id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-66rc-vg9f-48m7
jsonschema2pojo has Improper Restriction of Operations within the Bounds of a Memory Buffer
A vulnerability, which was classified as problematic, has been found in joelittlejohn jsonschema2pojo 1.2.2. This issue affects the function apply of the file org/jsonschema2pojo/rules/SchemaRule.java of the component JSON File Handler. The manipulation leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
4.8
5.3
null
null
null
CVE-2021-45420
Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced
[ "cpe:2.3:o:emerson:dixell_xweb-500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:emerson:dixell_xweb-500:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-vcp8-pwx3-jhj4
Vulnerability in the Oracle Financial Services Liquidity Risk Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Liquidity Risk Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Liquidity Risk Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Liquidity Risk Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Liquidity Risk Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
null
null
6.1
null
null
GHSA-73vg-g5cv-33g7
Cross-site scripting (XSS) vulnerability in Adobe ColdFusion before 9.0.1 CHF1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header in an id=- query to a .cfm file.
[]
null
null
null
null
null
CVE-2022-35655
Pega Platform from 7.3 to 8.7.3 is affected by an XSS issue due to a misconfiguration of a datapage setting.
[ "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
null
GHSA-3mr5-fmfr-f954
PHPJabbers Night Club Booking Software has stored XSS in the name parameter in the reservations tab.
[]
null
null
6.1
null
null
CVE-2017-14571
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to an "Illegal Instruction Violation starting at Unknown Symbol @ 0x00000000049c024c called from STDUXPSFile!DllUnregisterServer+0x0000000000025706."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
CVE-2021-41326
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.
[ "cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2016-10182
An issue was discovered on the D-Link DWR-932B router. qmiweb allows command injection with ` characters.
[ "cpe:2.3:o:dlink:dwr-932b_firmware:02.02eu:revb:*:*:*:*:*:*", "cpe:2.3:h:dlink:dwr-932b:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-wrw9-m778-g6mc
Memory Exposure in bl
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure.`bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memoryRecommendationUpdate to version 0.9.5, 1.0.1 or later.
[]
null
null
null
null
null
CVE-2017-3530
Vulnerability in the Oracle Transportation Manager component of Oracle Supply Chain Products Suite (subcomponent: Security). Supported versions that are affected are 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, 6.3.6, 6.3.7, 6.4.0, 6.4.1 and 6.4.2. Easily "exploitable" vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Manager. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Transportation Manager accessible data as well as unauthorized access to critical data or complete access to all Oracle Transportation Manager accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:transportation_management:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.4.2:*:*:*:*:*:*:*" ]
null
null
6.1
7.9
null
CVE-2020-4046
Authenticated XSS through embed block in WordPress
In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-cj36-rwcw-fx5g
Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.4.
[]
null
6.3
null
null
null
GHSA-hq9x-p5wc-jxf8
Missing Authorization vulnerability in AyeCode Ltd UsersWP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UsersWP: from n/a through 1.2.15.
[]
null
5.3
null
null
null
CVE-2019-1003038
An insufficiently protected credentials vulnerability exists in Jenkins Repository Connector Plugin 1.2.4 and earlier in src/main/java/org/jvnet/hudson/plugins/repositoryconnector/ArtifactDeployer.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/Repository.java, src/main/java/org/jvnet/hudson/plugins/repositoryconnector/UserPwd.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the password stored in the plugin configuration.
[ "cpe:2.3:a:jenkins:repository_connector:*:*:*:*:*:jenkins:*:*" ]
null
7.8
null
2.1
null
CVE-2025-48172
CHMLib through 2bef8d0, as used in SumatraPDF and other products, has a chm_lib.c _chm_decompress_block integer overflow. There is a resultant heap-based buffer overflow in _chm_fetch_bytes.
