id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2025:0324
|
Red Hat Security Advisory: rsync security update
|
rsync: Info Leak via Uninitialized Stack Contents
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.5 | null | null | null |
CVE-2021-33114
|
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.
|
[
"cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ac_1550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax1650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:ax1675_firmware:*:*:*:*:*:*:*:*"
] | null | 5.7 | null | 2.7 | null |
|
CVE-2022-36503
|
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateMacClone.
|
[
"cpe:2.3:o:h3c:magic_nx18_plus_firmware:nx18pv100r003:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:magic_nx18_plus:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-fj8g-7f3j-g879
|
An issue in Plug n Play Camera com.starvedia.mCamView.zwave 5.5.1 allows a remote attacker to obtain sensitive information via the firmware update process
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-32510
|
WordPress Order Your Posts Manually Plugin <= 2.2.5 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <= 2.2.5 versions.
|
[
"cpe:2.3:a:cagewebdev:order_your_posts_manually:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2019-11372
|
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
|
[
"cpe:2.3:a:mediaarea:mediainfo:18.12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-mf98-r2gf-2x3w
|
OpenStack Keystone Improper Authentication vulnerability
|
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
|
[] | null | null | null | null | null |
GHSA-4p4w-5jf3-q849
|
The cinemaproject/monorepo repository through 2021-03-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[] | null | 9.3 | null | null | null |
|
CVE-2022-2780
|
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
|
[
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
CVE-2020-17070
|
Windows Update Medic Service Elevation of Privilege Vulnerability
|
Windows Update Medic Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-9c7p-6wrp-cw32
|
A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition.
|
[] | null | null | null | null | null |
|
GHSA-gv98-9r75-xrjg
|
VMware Workstation 6.0.x before 6.0.3 and 5.5.x before 5.5.6, VMware Player 2.0.x before 2.0.3 and 1.0.x before 1.0.6, VMware ACE 2.0.x before 2.0.1 and 1.0.x before 1.0.5, and VMware Server 1.0.x before 1.0.5 on Windows allow local users to gain privileges via an unspecified manipulation that causes the authd process to connect to an arbitrary named pipe, a different vulnerability than CVE-2008-1362.
|
[] | null | null | null | null | null |
|
CVE-2020-8493
|
A stored XSS vulnerability in Kronos Web Time and Attendance (webTA) affects 3.8.x and later 3.x versions before 4.0 via multiple input fields (Login Message, Banner Message, and Password Instructions) of the com.threeis.webta.H261configMenu servlet via an authenticated administrator.
|
[
"cpe:2.3:a:kronos:web_time_and_attendance:*:*:*:*:*:*:*:*"
] | null | null | 6.9 | null | null |
|
CVE-2017-16058
|
gruntcli was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
|
[
"cpe:2.3:a:gruntcli_project:gruntcli:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2021-26929
|
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
|
[
"cpe:2.3:a:horde:groupware:*:*:*:*:webmail:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
RHSA-2022:4671
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
argocd: Symlink following allows leaking out-of-bound manifests and JSON files from Argo CD repo-server argocd: Login screen allows message spoofing if SSO is enabled argocd: ArgoCD will blindly trust JWT claims if anonymous access is enabled
|
[
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 10 | null | null | null |
GHSA-qmw9-5q6h-hjxj
|
The System Dashboard WordPress plugin before 2.8.10 does not sanitize and escape some parameters, which could allow administrators in multisite WordPress configurations to perform Cross-Site Scripting attacks
|
[] | null | 5.4 | null | null | null |
|
GHSA-3mfq-6299-p3w3
|
A flaw was found in the Linux kernels implementation of MIDI (kernel 5.7-rc6), where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation.
|
[] | null | 7.8 | null | null | null |
|
CVE-2015-6245
|
epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4qqx-hf2g-m26g
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18653.
|
[] | null | 5.5 | null | null | null |
|
GHSA-h79h-2326-9h3v
|
The ReadMetaFromId3v2 function in taglib.cpp in the TagLib plugin in VideoLAN VLC media player 0.9.0 through 1.1.2 does not properly process ID3v2 tags, which allows remote attackers to cause a denial of service (application crash) via a crafted media file.
|
[] | null | null | null | null | null |
|
GHSA-8h36-898g-vfff
|
IBM RELM 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126242.
|
[] | null | null | 5.4 | null | null |
|
CVE-2024-35670
|
WordPress Integrate Google Drive plugin <= 1.3.93 - Broken Access Control vulnerability
|
Broken Authentication vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.93.
