id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-35mj-mc7c-rc4m
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14270.
|
[] | null | null | null | null | null |
|
CVE-2007-3352
|
Cross-site scripting (XSS) vulnerability in the preview form in Stephen Ostermiller Contact Form before 2.00.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that contain an apostrophe.
|
[
"cpe:2.3:a:stephen_ostermiller:contact_form:2.00.02:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2022:8889
|
Red Hat Security Advisory: Openshift Logging 5.3.14 bug fix release and security update
|
jackson-databind: denial of service via a large depth of nested objects jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays
|
[
"cpe:/a:redhat:logging:5.3::el8"
] | null | 7.5 | null | null | null |
CVE-2009-4343
|
Cross-site scripting (XSS) vulnerability in the Training Company Database (trainincdb) extension 0.4.7 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:dominic_eckart:trainincdb:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-1618
|
vTiger CRM index.php cross site scripting
|
A vulnerability has been found in vTiger CRM 6.4.0/6.5.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument _operation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.
|
[] | 5.3 | 4.3 | 4.3 | 5 | null |
RHSA-2021:2584
|
Red Hat Security Advisory: ruby:2.7 security, bug fix, and enhancement update
|
ruby: Potential HTTP request smuggling in WEBrick ruby: XML round-trip vulnerability in REXML
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
RHSA-2024:8727
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.8 | null | null | null |
GHSA-qwmr-cmwr-523q
|
The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.
|
[] | null | null | null | null | null |
|
CVE-2019-20141
|
An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
|
[
"cpe:2.3:a:laborator:neon:2.0:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2018-15925
|
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-qh5q-fw44-7cp6
|
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to impact a minor integrity feature. Exploitation of this issue does require user interaction.
|
[] | null | 4.3 | null | null | null |
|
CVE-2019-7278
|
Optergy Proton/Enterprise devices have an Unauthenticated SMS Sending Service.
|
[
"cpe:2.3:a:optergy:enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:optergy:proton:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.4 | null |
|
CVE-2024-24901
|
Dell PowerScale OneFS 8.2.x through 9.6.0.x contain an insufficient logging vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, causing audit messages lost and not recorded for a specific time period.
|
[
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:powerscale_onefs:9.6.1:*:*:*:*:*:*:*"
] | null | 3 | null | null | null |
|
CVE-2021-23973
|
When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-542p-6q49-2qfr
|
wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
|
[] | null | null | null | null | null |
|
CVE-2023-33281
|
The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers.
|
[
"cpe:2.3:o:nissan:sylphy_classic_2021_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nissan:sylphy_classic_2021:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-9953-8mhm-vpr8
|
The PureStorage-OpenConnect/swagger repository through 1.1.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
|
[] | null | 9.3 | null | null | null |
|
CVE-2018-8385
|
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8389, CVE-2018-8390.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
GHSA-9jxx-4x48-3ff9
|
Multiple SQL injection vulnerabilities in PHPYun 1.1.6 allow remote attackers to execute arbitrary SQL commands via the (1) provinceid parameter to search.php and the (2) e parameter to resumeview.php.
|
[] | null | null | null | null | null |
|
CVE-2014-9684
|
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881.
|
[
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.2:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
CVE-2009-0843
|
The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists.
|
[
"cpe:2.3:a:osgeo:mapserver:4.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:4.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osgeo:mapserver:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:umn:mapserver:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:umn:mapserver:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:umn:mapserver:4.0:beta2:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-6fjf-2cgp-836f
|
A Cross-Site Request Forgery (CSRF) in /member/post.php?job=postnew&step=post of Qibosoft v7 allows attackers to force victim users into arbitrarily publishing new articles via a crafted URL.
|
[] | null | null | null | null | null |
|
CVE-2025-23958
|
WordPress Editor Wysiwyg Background Color plugin <= 1.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in FADI MED Editor Wysiwyg Background Color allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Editor Wysiwyg Background Color: from n/a through 1.0.
|
[] | null | 6.5 | null | null | null |
CVE-2017-2849
|
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary shell characters during NTP server configuration resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.
|
[
"cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-qxw4-5w76-j3pr
|
An SQL injection vulnerability exists in the AssetActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
CVE-2025-27867
|
Apache Felix HTTP Webconsole Plugin: XSS in HTTP Webconsole Plugin
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin.
This issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0.
Users are recommended to upgrade to version 1.2.2, which fixes the issue.
|
[] | null | 5.6 | null | null | null |
CVE-2024-12372
|
Rockwell Automation PowerMonitor™ 1000 Denial of Service
|
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
|
[] | 9.3 | null | null | null | null |
CVE-2020-0568
|
Race condition in the Intel(R) Driver and Support Assistant before version 20.1.5 may allow an authenticated user to potentially enable denial of service via local access.
|
[
"cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | 1.9 | null |
|
GHSA-jqpf-rmrm-4gj4
|
The VNC application stores its passwords encrypted within the registry but uses DES for encryption. As DES is broken, the original passwords can be recovered.
|
[] | null | 4.4 | null | null | null |
|
GHSA-xqfj-6ppw-2qw5
|
A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco Discovery Protocol process to reload on an affected device.
This vulnerability is due to a heap buffer overflow in certain Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
|
[] | null | 4.3 | null | null | null |
|
GHSA-jqrp-vr9m-25fh
|
An information leak in VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 allows attackers to obtain the channel access token and send crafted messages.
|
[] | null | 7.5 | null | null | null |
|
CVE-2002-2262
|
Unspecified vulnerability in xntpd of HP-UX 10.20 through 11.11 allows remote attackers to cause a denial of service (hang) via unknown attack vectors.
|
[
"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.03:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11i:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-32qv-66w9-3gjf
|
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
|
[] | null | null | null | null | null |
|
CVE-2009-1859
|
Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via unspecified vectors that trigger memory corruption.
|
[
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2021-21267
|
Regular Expression Denial-of-Service in npm schema-inspector
|
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS.
|
[
"cpe:2.3:a:schema-inspector_project:schema-inspector:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-11325
|
AWeber Forms by Optin Cat <= 2.5.7 - Reflected Cross-Site Scripting
|
The AWeber Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 5.2 | null | null | null |
GHSA-qfgj-vxwq-r49v
|
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-23810
|
Template injection (Improper Neutralization of Special Elements Used in a Template Engine) vulnerability in a-blog cms Ver.2.8.x series versions prior to Ver.2.8.75, Ver.2.9.x series versions prior to Ver.2.9.40, Ver.2.10.x series versions prior to Ver.2.10.44, Ver.2.11.x series versions prior to Ver.2.11.42, and Ver.3.0.x series versions prior to Ver.3.0.1 allows a remote authenticated attacker to obtain an arbitrary file on the server via unspecified vectors.
|
[
"cpe:2.3:a:appleple:a-blog_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:appleple:a-blog_cms:3.0.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
PYSEC-2024-259
| null |
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.
|
[] | null | 9.8 | null | null | null |
CVE-2015-2135
|
Unspecified vulnerability in HP Intelligent Provisioning 1.00 through 1.62(a), 2.00, and 2.10 allows remote attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:hp:intelligent_provisioning:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_provisioning:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_provisioning:2.10:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-f9gh-m5x7-5826
|
IBM Insights Foundation for Energy 2.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 125719.
|
[] | null | null | 8.8 | null | null |
|
CVE-2013-4447
|
Cross-site scripting (XSS) vulnerability in the API in the Simplenews module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via an email address.
|
[
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta1:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta2:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta3:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta4:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:beta5:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc1:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc2:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc3:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc4:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc5:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.0:rc6:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.1:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.2:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.3:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.4:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:6.x-1.x:dev:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:-:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:alpha1:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:alpha2:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:beta1:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:beta2:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.0:rc1:*:*:*:drupal:*:*",
"cpe:2.3:a:md-systems:simplenews:7.x-1.x:dev:*:*:*:drupal:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2012-2559
|
WellinTech KingHistorian 3.0 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer write) via a crafted packet to TCP port 5678.
