. | [] | null | null | null | null |
|
GHSA-wpcp-36gf-6gxq | A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service. | [] | null | 5.5 | null | null |
|
CVE-2024-9242 | Memberful – Membership Plugin <= 1.73.7 - Authenticated (contributor+) Stored Cross-Site Scripting | The Memberful – Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'memberful_buy_subscription_link' and 'memberful_podcasts_link' shortcodes in all versions up to, and including, 1.73.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:memberful:memberful:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
GHSA-qp79-hqwr-wfrw | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector. | [] | null | null | null | null |
|
GHSA-wxfc-g96x-mm56 | The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability." | [] | null | null | 9.8 | null |
|
CVE-2005-0992 | Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin before 2.6.2-rc1 allows remote attackers to inject arbitrary web script or HTML via the convcharset parameter. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_rc1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-x87r-37q5-mmr8 | Moodle has CSRF risk in Feedback non-respondents report | The bulk message sending feature in Moodle's Feedback module's non-respondents report had an incorrect CSRF token check, leading to a CSRF vulnerability. | [] | 8 | 8.1 | null | null |
GHSA-jr38-ch73-ccgx | aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap. | [] | null | 9.8 | null | null |
|
CVE-2024-7833 | D-Link DI-8100 upgrade_filter.asp upgrade_filter_asp command injection | A vulnerability was found in D-Link DI-8100 16.07. It has been classified as critical. This affects the function upgrade_filter_asp of the file upgrade_filter.asp. The manipulation of the argument path leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:o:dlink:di-8100_firmware:16.07:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:di-8100:-:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2021-25848 | Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to using fixed loop counter variable without checking the actual available length via a crafted lldp packet. | [
"cpe:2.3:o:moxa:vport_06ec-2v26m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v26m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-ct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v36m-ct-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v36m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-ct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v42m-ct-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v42m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-ct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v60m-ct-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v60m-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-ct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:vport_06ec-2v80m-ct-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_06ec-2v80m-ct-t:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 8.5 |
|
GHSA-7cfh-j5pv-fw3c | IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity. | [] | null | 5.3 | null | null |
|
CVE-2018-15942 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-w784-6hh8-995v | Improper Control of Generation of Code ('Code Injection') vulnerability in SFS Consulting ww.Winsure allows Code Injection.This issue affects ww.Winsure: before 4.6.2. | [] | 9.2 | 9.8 | null | null |
|
CVE-2022-48702 | ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() | In the Linux kernel, the following vulnerability has been resolved:
ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()
The voice allocator sometimes begins allocating from near the end of the
array and then wraps around, however snd_emu10k1_pcm_channel_alloc()
accesses the newly allocated voices as if it never wrapped around.
This results in out of bounds access if the first voice has a high enough
index so that first_voice + requested_voice_count > NUM_G (64).
The more voices are requested, the more likely it is for this to occur.
This was initially discovered using PipeWire, however it can be reproduced
by calling aplay multiple times with 16 channels:
aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero
UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40
index 65 is out of range for type 'snd_emu10k1_voice [64]'
CPU: 1 PID: 31977 Comm: aplay Tainted: G W IOE 6.0.0-rc2-emu10k1+ #7
Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002 07/22/2010
Call Trace:
<TASK>
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
ubsan_epilogue+0x9/0x3f
__ubsan_handle_out_of_bounds.cold+0x44/0x49
snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]
snd_pcm_hw_params+0x29f/0x600 [snd_pcm]
snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]
? exit_to_user_mode_prepare+0x35/0x170
? do_syscall_64+0x69/0x90
? syscall_exit_to_user_mode+0x26/0x50
? do_syscall_64+0x69/0x90
? exit_to_user_mode_prepare+0x35/0x170
snd_pcm_ioctl+0x27/0x40 [snd_pcm]
__x64_sys_ioctl+0x95/0xd0
do_syscall_64+0x5c/0x90
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd | [] | null | 7.8 | null | null |
CVE-2024-6998 | Use after free in User Education in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-gh4c-22p8-f7pp | A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the channel description field. | [] | null | 5.4 | null | null |
|
RHSA-2016:1649 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.1 security update on RHEL 6 | openssl: EVP_EncodeUpdate overflow openssl: EVP_EncryptUpdate overflow mod_cluster: remotely Segfault Apache http server HTTPD: sets environmental variable based on user supplied Proxy request header | [
"cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
] | null | null | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.