|
[
"cpe:2.3:a:softlabbd:integrate_google_drive:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
CVE-2023-21808
|
.NET and Visual Studio Remote Code Execution Vulnerability
|
.NET and Visual Studio Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visual_studio_2022:17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1511:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2021-2248
|
Vulnerability in the Oracle Secure Global Desktop product of Oracle Virtualization (component: Server). The supported version that is affected is 5.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop. While the vulnerability is in Oracle Secure Global Desktop, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Secure Global Desktop.
|
[
"cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
|
CVE-2019-12414
|
In Apache Incubator Superset before 0.32, a user can view database names that he has no access to on a dropdown list in SQLLab
|
[
"cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
RHSA-2023:6802
|
Red Hat Security Advisory: xorg-x11-server security update
|
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null | null |
CVE-2017-11307
|
Adobe Acrobat and Reader versions 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, 11.0.22 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-9519
|
UserPlus <= 2.0 - Authenticated (Editor+) Registration Form Update to Privilege Escalation
|
The UserPlus plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'save_metabox_form' function in versions up to, and including, 2.0. This makes it possible for authenticated attackers, with editor-level permissions or above, to update the registration form role to administrator, which leads to privilege escalation.
|
[
"cpe:2.3:a:userplus:user_registration_and_user_profile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpuserplus:userplus:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
CVE-2022-36681
|
Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_account.
|
[
"cpe:2.3:a:simple_task_scheduling_system_project:simple_task_scheduling_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2025-7527
|
Tenda FH1202 AdvSetWan fromAdvSetWan stack-based overflow
|
A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2023-32524
|
Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32523.
|
[
"cpe:2.3:a:trendmicro:mobile_security:9.8:sp5:*:*:enterprise:windows:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2012-3018
|
The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.
|
[
"cpe:2.3:a:iconics:genesis32:*:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:8.05:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:*:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:8.05:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*"
] | null | null | null | 4.4 | null |
|
GHSA-gvmv-rhmr-mw99
|
A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account. An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-11386
|
An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources.
|
[
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-9frr-8rxx-97f3
|
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vw8g-gwgr-767g
|
A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information.
|
[] | null | 7.5 | null | null | null |
|
GHSA-g4m4-xx42-vc78
|
A vulnerability was found in WuKongOpenSource Wukong_nocode up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file ExpressionUtil.java of the component AviatorScript Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271051.
|
[] | 5.3 | 6.3 | null | null | null |
|
RHSA-2024:1864
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 for OpenShift image enhancement and security update
|
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null | null |
CVE-2024-39463
|
9p: add missing locking around taking dentry fid list
|
In the Linux kernel, the following vulnerability has been resolved:
9p: add missing locking around taking dentry fid list
Fix a use-after-free on dentry's d_fsdata fid list when a thread
looks up a fid through dentry while another thread unlinks it:
UAF thread:
refcount_t: addition on 0; use-after-free.
p9_fid_get linux/./include/net/9p/client.h:262
v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129
v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181
v9fs_fid_lookup+0xbf/0xc20 linux/fs/9p/fid.c:314
v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400
vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248
Freed by:
p9_fid_destroy (inlined)
p9_client_clunk+0xb0/0xe0 linux/net/9p/client.c:1456
p9_fid_put linux/./include/net/9p/client.h:278
v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55
v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518
vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335
The problem is that d_fsdata was not accessed under d_lock, because
d_release() normally is only called once the dentry is otherwise no
longer accessible but since we also call it explicitly in v9fs_remove
that lock is required:
move the hlist out of the dentry under lock then unref its fids once
they are no longer accessible.
|
[
"cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
PYSEC-2023-240
| null |
Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .
Apache Submarine uses JAXRS to define REST endpoints. In order to
handle YAML requests (using application/yaml content-type), it defines
a YamlEntityProvider entity provider that will process all incoming
YAML requests. In order to unmarshal the request, the readFrom method
is invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`.
We have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`.
This issue affects Apache Submarine: from 0.7.0 before 0.8.0. Users are recommended to upgrade to version 0.8.0, which fixes this issue.