|
[
"cpe:2.3:a:wellintech:kinghistorian:3.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2024-21334
|
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
|
Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2007-0117
|
DiskManagementTool in the DiskManagement.framework 92.29 on Mac OS X 10.4.8 does not properly validate Bill of Materials (BOM) files, which allows attackers to gain privileges via a BOM file under /Library/Receipts/, which triggers arbitrary file permission changes upon execution of a diskutil permission repair operation.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2008:0175
|
Red Hat Security Advisory: openoffice.org security update
|
openoffice.org: Quattro Pro files handling heap overflows in Attribute and Font records openoffice.org: EMF files parsing EMR_BITBLT record heap overflows openoffice.org: Quattro Pro files parsing integer underflow openoffice.org: OLE files parsing heap overflows
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client"
] | null | null | null | null | null |
GHSA-f5vv-hcgf-xvxq
|
Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).
|
[] | null | 8.8 | null | null | null |
|
GHSA-76xq-r882-9hgq
|
The Poll Maker WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the mcount parameter found in the ~/admin/partials/settings/poll-maker-settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.2.8.
|
[] | null | null | null | null | null |
|
CVE-2025-45988
|
Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.
|
[] | null | 9.8 | null | null | null |
|
GHSA-7xxg-7678-587v
|
The JPXStream::readTilePartData function in JPXStream.cc in xpdf 4.00 allows attackers to launch denial of service (heap-based buffer over-read and application crash) via a specific pdf file, as demonstrated by pdftohtml.
|
[] | null | null | 5.5 | null | null |
|
GHSA-p29h-x3w2-549g
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.
|
[] | null | 4.7 | null | null | null |
|
RHSA-2016:0014
|
Red Hat Security Advisory: libldb security update
|
libldb: Remote DoS in Samba (AD) LDAP server libldb: remote memory read in the Samba LDAP server
|
[
"cpe:/a:redhat:storage:3.1:samba:el7",
"cpe:/a:redhat:storage:3.1:server:el6"
] | null | null | null | null | null |
CVE-2017-15784
|
XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to an "Illegal Instruction Violation starting at xnview+0x0000000000370074."
|
[
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
GHSA-3285-56f3-892c
|
The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.32 via the database_backup_ajax_download() function. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
|
[] | null | 4.9 | null | null | null |
|
CVE-2020-15849
|
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework's bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).
|
[
"cpe:2.3:a:re-desk:re\\:desk:2.3:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 | null |
|
CVE-2022-26992
|
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
|
[
"cpe:2.3:o:arris:sbr-ac1900p_firmware:1.0.7-b05:*:*:*:*:*:*:*",
"cpe:2.3:h:arris:sbr-ac1900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arris:sbr-ac3200p_firmware:1.0.7-b05:*:*:*:*:*:*:*",
"cpe:2.3:h:arris:sbr-ac3200p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arris:sbr-ac1200p_firmware:1.0.5-b05:*:*:*:*:*:*:*",
"cpe:2.3:h:arris:sbr-ac1200p:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-whg7-cqjh-3q4x
|
Multiple "command injection" vulnerabilities in Phorum 3.4 through 3.4.2 allow remote attackers to execute arbitrary commands and modify the Phorum configuration files via the (1) UserAdmin program, (2) Edit user profile, or (3) stats program.
|
[] | null | null | null | null | null |
|
CVE-2021-33478
|
The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.
|
[
"cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 | null |
|
RHSA-2020:0811
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.7 security update
|
thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use netty: HTTP request smuggling netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.2"
] | null | 7.5 | 7.4 | null | null |
GHSA-4c3c-8gp8-85c5
|
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[] | null | null | 8.2 | null | null |
|
GHSA-gpxg-3cwf-59mg
|
Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service.
|
[] | null | 7.2 | null | null | null |
|
CVE-2024-0972
|
BuddyPress Members Only <= 3.3.5 - Improper Access Control to Sensitive Information Exposure via REST API
|
The BuddyPress Members Only plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.5 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's "All Other Sections On Your Site Will be Opened to Guest" feature (when unset) and view restricted page and post content.
