id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
RHSA-2025:0324
Red Hat Security Advisory: rsync security update
rsync: Info Leak via Uninitialized Stack Contents
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
null
CVE-2021-33114
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.
[ "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_1550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*" ]
null
5.7
null
2.7
null
CVE-2022-36503
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateMacClone.
[ "cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-fj8g-7f3j-g879
An issue in Plug n Play Camera com.starvedia.mCamView.zwave 5.5.1 allows a remote attacker to obtain sensitive information via the firmware update process
[]
null
7.5
null
null
null
CVE-2023-32510
WordPress Order Your Posts Manually Plugin <= 2.2.5 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <= 2.2.5 versions.
[ "cpe:2.3:a:cagewebdev:order_your_posts_manually:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2019-11372
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
[ "cpe:2.3:a:mediaarea:mediainfo:18.12:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-mf98-r2gf-2x3w
OpenStack Keystone Improper Authentication vulnerability
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
[]
null
null
null
null
null
GHSA-4p4w-5jf3-q849
The cinemaproject/monorepo repository through 2021-03-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[]
null
9.3
null
null
null
CVE-2022-2780
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
[ "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
CVE-2020-17070
Windows Update Medic Service Elevation of Privilege Vulnerability
Windows Update Medic Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-9c7p-6wrp-cw32
A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition.
[]
null
null
null
null
null
GHSA-gv98-9r75-xrjg
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.
[]
null
null
null
null
null
CVE-2020-8493
A stored XSS vulnerability in Kronos Web Time and Attendance (webTA) affects 3.8.x and later 3.x versions before 4.0 via multiple input fields (Login Message, Banner Message, and Password Instructions) of the com.threeis.webta.H261configMenu servlet via an authenticated administrator.
[ "cpe:2.3:a:kronos:web_time_and_attendance:*:*:*:*:*:*:*:*" ]
null
null
6.9
null
null
CVE-2017-16058
gruntcli was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
[ "cpe:2.3:a:gruntcli_project:gruntcli:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
null
CVE-2021-26929
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
[ "cpe:2.3:a:horde:groupware:*:*:*:*:webmail:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
RHSA-2022:4671
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled
[ "cpe:/a:redhat:openshift_gitops:1.3::el8" ]
null
10
null
null
null
GHSA-qmw9-5q6h-hjxj
The System Dashboard WordPress plugin before 2.8.10 does not sanitize and escape some parameters, which could allow administrators in multisite WordPress configurations to perform Cross-Site Scripting attacks
[]
null
5.4
null
null
null
GHSA-3mfq-6299-p3w3
A flaw was found in the Linux kernels implementation of MIDI (kernel 5.7-rc6), where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation.
[]
null
7.8
null
null
null
CVE-2015-6245
epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-4qqx-hf2g-m26g
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18653.
[]
null
5.5
null
null
null
GHSA-h79h-2326-9h3v
The ReadMetaFromId3v2 function in taglib.cpp in the TagLib plugin in VideoLAN VLC media player 0.9.0 through 1.1.2 does not properly process ID3v2 tags, which allows remote attackers to cause a denial of service (application crash) via a crafted media file.
[]
null
null
null
null
null
GHSA-8h36-898g-vfff
IBM RELM 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126242.
[]
null
null
5.4
null
null
CVE-2024-35670
WordPress Integrate Google Drive plugin <= 1.3.93 - Broken Access Control vulnerability
Broken Authentication vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.93.
[ "cpe:2.3:a:softlabbd:integrate_google_drive:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
CVE-2023-21808
.NET and Visual Studio Remote Code Execution Vulnerability
.NET and Visual Studio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2021-2248
Vulnerability in the Oracle Secure Global Desktop product of Oracle Virtualization (component: Server). The supported version that is affected is 5.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop. While the vulnerability is in Oracle Secure Global Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Secure Global Desktop.