If using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.
|
[] | null | null | null | null | null |
RHSA-2023:7770
|
Red Hat Security Advisory: rh-postgresql12-postgresql security update
|
postgresql: Memory disclosure in aggregate function calls postgresql: Buffer overrun from integer overflow in array modification postgresql: Role pg_signal_backend can signal certain superuser processes. postgresql: extension script @substitutions@ within quoting allow SQL injection
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.5 | null | null | null |
CVE-2010-3919
|
Fenrir Grani 4.5 and earlier does not prevent interaction between web script and the clipboard, which allows remote attackers to read or modify the clipboard contents via a crafted web site.
|
[
"cpe:2.3:a:fenrir:grani:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fenrir:grani:4.4:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-vhm5-4pmc-4r29
|
An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-9295
|
In com.android.apps.tag, there is a possible bypass of user interaction requirements due to a missing permission check. This could lead to a to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-36885811
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-g3f9-cx7h-5hwr
|
Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
|
[] | null | 7.8 | null | null | null |
|
GHSA-7892-38hq-f82j
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/manage-comments.php by adding a question mark (?) followed by the payload.
|
[] | null | 4.8 | null | null | null |
|
GHSA-w9mm-wmr9-fjjp
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 6.6 | null | null |
|
CVE-2010-1902
|
Buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via unspecified properties in the data in a crafted RTF document, aka "Word RTF Parsing Buffer Overflow Vulnerability."
|
[
"cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2015-4408
|
Buffer overflow on Hikvision NVR DS-76xxNI-E1/2 and DS-77xxxNI-E4 devices before 3.4.0 allows remote authenticated users to cause a denial of service (service interruption) via a crafted HTTP request, aka the ISAPI issue.
|
[
"cpe:2.3:o:hikvision:ds-76xxx_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7604ni-e1\\/4p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-12\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7608ni-e1\\/8p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-12\\/16p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7616ni-e2\\/16p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hikvision:ds-77xxx_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7716ni-14\\/16p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:ds-7716ni-sp\\/16:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 | null |
|
GHSA-mr7q-8xm4-vgvg
|
A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74
|
[] | null | null | null | null | null |
|
GHSA-8xx8-72q4-m3hg
|
An exploitable privilege escalation vulnerability exists in the helper service CleanMyMac X, version 4.20, due to improper updating. The application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit.
|
[] | null | null | 5.5 | null | null |
|
GHSA-rhm7-43jx-x3wq
|
SQL injection vulnerability in Deadlock User Management System (phpdeadlock) 0.64 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-1189
|
IBM WebSphere Portal and Web Content Manager 6.1, 7.0, and 8.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 123558.
|
[
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:cf001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf004:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf005:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf006:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf007:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf008:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf009:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf010:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf011:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf012:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf013:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf014:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf015:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf016:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf017:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf018:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf019:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf020:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf021:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf022:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf23:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf24:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf25:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf26:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf27:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf03:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf04:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf05:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf04:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf05:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf06:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf07:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf08:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf09:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf12:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2023-24957
|
IBM Business Automation Workflow cross-site scripting
|
IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246115.
|
[
"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.0:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.1:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:18.0.0.2:*:*:*:-:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:traditional:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:-:*:*:containers:*:*:*",
"cpe:2.3:a:ibm:business_automation_workflow:22.0.2:if001:*:*:containers:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-pr6w-g472-rf39
|
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
|
[] | null | 4.3 | null | null | null |
|
GHSA-f9v3-rvrm-52r5
|
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a heap-based overflow vulnerability, where certain input can corrupt the heap and crash the forked process.
|
[] | null | 8.8 | null | null | null |
|
GHSA-48cr-x7pp-992r
|
Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election allows Stored XSS.This issue affects Board Election: from n/a through 1.0.1.
|
[] | null | 7.1 | null | null | null |
|
CVE-2010-1679
|
Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.
|
[
"cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.9.19:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.9:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.11:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.12:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.13:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.14:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.15:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.16:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.17:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.18:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.19:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.20:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.21:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.22:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.23:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.24:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.13.25:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.9:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.11:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.12:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.13:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.14:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.15:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.17:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.18:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.19:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.21:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.22:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.23:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.24:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.25:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.26:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.27:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.28:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.14.29:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:dpkg:1.15.8.8:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2005-4391
|
Cross-site scripting (XSS) vulnerability in damoon allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly the q parameter.
|
[
"cpe:2.3:a:mindroute_software:damoon:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-38307
|
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name.
|
[
"cpe:2.3:a:webmin:webmin:2.021:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2003-1069
|
The Telnet daemon (in.telnetd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (CPU consumption by infinite loop).
|
[
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-10613
|
ESAFENET CDG SystemEncryptPolicyService.java delSystemEncryptPolicy sql injection
|
A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. Affected by this vulnerability is the function delSystemEncryptPolicy of the file /com/esafenet/servlet/system/SystemEncryptPolicyService.java. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:esafenet:cdg:-:*:*:*:*:*:*:*",
"cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
CVE-2012-3570
|
Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
|
[
"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.3:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.3:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.4:*:*:*:*:*:*:*"
] | null | null | null | 5.7 | null |
|
cisco-sa-bw-sip-dos-mSySbrmt
|
Cisco BroadWorks SIP Denial of Service Vulnerability
|
A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.