|
[
"cpe:2.3:a:zhuyi:buddypress_members_only:*:*:*:*:*:*:*:*",
"cpe:2.3:a:membersonly:buddypress_members_only:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
CVE-2021-3056
|
PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authentication
|
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.0.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-p529-89xc-g5vh
|
Unspecified vulnerability in the Oracle Agile PLM component in Oracle Supply Chain Products Suite 9.3.4 and 9.3.5 allows remote attackers to affect confidentiality via vectors related to SDK, a different vulnerability than CVE-2016-3526 and CVE-2016-3529.
|
[] | null | null | 5.3 | null | null |
|
GHSA-vfxx-4xcx-mgvh
|
In the Linux kernel, the following vulnerability has been resolved:netfs: Fix the (non-)cancellation of copy when cache is temporarily disabledWhen the caching for a cookie is temporarily disabled (e.g. due to a DIO
write on that file), future copying to the cache for that file is disabled
until all fds open on that file are closed. However, if netfslib is using
the deprecated PG_private_2 method (such as is currently used by ceph), and
decides it wants to copy to the cache, netfs_advance_write() will just bail
at the first check seeing that the cache stream is unavailable, and
indicate that it dealt with all the content.This means that we have no subrequests to provide notifications to drive
the state machine or even to pin the request and the request just gets
discarded, leaving the folios with PG_private_2 set.Fix this by jumping directly to cancel the request if the cache is not
available. That way, we don't remove mark3 from the folio_queue list and
netfs_pgpriv2_cancel() will clean up the folios.This was found by running the generic/013 xfstest against ceph with an
active cache and the "-o fsc" option passed to ceph. That would usually
hang
|
[] | null | null | null | null | null |
|
CVE-2024-22075
|
Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.
|
[
"cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-hx7f-9jfv-xvrf
|
The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie.
|
[] | null | null | null | null | null |
|
GHSA-c3j9-w7pw-hrww
|
The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE units, which allows local users to cause a denial of service (panic) via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-vjxq-fxvh-23vc
|
An issue was discovered in GitLab Community and Enterprise Edition 8.15 through 12.4. It has Insecure Permissions (issue 1 of 2).
|
[] | null | null | null | null | null |
|
GHSA-cjm2-6jxj-2465
|
In the Linux kernel, the following vulnerability has been resolved:thermal: intel: int340x: processor: Fix warning during module unloadThe processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach. Thus there is no need to call pci_disable_device() again on it.With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.[ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
[ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
...
[ 224.010844] Call Trace:
[ 224.010845] <TASK>
[ 224.010847] ? show_regs+0x6d/0x80
[ 224.010851] ? __warn+0x8c/0x140
[ 224.010854] ? pci_disable_device+0xe5/0x100
[ 224.010856] ? report_bug+0x1c9/0x1e0
[ 224.010859] ? handle_bug+0x46/0x80
[ 224.010862] ? exc_invalid_op+0x1d/0x80
[ 224.010863] ? asm_exc_invalid_op+0x1f/0x30
[ 224.010867] ? pci_disable_device+0xe5/0x100
[ 224.010869] ? pci_disable_device+0xe5/0x100
[ 224.010871] ? kfree+0x21a/0x2b0
[ 224.010873] pcim_disable_device+0x20/0x30
[ 224.010875] devm_action_release+0x16/0x20
[ 224.010878] release_nodes+0x47/0xc0
[ 224.010880] devres_release_all+0x9f/0xe0
[ 224.010883] device_unbind_cleanup+0x12/0x80
[ 224.010885] device_release_driver_internal+0x1ca/0x210
[ 224.010887] driver_detach+0x4e/0xa0
[ 224.010889] bus_remove_driver+0x6f/0xf0
[ 224.010890] driver_unregister+0x35/0x60
[ 224.010892] pci_unregister_driver+0x44/0x90
[ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
...
[ 224.010921] ---[ end trace 0000000000000000 ]---Remove the excess pci_disable_device() calls.[ rjw: Subject and changelog edits ]
|
[] | null | 5.5 | null | null | null |
|
GHSA-3cw8-r66w-2976
|
Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts.
|
[] | null | 7.8 | null | null | null |
|
GHSA-9v5v-qfv2-66qp
|
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. Processing web content may lead to arbitrary code execution.