[ "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*" ]
null
10
null
null
null
CVE-2019-12414
In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab
[ "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
RHSA-2023:6802
Red Hat Security Advisory: xorg-x11-server security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
null
CVE-2017-11307
Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-9519
UserPlus <= 2.0 - Authenticated (Editor+) Registration Form Update to Privilege Escalation
The UserPlus plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'save_metabox_form' function in versions up to, and including, 2.0. This makes it possible for authenticated attackers, with editor-level permissions or above, to update the registration form role to administrator, which leads to privilege escalation.
[ "cpe:2.3:a:userplus:user_registration_and_user_profile:*:*:*:*:*:*:*:*", "cpe:2.3:a:wpuserplus:userplus:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
null
null
CVE-2022-36681
Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_account.
[ "cpe:2.3:a:simple_task_scheduling_system_project:simple_task_scheduling_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2025-7527
Tenda FH1202 AdvSetWan fromAdvSetWan stack-based overflow
A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
8.8
9
null
CVE-2023-32524
Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32523.
[ "cpe:2.3:a:trendmicro:mobile_security:9.8:sp5:*:*:enterprise:windows:*:*" ]
null
8.8
null
null
null
CVE-2012-3018
The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.
[ "cpe:2.3:a:iconics:genesis32:*:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:8.05:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:*:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:8.05:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*", "cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*" ]
null
null
null
4.4
null
GHSA-gvmv-rhmr-mw99
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.
[]
null
6.5
null
null
null
CVE-2018-11386
An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
[ "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
GHSA-9frr-8rxx-97f3
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2.
[]
null
9.8
null
null
null
GHSA-vw8g-gwgr-767g
A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information.
[]
null
7.5
null
null
null
GHSA-g4m4-xx42-vc78
A vulnerability was found in WuKongOpenSource Wukong_nocode up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ExpressionUtil.java of the component AviatorScript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271051.
[]
5.3
6.3
null
null
null
RHSA-2024:1864
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 for OpenShift image enhancement and security update
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7.5
null
null
null
CVE-2024-39463
9p: add missing locking around taking dentry fid list
In the Linux kernel, the following vulnerability has been resolved: 9p: add missing locking around taking dentry fid list Fix a use-after-free on dentry's d_fsdata fid list when a thread looks up a fid through dentry while another thread unlinks it: UAF thread: refcount_t: addition on 0; use-after-free. p9_fid_get linux/./include/net/9p/client.h:262 v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129 v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181 v9fs_fid_lookup+0xbf/0xc20 linux/fs/9p/fid.c:314 v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400 vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248 Freed by: p9_fid_destroy (inlined) p9_client_clunk+0xb0/0xe0 linux/net/9p/client.c:1456 p9_fid_put linux/./include/net/9p/client.h:278 v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55 v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518 vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335 The problem is that d_fsdata was not accessed under d_lock, because d_release() normally is only called once the dentry is otherwise no longer accessible but since we also call it explicitly in v9fs_remove that lock is required: move the hlist out of the dentry under lock then unref its fids once they are no longer accessible.
[ "cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*" ]
null
7.8
null
null
null
PYSEC-2023-240
null
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 . Apache Submarine uses JAXRS to define REST endpoints. In order to handle YAML requests (using application/yaml content-type), it defines a YamlEntityProvider entity provider that will process all incoming YAML requests. In order to unmarshal the request, the readFrom method is invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`. We have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`. This issue affects Apache Submarine: from 0.7.0 before 0.8.0. Users are recommended to upgrade to version 0.8.0, which fixes this issue. If using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.
[]
null
null
null
null
null
RHSA-2023:7770
Red Hat Security Advisory: rh-postgresql12-postgresql security update
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
7.5
null
null
null
CVE-2010-3919
Fenrir Grani 4.5 and earlier does not prevent interaction between web script and the clipboard, which allows remote attackers to read or modify the clipboard contents via a crafted web site.
[ "cpe:2.3:a:fenrir:grani:*:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir:grani:4.4:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-vhm5-4pmc-4r29
An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution.