[]
null
5.6
null
null
null
CVE-2025-8786
Portabilis i-Diario Registro das atividades registros-de-conteudos-por-areas-de-conhecimento cross site scripting
A vulnerability, which was classified as problematic, was found in Portabilis i-Diario up to 1.5.0. Affected is an unknown function of the file /registros-de-conteudos-por-areas-de-conhecimento/ of the component Registro das atividades. The manipulation of the argument Registro de atividades/Conteúdos leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
3.5
3.5
4
null
RHSA-2019:1942
Red Hat Security Advisory: perl security update
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
[ "cpe:/o:redhat:rhel_eus:7.4::computenode", "cpe:/o:redhat:rhel_eus:7.4::server" ]
null
null
8.1
null
null
GHSA-377g-g6h5-4cxj
Multiple SQL injection vulnerabilities in Zero CMS 1.0 Alpha allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to index.php, or the (2) f or t parameters to forums/index.php.
[]
null
null
null
null
null
GHSA-vqf7-7684-3mjq
Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
[]
null
5.3
null
null
null
GHSA-rf94-8rcp-7wj8
Heap-based buffer overflow in CoreMedia in Apple Mac OS X before 10.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.
[]
null
null
null
null
null
CVE-2019-8087
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
[ "cpe:2.3:a:adobe:experience_manager:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:6.5:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-m857-mpg8-9p23
Instant Update CMS contains a Password Reset Vulnerability vulnerability in /iu-application/controllers/administration/auth.php that can result in Account Tackover. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in v0.3.3.
[]
null
null
9.8
null
null
CVE-2024-28868
Umbraco possible user enumeration vulnerability
Umbraco is an ASP.NET content management system. Umbraco 10 prior to 10.8.4 with access to the native login screen is vulnerable to a possible user enumeration attack. This issue was fixed in version 10.8.5. As a workaround, one may disable the native login screen by exclusively using external logins.
[]
null
3.7
null
null
null
GHSA-ffhw-7rh2-4x5w
The duducosmos/livro_python repository through 2018-06-06 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[]
null
9.3
null
null
null
CVE-2024-43582
Remote Desktop Protocol Server Remote Code Execution Vulnerability
Remote Desktop Protocol Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
GHSA-w988-3j4h-5xj8
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2019-20496
cPanel before 82.0.18 allows attackers to conduct arbitrary chown operations as root during log processing (SEC-532).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
GHSA-fxvj-wr6f-vvf9
K-Meleon 1.5.3 allows context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker.
[]
null
null
null
null
null
GHSA-m9vf-24g9-vj7g
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
[]
null
4.9
null
null
null
GHSA-3fg2-9c6w-hcpg
An arbitrary file upload vulnerability in the upload plugin of Textpattern v4.8.8 and below allows attackers to execute arbitrary code by uploading a crafted PHP file.
[]
null
7.2
null
null
null
CVE-2021-42301
Azure RTOS Information Disclosure Vulnerability
Azure RTOS Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:azure_rtos:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_real_time_operating_system:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2014-7979
Cross-site scripting (XSS) vulnerability in the SimpleCorp theme 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via vectors related to theme settings.
[ "cpe:2.3:a:drupal:simplecorp:7.x-1.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-5wxw-76gh-49vw
IBM Kenexa LMS on Cloud is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
[]
null
null
6.3
null
null
CVE-2017-14763
In the Install Themes page in GeniXCMS 1.1.4, remote authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a theme.
[ "cpe:2.3:a:genixcms:genixcms:1.1.4:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
GHSA-m82f-r4r7-5qph
Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Tasks). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
null
CVE-2024-48859
QTS, QuTS hero
An improper authentication vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to compromise the security of the system. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later
[ "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*" ]
5.3
null
null
null
null
CVE-2014-5526
The Inmobi library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:inmobi:inmobi:-:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-wwhj-c2w3-qhfx
The kernel in Apple Mac OS X before 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
[]
null
null
null
null
null
GHSA-cpj9-49ph-mjf6
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
[]
null
null
6.5
null
null
GHSA-p43g-84w6-pq26
Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
5.3
null
null
null
GHSA-q8wc-j5m9-27w3
Denial of Service issue in quinn-proto
ImpactReceiving unknown QUIC frames in a QUIC packet could result in a panic.PatchesThe problem has been fixed in 0.9.5 and 0.10.5 maintenance releases.ReferencesFixed in https://github.com/quinn-rs/quinn/pull/1667, backported in https://github.com/quinn-rs/quinn/pull/1668 and https://github.com/quinn-rs/quinn/pull/1669.