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-27257
|
IBM OpenPages information disclosure
|
IBM OpenPages 8.3 and 9.0 potentially exposes information about client-side source code through use of JavaScript source maps to unauthorized users.
|
[
"cpe:2.3:a:ibm:openpages_with_watson:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_with_watson:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-8662-q8m2-gwg3
|
Stack-based buffer overflow in Unitronics VisiLogic OPLC IDE before 9.8.30 allows remote attackers to execute arbitrary code via a crafted filename field in a ZIP archive in a vlp file.
|
[] | null | null | 9.8 | null | null |
|
GHSA-h327-5h5x-675h
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.
|
[] | null | 2.4 | null | null | null |
|
GHSA-qm5f-3c7g-gj8r
|
The School Management System – SakolaWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the 'save_exam_setting' and 'delete_exam_setting' actions. This makes it possible for unauthenticated attackers to update exam settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
ICSA-22-235-07
|
Hitachi Energy RTU500
|
This vulnerability exists in the HCI Modbus TCP function in affected product versions. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. There is a lack of flood control, which if exploited, could cause an internal stack overflow in the HCI Modbus TCP function.CVE-2022-2081 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
GHSA-q658-rvwc-wq3g
|
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which the software reads from a buffer by using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer, which may lead to code execution, denial of service, escalation of privileges, or information disclosure. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3).
|
[] | null | null | null | null | null |
|
CVE-2024-51582
|
WordPress WP Hotel Booking plugin <= 2.1.4 - Local File Inclusion vulnerability
|
Path Traversal: '.../...//' vulnerability in ThimPress WP Hotel Booking allows PHP Local File Inclusion.This issue affects WP Hotel Booking: from n/a through 2.1.4.
|
[
"cpe:2.3:a:thimpress:wp_hotel_booking:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
GHSA-h6g2-hv3m-2mvr
|
A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information.
|
[] | 8.8 | 8.2 | null | null | null |
|
PYSEC-2023-260
| null |
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the Content-Type header in POST requests. An attacker can inject malicious JavaScript code into the Content-Type header, which is then improperly reflected back to the user without adequate sanitization or escaping, leading to arbitrary JavaScript execution in the context of the victim's browser. The vulnerability is present in the mlflow/server/auth/__init__.py file, where the user-supplied Content-Type header is directly injected into a Python formatted string and returned to the user, facilitating the XSS attack.
|
[] | null | 6.1 | null | null | null |
CVE-2024-29969
|
TLS/SSL weak message authentication code ciphers are added by default for port 18082
|
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
|
[
"cpe:2.3:a:brocade:sannav:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2025-31221
|
An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 11.5, macOS Sonoma 14.7.6, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, macOS Ventura 13.7.6. A remote attacker may be able to leak memory.
|
[] | null | 7.5 | null | null | null |
|
GHSA-gm9v-2778-r2wp
|
A vulnerability classified as critical has been found in SourceCodester Student Result Management System 1.0. This affects an unknown part of the file /admin/core/new_user of the component Register Interface. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 5.3 | null | null | null |
|
CVE-2024-8076
|
TOTOLINK AC1200 T8 setDiagnosisCfg buffer overflow
|
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:h:totolink:ac1200_t8:4.1.5cu.862_b20230228:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:t8_firmware:4.1.5cu.862_b20230228:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
RHSA-2023:0441
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: i915: Incorrect GPU TLB flush can lead to random memory access
|
[
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7 | null | null | null |
CVE-2021-27703
|
Sercomm Model Etisalat Model S3- AC2100 is affected by Cross Site Scripting (XSS) via the firmware update page.
|
[] | null | 5.4 | null | null | null |
|
GHSA-4g35-r4h2-vfq3
|
CA (formerly Computer Associates) eTrust ITM (Threat Manager) 8.1 stores sensitive user information in log files with predictable names, which allows remote attackers to obtain this information via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2024-37358
|
Apache James: denial of service through the use of IMAP literals
|
Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations
Version 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals.