[]
null
7.5
null
null
null
CVE-2019-9295
In com.android.apps.tag, there is a possible bypass of user interaction requirements due to a missing permission check. This could lead to a to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-36885811
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
GHSA-g3f9-cx7h-5hwr
Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
[]
null
7.8
null
null
null
GHSA-7892-38hq-f82j
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php by adding a question mark (?) followed by the payload.
[]
null
4.8
null
null
null
GHSA-w9mm-wmr9-fjjp
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
6.6
null
null
CVE-2010-1902
Buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via unspecified properties in the data in a crafted RTF document, aka "Word RTF Parsing Buffer Overflow Vulnerability."
[ "cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2015-4408
Buffer overflow on Hikvision NVR DS-76xxNI-E1/2 and DS-77xxxNI-E4 devices before 3.4.0 allows remote authenticated users to cause a denial of service (service interruption) via a crafted HTTP request, aka the ISAPI issue.
[ "cpe:2.3:o:hikvision:ds-76xxx_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7604ni-e1\\/4p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-12\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7608ni-e1\\/8p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-12\\/16p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7616ni-e2\\/16p:-:*:*:*:*:*:*:*", "cpe:2.3:o:hikvision:ds-77xxx_series_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7716ni-14\\/16p:-:*:*:*:*:*:*:*", "cpe:2.3:h:hikvision:ds-7716ni-sp\\/16:-:*:*:*:*:*:*:*" ]
null
null
6.5
6.8
null
GHSA-mr7q-8xm4-vgvg
A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74
[]
null
null
null
null
null
GHSA-8xx8-72q4-m3hg
An exploitable privilege escalation vulnerability exists in the helper service CleanMyMac X, version 4.20, due to improper updating. The application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.
[]
null
null
5.5
null
null
GHSA-rhm7-43jx-x3wq
SQL injection vulnerability in Deadlock User Management System (phpdeadlock) 0.64 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
CVE-2017-1189
IBM WebSphere Portal and Web Content Manager 6.1, 7.0, and 8.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123558.
[ "cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:cf001:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf004:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf005:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf006:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf007:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf008:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf009:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf010:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf019:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf011:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf012:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf013:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf014:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf015:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf016:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf017:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf018:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf019:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf020:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf021:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf022:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf23:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf24:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf25:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf26:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf27:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf03:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf04:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf05:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf04:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf05:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf06:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf07:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf08:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf09:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf12:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2023-24957
IBM Business Automation Workflow cross-site scripting
IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246115.
[ "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:18.0.0.1:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:18.0.0.2:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:traditional:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:-:*:*:containers:*:*:*", "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:if001:*:*:containers:*:*:*" ]
null
5.4
null
null
null
GHSA-pr6w-g472-rf39
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
[]
null
4.3
null
null
null
GHSA-f9v3-rvrm-52r5
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a heap-based overflow vulnerability, where certain input can corrupt the heap and crash the forked process.
[]
null
8.8
null
null
null
GHSA-48cr-x7pp-992r
Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election allows Stored XSS.This issue affects Board Election: from n/a through 1.0.1.
[]
null
7.1
null
null
null
CVE-2010-1679
Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.
[ "cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.9.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.26:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.27:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.10.28:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.13.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.16.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.25:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.26:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.27:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.28:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.14.29:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:dpkg:1.15.8.8:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2005-4391
Cross-site scripting (XSS) vulnerability in damoon allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly the q parameter.
[ "cpe:2.3:a:mindroute_software:damoon:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-38307
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name.
[ "cpe:2.3:a:webmin:webmin:2.021:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
CVE-2003-1069
The Telnet daemon (in.telnetd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (CPU consumption by infinite loop).