[]
null
7.5
null
null
null
CVE-2023-32248
Tree connection null pointer dereference denial-of-service vulnerability
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9" ]
null
7.5
null
null
null
GHSA-63qf-g6r6-6xj3
In ObjectPlanet Opinio before 7.6.4, there is XSS.
[]
null
null
6.1
null
null
CVE-2025-47003
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
CVE-2006-6856
Direct static code injection vulnerability in WebText CMS 0.4.5.2 and earlier allows remote attackers to inject arbitrary PHP code into a script in wt/users/ via the im parameter during a profile edit (edycja) operation, which is then executed via a direct request for this script.
[ "cpe:2.3:a:webtext:webtext:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qmx9-ff2x-f55h
SQL injection vulnerability in index.php in SourceWell 1.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the cnt parameter. NOTE: various reports indicate that the affected version is 1.1.3, but as of 2005-11-29, the most recent version appears to be 1.1.2.
[]
null
null
null
null
null
GHSA-h3jg-w72m-c86w
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2019-0068
Junos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets
The SRX flowd process, responsible for packet forwarding, may crash and restart when processing specific multicast packets. By continuously sending the specific multicast packets, an attacker can repeatedly crash the flowd process causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D180; 17.3 versions; 17.4 versions prior to 17.4R2-S5, 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R2-S4, 18.2R3; 18.3 versions prior to 18.3R2-S1, 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S1, 19.1R2.
[ "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.3x48:d85:*:*:*:*:*:*", "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2024-24426
Reachable assertions in the NGAP_FIND_PROTOCOLIE_BY_ID function of OpenAirInterface Magma v1.8.0 and OAI EPC Federation v1.2.0 allow attackers to cause a Denial of Service (DoS) via a crafted NGAP packet.
[ "cpe:2.3:a:openairinterface:magma:*:*:*:*:*:*:*:*", "cpe:2.3:a:oai_epc_federation:oai_epc_federation:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2017-10082
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Security). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Agile PLM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Agile PLM accessible data as well as unauthorized read access to a subset of Oracle Agile PLM accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:agile_product_lifecycle_management_framework:9.3.6:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
null
CVE-2014-3960
Multiple cross-site scripting (XSS) vulnerabilities in OpenNMS before 1.12.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:opennms:opennms:*:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.90:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.91:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.92:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.9.93:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.8:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.9:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.11:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.12:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.13:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.10.14:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.90:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.91:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.92:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.93:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.11.94:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:opennms:opennms:1.12.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2025-32620
WordPress Doppler Forms plugin <= 2.4.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in fromdoppler Doppler Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Doppler Forms: from n/a through 2.4.5.
[]
null
7.1
null
null
null
CVE-2012-5087
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
[ "cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-m76g-5q68-xv2c
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
[]
null
null
5.5
null
null
CVE-2023-20180
A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions.