This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.
For more information about this vulnerability, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 7.5 | null | null | null |
CVE-2003-0935
|
Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.
|
[
"cpe:2.3:a:net-snmp:net-snmp:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.4_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:net-snmp:net-snmp:5.0.8:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
RHSA-2020:0779
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Insufficient policy enforcement in media
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null | null |
CVE-2024-6898
|
SourceCodester Record Management System index.php sql injection
|
A vulnerability was found in SourceCodester Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file index.php. The manipulation of the argument UserName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271923.
|
[
"cpe:2.3:a:sourcecodester:record_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2011-2669
|
Mozilla Firefox prior to 3.6 has a DoS vulnerability due to an issue in the validation of certificates.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
PYSEC-2014-30
| null |
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.
|
[] | null | null | null | null | null |
CVE-1999-0358
|
Digital Unix 4.0 has a buffer overflow in the inc program of the mh package.
|
[
"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-v27q-vcv7-5jfv
|
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
|
[] | null | 5.4 | null | null | null |
|
CVE-2024-43834
|
xdp: fix invalid wait context of page_pool_destroy()
|
In the Linux kernel, the following vulnerability has been resolved:
xdp: fix invalid wait context of page_pool_destroy()
If the driver uses a page pool, it creates a page pool with
page_pool_create().
The reference count of page pool is 1 as default.
A page pool will be destroyed only when a reference count reaches 0.
page_pool_destroy() is used to destroy page pool, it decreases a
reference count.
When a page pool is destroyed, ->disconnect() is called, which is
mem_allocator_disconnect().
This function internally acquires mutex_lock().
If the driver uses XDP, it registers a memory model with
xdp_rxq_info_reg_mem_model().
The xdp_rxq_info_reg_mem_model() internally increases a page pool
reference count if a memory model is a page pool.
Now the reference count is 2.
To destroy a page pool, the driver should call both page_pool_destroy()
and xdp_unreg_mem_model().
The xdp_unreg_mem_model() internally calls page_pool_destroy().
Only page_pool_destroy() decreases a reference count.
If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we
will face an invalid wait context warning.
Because xdp_unreg_mem_model() calls page_pool_destroy() with
rcu_read_lock().
The page_pool_destroy() internally acquires mutex_lock().
Splat looks like:
=============================
[ BUG: Invalid wait context ]
6.10.0-rc6+ #4 Tainted: G W
-----------------------------
ethtool/1806 is trying to lock:
ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150
other info that might help us debug this:
context-{5:5}
3 locks held by ethtool/1806:
stack backtrace:
CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed
Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
Call Trace:
<TASK>
dump_stack_lvl+0x7e/0xc0
__lock_acquire+0x1681/0x4de0
? _printk+0x64/0xe0
? __pfx_mark_lock.part.0+0x10/0x10
? __pfx___lock_acquire+0x10/0x10
lock_acquire+0x1b3/0x580
? mem_allocator_disconnect+0x73/0x150
? __wake_up_klogd.part.0+0x16/0xc0
? __pfx_lock_acquire+0x10/0x10
? dump_stack_lvl+0x91/0xc0
__mutex_lock+0x15c/0x1690
? mem_allocator_disconnect+0x73/0x150
? __pfx_prb_read_valid+0x10/0x10
? mem_allocator_disconnect+0x73/0x150
? __pfx_llist_add_batch+0x10/0x10
? console_unlock+0x193/0x1b0
? lockdep_hardirqs_on+0xbe/0x140
? __pfx___mutex_lock+0x10/0x10
? tick_nohz_tick_stopped+0x16/0x90
? __irq_work_queue_local+0x1e5/0x330
? irq_work_queue+0x39/0x50
? __wake_up_klogd.part.0+0x79/0xc0
? mem_allocator_disconnect+0x73/0x150
mem_allocator_disconnect+0x73/0x150
? __pfx_mem_allocator_disconnect+0x10/0x10
? mark_held_locks+0xa5/0xf0
? rcu_is_watching+0x11/0xb0
page_pool_release+0x36e/0x6d0
page_pool_destroy+0xd7/0x440
xdp_unreg_mem_model+0x1a7/0x2a0
? __pfx_xdp_unreg_mem_model+0x10/0x10
? kfree+0x125/0x370
? bnxt_free_ring.isra.0+0x2eb/0x500
? bnxt_free_mem+0x5ac/0x2500
xdp_rxq_info_unreg+0x4a/0xd0
bnxt_free_mem+0x1356/0x2500
bnxt_close_nic+0xf0/0x3b0