[ "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-10613
ESAFENET CDG SystemEncryptPolicyService.java delSystemEncryptPolicy sql injection
A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. Affected by this vulnerability is the function delSystemEncryptPolicy of the file /com/esafenet/servlet/system/SystemEncryptPolicyService.java. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:esafenet:cdg:-:*:*:*:*:*:*:*", "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
CVE-2012-3570
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
[ "cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*" ]
null
null
null
5.7
null
cisco-sa-bw-sip-dos-mSySbrmt
Cisco BroadWorks SIP Denial of Service Vulnerability
A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition. This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover. For more information about this vulnerability, see the Details ["#details"] section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
7.5
null
null
null
CVE-2003-0935
Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.
[ "cpe:2.3:a:net-snmp:net-snmp:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.4_pre2:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:net-snmp:net-snmp:5.0.8:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
RHSA-2020:0779
Red Hat Security Advisory: chromium-browser security update
chromium-browser: Insufficient policy enforcement in media
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
null
CVE-2024-6898
SourceCodester Record Management System index.php sql injection
A vulnerability was found in SourceCodester Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file index.php. The manipulation of the argument UserName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271923.
[ "cpe:2.3:a:sourcecodester:record_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
CVE-2011-2669
Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
PYSEC-2014-30
null
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.
[]
null
null
null
null
null
CVE-1999-0358
Digital Unix 4.0 has a buffer overflow in the inc program of the mh package.
[ "cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*", "cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*", "cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*", "cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*", "cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-v27q-vcv7-5jfv
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
[]
null
5.4
null
null
null
CVE-2024-43834
xdp: fix invalid wait context of page_pool_destroy()
In the Linux kernel, the following vulnerability has been resolved: xdp: fix invalid wait context of page_pool_destroy() If the driver uses a page pool, it creates a page pool with page_pool_create(). The reference count of page pool is 1 as default. A page pool will be destroyed only when a reference count reaches 0. page_pool_destroy() is used to destroy page pool, it decreases a reference count. When a page pool is destroyed, ->disconnect() is called, which is mem_allocator_disconnect(). This function internally acquires mutex_lock(). If the driver uses XDP, it registers a memory model with xdp_rxq_info_reg_mem_model(). The xdp_rxq_info_reg_mem_model() internally increases a page pool reference count if a memory model is a page pool. Now the reference count is 2. To destroy a page pool, the driver should call both page_pool_destroy() and xdp_unreg_mem_model(). The xdp_unreg_mem_model() internally calls page_pool_destroy(). Only page_pool_destroy() decreases a reference count. If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we will face an invalid wait context warning. Because xdp_unreg_mem_model() calls page_pool_destroy() with rcu_read_lock(). The page_pool_destroy() internally acquires mutex_lock(). Splat looks like: ============================= [ BUG: Invalid wait context ] 6.10.0-rc6+ #4 Tainted: G W ----------------------------- ethtool/1806 is trying to lock: ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150 other info that might help us debug this: context-{5:5} 3 locks held by ethtool/1806: stack backtrace: CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021 Call Trace: <TASK> dump_stack_lvl+0x7e/0xc0 __lock_acquire+0x1681/0x4de0 ? _printk+0x64/0xe0 ? __pfx_mark_lock.part.0+0x10/0x10 ? __pfx___lock_acquire+0x10/0x10 