[ "cpe:2.3:a:cisco:webex_meetings:39.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:39.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:40.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:42.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:webex_meetings:43.5.0:*:*:*:*:*:*:*" ]
null
4.3
null
null
null
GHSA-7rcj-vmjp-fwmv
In the Linux kernel, the following vulnerability has been resolved:tracing/histograms: Fix memory leak problemThis reverts commit 46bbe5c671e06f070428b9be142cc4ee5cedebac.As commit 46bbe5c671e0 ("tracing: fix double free") said, the "double free" problem reported by clang static analyzer is:In parse_var_defs() if there is a problem allocating var_defs.expr, the earlier var_defs.name is freed. This free is duplicated by free_var_defs() which frees the rest of the list.However, if there is a problem allocating N-th var_defs.expr:in parse_var_defs(), the freed 'earlier var_defs.name' is actually the N-th var_defs.name;then in free_var_defs(), the names from 0th to (N-1)-th are freed;var_defs: | name | expr | name | expr | ... | name | expr | name | /// +-------------+-------------+-----+-------------+-----------These two frees don't act on same name, so there was no "double free" problem before. Conversely, after that commit, we get a "memory leak" problem because the above "N-th var_defs.name" is not freed.If enable CONFIG_DEBUG_KMEMLEAK and inject a fault at where the N-th var_defs.expr allocated, then execute on shell like: $ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' > \ /sys/kernel/debug/tracing/events/kmem/kmalloc/triggerThen kmemleak reports: unreferenced object 0xffff8fb100ef3518 (size 8): comm "bash", pid 196, jiffies 4295681690 (age 28.538s) hex dump (first 8 bytes): 76 31 00 00 b1 8f ff ff v1...... backtrace: [<0000000038fe4895>] kstrdup+0x2d/0x60 [<00000000c99c049a>] event_hist_trigger_parse+0x206f/0x20e0 [<00000000ae70d2cc>] trigger_process_regex+0xc0/0x110 [<0000000066737a4c>] event_trigger_write+0x75/0xd0 [<000000007341e40c>] vfs_write+0xbb/0x2a0 [<0000000087fde4c2>] ksys_write+0x59/0xd0 [<00000000581e9cdf>] do_syscall_64+0x3a/0x80 [<00000000cf3b065c>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
[]
null
5.5
null
null
null
CVE-2021-47047
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
In the Linux kernel, the following vulnerability has been resolved: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails The spi controller supports 44-bit address space on AXI in DMA mode, so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping. In addition, if dma_map_single fails, it should return immediately instead of continuing doing the DMA operation which bases on invalid address. This fixes the following crash which occurs in reading a big block from flash: [ 123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots) [ 123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped [ 123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0 [ 123.792536] Mem abort info: [ 123.795313] ESR = 0x96000145 [ 123.798351] EC = 0x25: DABT (current EL), IL = 32 bits [ 123.803655] SET = 0, FnV = 0 [ 123.806693] EA = 0, S1PTW = 0 [ 123.809818] Data abort info: [ 123.812683] ISV = 0, ISS = 0x00000145 [ 123.816503] CM = 1, WnR = 1 [ 123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000 [ 123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000 [ 123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2012-0120
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492.
[ "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*" ]
null
null
null
4
null
RHSA-2011:0858
Red Hat Security Advisory: xerces-j2 security update
JDK: XML parsing Denial-Of-Service (6845701)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2023-6857
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2025-22655
WordPress CWD - Stealth Links plugin <= 1.3 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Caio Web Dev CWD – Stealth Links allows SQL Injection. This issue affects CWD – Stealth Links: from n/a through 1.3.
[]
null
9.3
null
null
null
GHSA-vj6w-cj6v-8ff8
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
[]
null
null
null
null
null
GHSA-72r3-9fpx-mq44
A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.
[]
null
5.4
null
null
null
RHSA-2024:2290
Red Hat Security Advisory: mutt security update
mutt: null pointer dereference mutt: null pointer dereference
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.7
null
null
null
GHSA-8668-cx5w-mxjv
SQL injection vulnerability in the Trips (mchtrips) extension 2.0.0 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-32265
qDecoder before 12.1.0 does not ensure that the percent character is followed by two hex digits for URL decoding.
[ "cpe:2.3:a:qdecoder_project:qdecoder:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-5ww8-4ghx-pvcr
Sourcecodester Pharmacy/Medical Store Point of Sale System 1.0 is vulnerable SQL Injection via login.php. This vulnerability stems from inadequate validation of user inputs for the email and password parameters, allowing attackers to inject malicious SQL queries.
[]
null
9.8
null
null
null
CVE-2016-7119
Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN) before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted onclick attribute in an IMG element.