? __pfx_bnxt_close_nic+0x10/0x10
? ethnl_parse_bit+0x2c6/0x6d0
? __pfx___nla_validate_parse+0x10/0x10
? __pfx_ethnl_parse_bit+0x10/0x10
bnxt_set_features+0x2a8/0x3e0
__netdev_update_features+0x4dc/0x1370
? ethnl_parse_bitset+0x4ff/0x750
? __pfx_ethnl_parse_bitset+0x10/0x10
? __pfx___netdev_update_features+0x10/0x10
? mark_held_locks+0xa5/0xf0
? _raw_spin_unlock_irqrestore+0x42/0x70
? __pm_runtime_resume+0x7d/0x110
ethnl_set_features+0x32d/0xa20
To fix this problem, it uses rhashtable_lookup_fast() instead of
rhashtable_lookup() with rcu_read_lock().
Using xa without rcu_read_lock() here is safe.
xa is freed by __xdp_mem_allocator_rcu_free() and this is called by
call_rcu() of mem_xa_remove().
The mem_xa_remove() is called by page_pool_destroy() if a reference
count reaches 0.
The xa is already protected by the reference count mechanism well in the
control plane.
So removing rcu_read_lock() for page_pool_destroy() is safe.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-j8pr-f7j2-mgch
|
PHP remote file inclusion vulnerability in includes/functions_mod_user.php in phpBB Import Tools Mod 0.1.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
|
[] | null | null | null | null | null |
|
GHSA-529r-wppw-c5ch
|
Dell vApp Manager, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability to read arbitrary files from the target system.
|
[] | null | 4.9 | null | null | null |
|
CVE-2024-49115
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
|
[] | null | 8.1 | null | null | null |
RHSA-2024:1327
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: PSD buffer overflow RCE gimp: psp off-by-one RCE
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.8 | null | null | null |
GHSA-qx88-qw7m-mgq7
|
Out-of-bounds write in memory initialization in libsavsvc.so prior to SMR May-2025 Release 1 allows local attackers to write out-of-bounds memory.
|
[] | null | 6.6 | null | null | null |
|
cisco-sa-20190925-identd-dos
|
Cisco IOS and IOS XE Software IP Ident Denial of Service Vulnerability
|
A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.
The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-identd-dos"]
This advisory is part of the September 25, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-72547"].
|
[] | null | null | 8.6 | null | null |
GHSA-m9px-xr79-8fvc
|
Alldata V0.4.6 is vulnerable to Insecure Permissions. Using users (test) can query information about the users in the system.
|
[] | null | 7.5 | null | null | null |
|
GHSA-m956-hjj3-695x
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
|
[] | null | 6.1 | null | null | null |
|
GHSA-pwhp-27h2-crqj
|
All versions prior to Delta Electronic’s CNCSoft version 1.01.34 (running ScreenEditor versions 1.01.5 and prior) are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.
|
[] | null | 7.8 | null | null | null |
|
CVE-2006-3323
|
PHP remote file inclusion vulnerability in admin/admin.php in MF Piadas 1.0 allows remote attackers to execute arbitrary PHP code via the page parameter. NOTE: the same vector can be used for cross-site scripting, but CVE analysis suggests that this is resultant from file inclusion of HTML or script.
|
[
"cpe:2.3:a:mastersfusion:mf_piadas:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-q2xv-553m-pcwq
|
The FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.29 via the foogallery_attachment_modal_save AJAX action due to missing validation on a user controlled key (img_id). This makes it possible for authenticated attackers, with granted access and above, to update arbitrary post and page content. This requires the Gallery Creator Role setting to be a value lower than 'Editor' for there to be any real impact.
|
[] | null | 4.3 | null | null | null |
|
RHSA-2010:0839
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: io_submit_one() NULL ptr deref kernel: do_io_submit() infoleak kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak kernel panic via futex kernel: thinkpad-acpi: lock down video output state access kernel: net/sched/act_police.c infoleak
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2005-4553
|
Buffer overflow in Golden FTP Server 1.92 allows remote attackers to execute arbitrary code via a long APPE command. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:kmint21_software:golden_ftp_server:1.92:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-11553
|
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability
|
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24752.