lock_acquire+0x1b3/0x580 ? mem_allocator_disconnect+0x73/0x150 ? __wake_up_klogd.part.0+0x16/0xc0 ? __pfx_lock_acquire+0x10/0x10 ? dump_stack_lvl+0x91/0xc0 __mutex_lock+0x15c/0x1690 ? mem_allocator_disconnect+0x73/0x150 ? __pfx_prb_read_valid+0x10/0x10 ? mem_allocator_disconnect+0x73/0x150 ? __pfx_llist_add_batch+0x10/0x10 ? console_unlock+0x193/0x1b0 ? lockdep_hardirqs_on+0xbe/0x140 ? __pfx___mutex_lock+0x10/0x10 ? tick_nohz_tick_stopped+0x16/0x90 ? __irq_work_queue_local+0x1e5/0x330 ? irq_work_queue+0x39/0x50 ? __wake_up_klogd.part.0+0x79/0xc0 ? mem_allocator_disconnect+0x73/0x150 mem_allocator_disconnect+0x73/0x150 ? __pfx_mem_allocator_disconnect+0x10/0x10 ? mark_held_locks+0xa5/0xf0 ? rcu_is_watching+0x11/0xb0 page_pool_release+0x36e/0x6d0 page_pool_destroy+0xd7/0x440 xdp_unreg_mem_model+0x1a7/0x2a0 ? __pfx_xdp_unreg_mem_model+0x10/0x10 ? kfree+0x125/0x370 ? bnxt_free_ring.isra.0+0x2eb/0x500 ? bnxt_free_mem+0x5ac/0x2500 xdp_rxq_info_unreg+0x4a/0xd0 bnxt_free_mem+0x1356/0x2500 bnxt_close_nic+0xf0/0x3b0 ? __pfx_bnxt_close_nic+0x10/0x10 ? ethnl_parse_bit+0x2c6/0x6d0 ? __pfx___nla_validate_parse+0x10/0x10 ? __pfx_ethnl_parse_bit+0x10/0x10 bnxt_set_features+0x2a8/0x3e0 __netdev_update_features+0x4dc/0x1370 ? ethnl_parse_bitset+0x4ff/0x750 ? __pfx_ethnl_parse_bitset+0x10/0x10 ? __pfx___netdev_update_features+0x10/0x10 ? mark_held_locks+0xa5/0xf0 ? _raw_spin_unlock_irqrestore+0x42/0x70 ? __pm_runtime_resume+0x7d/0x110 ethnl_set_features+0x32d/0xa20 To fix this problem, it uses rhashtable_lookup_fast() instead of rhashtable_lookup() with rcu_read_lock(). Using xa without rcu_read_lock() here is safe. xa is freed by __xdp_mem_allocator_rcu_free() and this is called by call_rcu() of mem_xa_remove(). The mem_xa_remove() is called by page_pool_destroy() if a reference count reaches 0. The xa is already protected by the reference count mechanism well in the control plane. So removing rcu_read_lock() for page_pool_destroy() is safe.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-j8pr-f7j2-mgch
PHP remote file inclusion vulnerability in includes/functions_mod_user.php in phpBB Import Tools Mod 0.1.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
null
GHSA-529r-wppw-c5ch
Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system.
[]
null
4.9
null
null
null
CVE-2024-49115
Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
[]
null
8.1
null
null
null
RHSA-2024:1327
Red Hat Security Advisory: gimp:2.8 security update
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.8
null
null
null
GHSA-qx88-qw7m-mgq7
Out-of-bounds write in memory initialization in libsavsvc.so prior to SMR May-2025 Release 1 allows local attackers to write out-of-bounds memory.
[]
null
6.6
null
null
null
cisco-sa-20190925-identd-dos
Cisco IOS and IOS XE Software IP Ident Denial of Service Vulnerability
A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos"] This advisory is part of the September 25, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-72547"].
[]
null
null
8.6
null
null
GHSA-m9px-xr79-8fvc
Alldata V0.4.6 is vulnerable to Insecure Permissions. Using users (test) can query information about the users in the system.
[]
null
7.5
null
null
null
GHSA-m956-hjj3-695x
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
[]
null
6.1
null
null
null
GHSA-pwhp-27h2-crqj
All versions prior to Delta Electronic’s CNCSoft version 1.01.34 (running ScreenEditor versions 1.01.5 and prior) are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.
[]
null
7.8
null
null
null
CVE-2006-3323
PHP remote file inclusion vulnerability in admin/admin.php in MF Piadas 1.0 allows remote attackers to execute arbitrary PHP code via the page parameter. NOTE: the same vector can be used for cross-site scripting, but CVE analysis suggests that this is resultant from file inclusion of HTML or script.
[ "cpe:2.3:a:mastersfusion:mf_piadas:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-q2xv-553m-pcwq
The FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.29 via the foogallery_attachment_modal_save AJAX action due to missing validation on a user controlled key (img_id). This makes it possible for authenticated attackers, with granted access and above, to update arbitrary post and page content. This requires the Gallery Creator Role setting to be a value lower than 'Editor' for there to be any real impact.