[ "cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-j7vh-h8wc-j6f5
SQL injection vulnerability in mailarticle.php in Clever Copy 3.0 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter.
[]
null
null
null
null
null
CVE-2022-32271
In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.
[ "cpe:2.3:a:realnetworks:realplayer:20.0.8.310:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
null
GHSA-mmm5-f82c-58j8
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations.
[]
null
9.8
null
null
null
GHSA-qcrp-fp63-2c3q
A vulnerable file in Opto 22 PAC Project Professional versions prior to R9.4006, PAC Project Basic versions prior to R9.4006, PAC Display Basic versions prior to R9.4f, PAC Display Professional versions prior to R9.4f, OptoOPCServer versions prior to R9.4c, and OptoDataLink version R9.4d and prior versions that were installed by PAC Project installer, versions prior to R9.4006, is susceptible to a heap-based buffer overflow condition that may allow remote code execution on the target system. Opto 22 suggests upgrading to the new product version as soon as possible.
[]
null
null
null
null
null
CVE-2018-2011
IBM API Connect 2018.1 through 2018.4.1.5 could allow an attacker to obtain sensitive information from a specially crafted HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 155150.
[ "cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
GHSA-j6ph-fhmg-qfhg
Missing Authorization vulnerability in Mage people team Booking and Rental Manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booking and Rental Manager: from n/a through 2.3.8.
[]
null
6.5
null
null
null
CVE-2016-5978
Cross-site scripting (XSS) vulnerability in the Web UI in the web portal in IBM Tealeaf Customer Experience before 8.7.1.8847 FP10, 8.8 before 8.8.0.9049 FP9, 9.0.0 and 9.0.1 before 9.0.1.1117 FP5, 9.0.1A before 9.0.1.5108_9.0.1A FP5, 9.0.2 before 9.0.2.1223 FP3, and 9.0.2A before 9.0.2.5224_9.0.2A FP3 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string, a different vulnerability than CVE-2016-5975.
[ "cpe:2.3:a:ibm:tealeaf_customer_experience:8.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:8.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.0a:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tealeaf_customer_experience:9.0.2a:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-chrj-qx57-jxqj
An issue was discovered in PassMark BurnInTest through 9.1, OSForensics through 7.1, and PerformanceTest through 10. The driver's IOCTL request handler attempts to copy the input buffer onto the stack without checking its size and can cause a buffer overflow. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys.
[]
null
null
null
null
null
CVE-2024-8502
Remote Code Execution via Deserialization in modelscope/agentscope
A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, where serialized input is deserialized using dill.loads, enabling an attacker to execute arbitrary commands on the server.
[]
null
null
9.8
null
null
GHSA-hv2g-w7p8-jf6j
A vulnerability was found in SourceCodesters Clinics Patient Management System 2.0. It has been rated as critical. This issue affects some unknown processing of the file /print_diseases.php. The manipulation of the argument disease/from/to leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-3j36-mj45-fgp4
Use after free in Dawn in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
[]
null
8.8
null
null
null
GHSA-q4g5-6262-6h9p
The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting plugin for WordPress is vulnerable to union-based SQL Injection via the 'email' parameter in all versions up to, and including, 1.12.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
8.8
null
null
null
CVE-2012-0159
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Silverlight 4 before 4.1.10329; and Silverlight 5 before 5.1.10411 allow remote attackers to execute arbitrary code via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability."
[ "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:consumer_preview:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.50401.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.50524.00:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.50826.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.50917.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.51204.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.60129.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.60310.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.60531.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.0.60831.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:4.1.10111.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:5.0.60401.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:5.0.60818.0:rc:*:*:*:*:*:*", "cpe:2.3:a:microsoft:silverlight:5.0.61118.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-9g6q-6598-fgvx
l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions.
[]
null
null
null
null
null
GHSA-c4f6-pc3f-7jhf
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/comment/list.