|
[
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
] | null | null | 7.8 | null | null |
GHSA-g9qc-mh3w-mp47
|
An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability.
|
[] | null | null | 7.8 | null | null |
|
CVE-2015-2973
|
Multiple cross-site scripting (XSS) vulnerabilities in the Welcart plugin before 1.4.18 for WordPress allow remote attackers to inject arbitrary web script or HTML via the usces_referer parameter to (1) classes/usceshop.class.php, (2) includes/edit-form-advanced.php, (3) includes/edit-form-advanced30.php, (4) includes/edit-form-advanced34.php, (5) includes/member_edit_form.php, (6) includes/order_edit_form.php, (7) includes/order_list.php, or (8) includes/usces_item_master_list.php, related to admin.php.
|
[
"cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-6586
|
Lightdash version 0.1024.6 allows users with the necessary permissions, such as Administrator or Editor, to create and share dashboards. A dashboard that contains HTML elements which point to a threat actor controlled source can trigger an SSRF request when exported, via a POST request to /api/v1/dashboards//export. The forged request contains the value of the exporting user’s session token. A threat actor could obtain the session token of any user who exports the dashboard. The obtained session token can be used to perform actions as the victim on the application, resulting in session takeover.
|
[
"cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
GHSA-h4gh-vjrf-v43x
|
The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not properly validate the data for file actions and port actions, which allows local users to (1) cause a denial of service (panic) via a size value that is inconsistent with a header count field, or (2) obtain sensitive information from kernel heap memory via a certain size value in conjunction with a crafted buffer.
|
[] | null | null | null | null | null |
|
GHSA-cg92-qjvr-r7gp
|
A buffer overflow vulnerability in FTP service in QNAP QTS version 4.2.6 build 20171026, 4.3.3.0378 build 20171117, 4.3.4.0387 (Beta 2) build 20171116 and earlier could allow remote attackers to execute arbitrary code on NAS devices.
|
[] | null | null | 9.8 | null | null |
|
GHSA-px92-3m65-jqg8
|
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
|
[] | null | null | 3.7 | null | null |
|
CVE-2017-15633
|
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-ipgroup variable in the session_limits.lua file.
|
[
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 | null |
|
CVE-2020-24750
|
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
|
[
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_liquidity_management:14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_liquidity_management:14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_liquidity_management:14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_supply_chain_finance:14.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_supply_chain_finance:14.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_supply_chain_finance:14.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_calendar_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_contacts_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:identity_manager_connector:11.1.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_core_-_server_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 8.1 | null | 6.8 | null |
|
CVE-2013-2671
|
Multiple cross-site scripting (XSS) vulnerabilities in the Brother MFC-9970CDW printer with firmware L (1.10) allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) val parameter to admin/admin_main.html; (3) id, (4) val, or (5) arbitrary parameter name (QUERY_STRING) to admin/profile_settings_net.html; or (6) kind or (7) arbitrary parameter name (QUERY_STRING) to fax/general_setup.html, a different vulnerability than CVE-2013-2507 and CVE-2013-2670.
|
[
"cpe:2.3:o:brother:mfc-9970cdw_firmware:l\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:h:brother:mfc-9970cdw:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3mgp-fx93-9xv5
|
XSS vulnerability that affects bootstrap
|
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
|
[] | null | null | 6.1 | null | null |
GHSA-p5h8-cwcq-q5g2
|
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101.
|
[] | null | 6.5 | null | null | null |
|
CVE-2015-9070
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer over-read vulnerability exists in a TrustZone syscall.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2007-1605
|
w-Agora (Web-Agora) allows remote attackers to obtain sensitive information via a request to rss.php with an invalid (1) site or (2) bn parameter, (3) a certain value of the site[] parameter, or (4) an empty value of the bn[] parameter; a request to index.php with a certain value of the (5) site[] or (6) sort[] parameter; (7) a request to profile.php with an empty value of the site[] parameter; or a request to search.php with (8) an empty value of the bn[] parameter or a certain value of the (9) pattern[] or (10) search_date[] parameter, which reveal the path in various error messages, probably related to variable type inconsistencies. NOTE: the bn[] parameter to index.php is already covered by CVE-2007-0606.1.
|
[
"cpe:2.3:a:w-agora:w-agora:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.