[]
null
4.3
null
null
null
RHSA-2010:0839
Red Hat Security Advisory: kernel security and bug fix update
kernel: io_submit_one() NULL ptr deref kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel panic via futex kernel: thinkpad-acpi: lock down video output state access kernel: net/sched/act_police.c infoleak
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2005-4553
Buffer overflow in Golden FTP Server 1.92 allows remote attackers to execute arbitrary code via a long APPE command. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:kmint21_software:golden_ftp_server:1.92:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-11553
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24752.
[ "cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*", "cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*" ]
null
null
7.8
null
null
GHSA-g9qc-mh3w-mp47
An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability.
[]
null
null
7.8
null
null
CVE-2015-2973
Multiple cross-site scripting (XSS) vulnerabilities in the Welcart plugin before 1.4.18 for WordPress allow remote attackers to inject arbitrary web script or HTML via the usces_referer parameter to (1) classes/usceshop.class.php, (2) includes/edit-form-advanced.php, (3) includes/edit-form-advanced30.php, (4) includes/edit-form-advanced34.php, (5) includes/member_edit_form.php, (6) includes/order_edit_form.php, (7) includes/order_list.php, or (8) includes/usces_item_master_list.php, related to admin.php.
[ "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
null
CVE-2024-6586
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
[ "cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*" ]
null
7.3
null
null
null
GHSA-h4gh-vjrf-v43x
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not properly validate the data for file actions and port actions, which allows local users to (1) cause a denial of service (panic) via a size value that is inconsistent with a header count field, or (2) obtain sensitive information from kernel heap memory via a certain size value in conjunction with a crafted buffer.
[]
null
null
null
null
null
GHSA-cg92-qjvr-r7gp
A buffer overflow vulnerability in FTP service in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices.
[]
null
null
9.8
null
null
GHSA-px92-3m65-jqg8
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
[]
null
null
3.7
null
null
CVE-2017-15633
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-ipgroup variable in the session_limits.lua file.
[ "cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*" ]
null
null
7.2
9
null
CVE-2020-24750
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
[ "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
8.1
null
6.8
null
CVE-2013-2671
Multiple cross-site scripting (XSS) vulnerabilities in the Brother MFC-9970CDW printer with firmware L (1.10) allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) val parameter to admin/admin_main.html; (3) id, (4) val, or (5) arbitrary parameter name (QUERY_STRING) to admin/profile_settings_net.html; or (6) kind or (7) arbitrary parameter name (QUERY_STRING) to fax/general_setup.html, a different vulnerability than CVE-2013-2507 and CVE-2013-2670.
[ "cpe:2.3:o:brother:mfc-9970cdw_firmware:l\\(1.10\\):*:*:*:*:*:*:*", "cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-3mgp-fx93-9xv5
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
[]
null
null
6.1
null
null
GHSA-p5h8-cwcq-q5g2
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101.
[]
null
6.5
null
null
null
CVE-2015-9070
In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer over-read vulnerability exists in a TrustZone syscall.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2007-1605
w-Agora (Web-Agora) allows remote attackers to obtain sensitive information via a request to rss.php with an invalid (1) site or (2) bn parameter, (3) a certain value of the site[] parameter, or (4) an empty value of the bn[] parameter; a request to index.php with a certain value of the (5) site[] or (6) sort[] parameter; (7) a request to profile.php with an empty value of the site[] parameter; or a request to search.php with (8) an empty value of the bn[] parameter or a certain value of the (9) pattern[] or (10) search_date[] parameter, which reveal the path in various error messages, probably related to variable type inconsistencies. NOTE: the bn[] parameter to index.php is already covered by CVE-2007-0606.1.
[ "cpe:2.3:a:w-agora:w-agora:4.2.1:*:*:*:*:*:*:*" ]
null
null
null
5
null