[]
null
7.2
null
null
null
CVE-2024-7749
SourceCodester Accounts Manager App add-account.php cross site scripting
A vulnerability, which was classified as problematic, was found in SourceCodester Accounts Manager App 1.0. Affected is an unknown function of the file /endpoint/add-account.php. The manipulation of the argument account_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:accounts_manager_app:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:remyandrade:accounts_manager_app:1.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
CVE-2007-3152
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
[ "cpe:2.3:a:daniel_stenberg:c-ares:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:daniel_stenberg:c-ares:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-26055
XWiki Commons may allow privilege escalation to programming rights via user's first name
XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
[ "cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:commons:3.1:milestone1:*:*:*:*:*:*", "cpe:2.3:a:xwiki:commons:3.1:milestone2:*:*:*:*:*:*", "cpe:2.3:a:xwiki:commons:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:commons:14.4:rc1:*:*:*:*:*:*" ]
null
10
null
null
null
GHSA-r934-m2c7-26gh
A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
[]
null
8.1
null
null
null
GHSA-g879-wx6g-vppq
An elevation of privilege vulnerability in the MediaTek hardware sensor driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-32372051. References: M-ALPS02973195.
[]
null
null
7
null
null
GHSA-39cj-3mcf-vq77
An elevation of privilege vulnerability exists in Windows when LDAP request buffer lengths are improperly calculated. In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a Domain Controller, aka "LDAP Elevation of Privilege Vulnerability."
[]
null
null
8.1
null
null
GHSA-5c2q-w2g2-qrxp
PHP Scripts Mall Charity Foundation Script 1 through 3 allows directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
[]
null
null
7.5
null
null
GHSA-78p6-gw7m-4w9j
Directory traversal vulnerability in the HP-ChaiSOE/1.0 web server on the HP LaserJet P3015 printer with firmware before 07.080.3, LaserJet 4650 printer with firmware 07.006.0, and LaserJet 2430 printer with firmware 08.113.0_I35128 allows remote attackers to read arbitrary files via unspecified vectors, a different vulnerability than CVE-2008-4419.
[]
null
null
null
null
null
GHSA-5x5q-cqf6-gj8r
Serilog Client IP Spoofing vulnerability
Serilog (before v2.1.0) contains a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses in log files by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.It is not possible to configure Serilog.Enrichers.ClientInfo to not trust the X-Forwarded-For header.
[]
6.9
6.5
null
null
null
CVE-2021-34913
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14831.
[ "cpe:2.3:a:bentley:bentley_view:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2016-8747
An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.
[ "cpe:2.3:a:apache:tomcat:8.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*" ]
null
7.5
7.5
5
null
GHSA-wg5j-5hmx-g6c3
A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) on pcwin.dll which could cause remote code to be executed when parsing a GD1 file
[]
null
null
7.8
null
null
GHSA-cc5w-cgc4-9qf7
Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
[]
null
null
null
null
null
CVE-2024-32890
Stored Cross-site Scripting in results JSON API in librespeed/speedtest
librespeed/speedtest is an open source, self-hosted speed test for HTML5. In affected versions missing neutralization of the ISP information in a speedtest result leads to stored Cross-site scripting in the JSON API. The `processedString` field in the `ispinfo` parameter is missing neutralization. It is stored when a user submits a speedtest result to the telemetry API (`results/telemetry.php`) and returned in the JSON API (`results/json.php`). This vulnerability has been introduced in commit 3937b94. This vulnerability affects LibreSpeed speedtest instances running version 5.2.5 or higher which have telemetry enabled and has been addressed in version 5.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:librespeed:speedtest:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-588f-cqrr-8h8w
SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php. NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.
[]
null
null
null
null
null
CVE-2024-38714
WordPress WP Fast Total Search <= 1.68.232 - Broken Access Control vulnerability
Missing Authorization vulnerability in Epsiloncool WP Fast Total Search allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Fast Total Search: from n/a through 1.68.232.
[]
null
4.3
null
null
null