|
[] | null | 8.6 | null | null | null |
CVE-2022-35831
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2022:4667
|
Red Hat Security Advisory: OpenShift Virtualization 4.10.1 RPMs security and bug fix update
|
prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:container_native_virtualization:4.10::el7",
"cpe:/a:redhat:container_native_virtualization:4.10::el8"
] | null | 7.5 | null | null | null |
CVE-2000-0106
|
The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
|
[
"cpe:2.3:a:easycart:easycart:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-ftd-dos-JnnJm4wB
|
Cisco Firepower Threat Defense Software Denial of Service Vulnerability
|
A vulnerability in the connection handling function in Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper traffic handling when platform limits are reached. An attacker could exploit this vulnerability by sending a high rate of UDP traffic through an affected device. A successful exploit could allow the attacker to cause all new, incoming connections to be dropped, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74836"].
|
[] | null | 8.6 | null | null | null |
CVE-2023-5345
|
Use-after-free in Linux kernel's fs/smb/client component
|
A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.
In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.
We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-xjgj-h9x9-m8vv
|
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
|
[] | null | 4.7 | null | null | null |
|
GHSA-969p-8qf6-mrvc
|
Improper Authorization vulnerability in Link Sharing prior to version 12.4.00.3 allows attackers to open protected activity via PreconditionActivity.
|
[] | null | 5.3 | null | null | null |
|
CVE-2021-42314
|
Microsoft Defender for IoT Remote Code Execution Vulnerability
|
Microsoft Defender for IoT Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:defender_for_iot:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:defender_for_iot:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-x7h5-4q34-2r6v
|
Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling.
|
[] | null | null | null | null | null |
|
CVE-2025-38346
|
ftrace: Fix UAF when lookup kallsym after ftrace disabled
|
In the Linux kernel, the following vulnerability has been resolved:
ftrace: Fix UAF when lookup kallsym after ftrace disabled
The following issue happens with a buggy module:
BUG: unable to handle page fault for address: ffffffffc05d0218
PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0
Oops: Oops: 0000 [#1] SMP KASAN PTI
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
RIP: 0010:sized_strscpy+0x81/0x2f0
RSP: 0018:ffff88812d76fa08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000
RDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d
RBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68
R10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038
R13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff
FS: 00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
ftrace_mod_get_kallsym+0x1ac/0x590
update_iter_mod+0x239/0x5b0
s_next+0x5b/0xa0
seq_read_iter+0x8c9/0x1070
seq_read+0x249/0x3b0
proc_reg_read+0x1b0/0x280
vfs_read+0x17f/0x920
ksys_read+0xf3/0x1c0
do_syscall_64+0x5f/0x2e0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The above issue may happen as follows:
(1) Add kprobe tracepoint;
(2) insmod test.ko;
(3) Module triggers ftrace disabled;
(4) rmmod test.ko;
(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;
ftrace_mod_get_kallsym()
...
strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);
...
The problem is when a module triggers an issue with ftrace and
sets ftrace_disable. The ftrace_disable is set when an anomaly is
discovered and to prevent any more damage, ftrace stops all text
modification. The issue that happened was that the ftrace_disable stops
more than just the text modification.
When a module is loaded, its init functions can also be traced. Because
kallsyms deletes the init functions after a module has loaded, ftrace
saves them when the module is loaded and function tracing is enabled. This
allows the output of the function trace to show the init function names
instead of just their raw memory addresses.
When a module is removed, ftrace_release_mod() is called, and if
ftrace_disable is set, it just returns without doing anything more. The
problem here is that it leaves the mod_list still around and if kallsyms
is called, it will call into this code and access the module memory that
has already been freed as it will return:
strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);
Where the "mod" no longer exists and triggers a UAF bug.
|
[] | null | null | null | null | null |
GHSA-6w62-442x-wvg8
|
Buffer overflow in several Database Consistency Checkers (DBCCs) for Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE) 2000 allows members of the db_owner and db_ddladmin roles to execute arbitrary code.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.