id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-7f2w-w6q2-vgj3
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
[]
null
6.5
null
null
null
CVE-2017-9481
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to obtain unintended access to the Network Processor (NP) 169.254/16 IP network by adding a routing-table entry that specifies the LAN IP address as the router for that network.
[ "cpe:2.3:o:cisco:dpc3939_firmware:dpc3939-p20-18-v303r20421746-170221a-cmcst:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:dpc3939:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2021-0522
In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2017-12924
CDirVector::GetTable in dirfunc.hxx in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted fpx image.
[ "cpe:2.3:a:libfpx_project:libfpx:1.3.1:p6:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2016-7798
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
[ "cpe:2.3:a:ruby-lang:openssl:*:*:*:*:*:ruby:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-xq77-398p-x2hj
The “The Plus Addons for Elementor Page Builder Lite� WordPress Plugin before 2.0.6 has four widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
[]
null
null
null
null
null
RHBA-2024:6202
Red Hat Bug Fix Advisory: linux-firmware bug fix update
hw: amd: SMM Lock Bypass
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
null
RHSA-2024:2776
Red Hat Security Advisory: OpenShift Container Platform 4.15.13 packages and security update
jose-go: improper handling of highly compressed data
[ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9" ]
null
4.3
null
null
null
GHSA-4mjh-9fxc-hm78
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Reflected XSS. This issue affects Data Dash: from n/a through 1.2.3.
[]
null
7.1
null
null
null
GHSA-3wx2-wvxf-xw45
SQL injection vulnerability in soporte_horizontal_w.php in PHP Webquest 2.6 allows remote attackers to execute arbitrary SQL commands via the id_actividad parameter, a different vector than CVE-2007-4920.
[]
null
null
null
null
null
GHSA-hmmc-xfpm-h6x3
Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image.
[]
null
null
null
null
null
CVE-2016-10155
Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
6
null
4.9
null
CVE-2005-0503
uim before 0.4.5.1 trusts certain environment variables when libUIM is used in setuid or setgid applications, which allows local users to gain privileges.
[ "cpe:2.3:a:uim:uim:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-x3mv-x599-m8pw
Nagios XI before version 5.11.3 was discovered to contain a SQL injection vulnerability via the bulk modification tool.
[]
null
9.8
null
null
null
GHSA-p265-xr98-3vmr
Incorrect Authorization in Jenkins
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.
[]
null
null
4.3
null
null
CVE-2023-42467
QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-jpmg-8f7f-j8pq
The issue was addressed with improved memory handling. This issue is fixed in iOS 16. An app may be able to execute arbitrary code with kernel privileges.
[]
null
7.8
null
null
null
CVE-2008-2820
Directory traversal vulnerability in lang/lang-system.php in Open Azimyt CMS 0.22 minimal and 0.21 stable allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
[ "cpe:2.3:a:azimyt:open_azimyt_cms:0.21_stable:*:*:*:*:*:*:*", "cpe:2.3:a:azimyt:open_azimyt_cms:0.22_minimal:*:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-mg2f-7p87-hxwv
A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.
[]
null
null
null
null
null
CVE-2023-34304
Ashlar-Vellum Cobalt Out-Of-Bounds Access Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IGS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-18006.
[ "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2025-23883
WordPress Stray Random Quotes Plugin <= 1.9.9 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Stray Random Quotes allows Reflected XSS. This issue affects Stray Random Quotes: from n/a through 1.9.9.
[]
null
7.1
null
null
null
CVE-2004-0208
The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-f9rj-grmf-4hrc
An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
[]
null
null
9.1
null
null
CVE-2024-12484
Codezips Technical Discussion Forum signuppost.php sql injection
A vulnerability classified as critical was found in Codezips Technical Discussion Forum 1.0. This vulnerability affects unknown code of the file /signuppost.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[ "cpe:2.3:a:codezips:technical_discussion_forum:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
null
CVE-2024-10723
Stored XSS in phpipam/phpipam
A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0.
[]
null
null
3.5
null
null
CVE-2011-0311
The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.
[ "cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:1.4.2.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:5.0.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:runtimes_for_java_technology:6.0.8.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-25pf-65p9-qghp
Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0.
[]
null
7.1
null
null
null
GHSA-f9j7-2567-jg9h
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3).
[]
null
6.7
null
null
null
GHSA-wrjq-6j55-j564
The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
[]
null
9.8
null
null
null
CVE-2021-21597
Dell Wyse ThinOS, version 9.0, contains a Sensitive Information Disclosure Vulnerability. An authenticated malicious user with physical access to the system could exploit this vulnerability to read sensitive information written to the log files.
[ "cpe:2.3:o:dell:wyse_thinos:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_thinos:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_thinos:9.1:mr1:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_thin_client:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
GHSA-xvcc-h99r-vm8p
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
[]
null
null
null
null
null
CVE-2023-26203
A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands.
[ "cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortinac-f:7.2.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-8g86-97w6-2547
The 'Find Phone' function in Nice smartphones with software versions earlier before Nice-AL00C00B0135 has an authentication bypass vulnerability. An unauthenticated attacker may wipe and factory reset the phone by special steps. Due to missing authentication of the 'Find Phone' function, an attacker may exploit the vulnerability to bypass the 'Find Phone' function in order to use the phone normally.
[]
null
null
4.6
null
null
CVE-2009-4894
Multiple cross-site scripting (XSS) vulnerabilities in profile.php in PunBB before 1.3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) password or (2) e-mail.
[ "cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta1a:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:punbb:punbb:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-30843
Room-rent-portal-site v1.0 is vulnerable to SQL Injection via /rrps/classes/Master.php?f=delete_category, id.
[ "cpe:2.3:a:room_rent_portal_site_project:room_rent_portal_site:1.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
CVE-2024-10353
SourceCodester Online Exam System admin-dashboard access control
A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. Affected is an unknown function of the file /admin-dashboard. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This affects a different product and is a different issue than CVE-2024-40480.
[ "cpe:2.3:a:oretnom23:online_exam_system:1.0:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
null
GHSA-q5h7-2qmh-rxhr
A disclosure of sensitive information flaw was found in foreman via the GraphQL API. If the introspection feature is enabled, it is possible for attackers to retrieve sensitive admin authentication keys which could result in a compromise of the entire product's API.
[]
null
7.5
null
null
null
CVE-2014-1586
content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:31.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:31.1.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-6876
SourceCodester Best Salon Management System add-category.php sql injection
A vulnerability was found in SourceCodester Best Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /panel/add-category.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
null
CVE-2017-13322
In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
10
null
null
null
null
CVE-2021-30108
Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.
[ "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
null
CVE-2024-9908
D-Link DIR-619L B1 formSetMACFilter buffer overflow
A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formSetMACFilter of the file /goform/formSetMACFilter. The manipulation of the argument curTime leads to buffer overflow. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*" ]
5.1
5.5
5.5
5.2
null
CVE-2019-2298
Protection is missing while accessing md sessions info via macro which can lead to use-after-free in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 845 / SD 850, SD 855, SDM660, SDX20, SDX24
[ "cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
GHSA-cx95-q6gx-w4qp
SAK-50571 Sakai Kernel users created with type roleview can login as a normal user
ImpactIllegal access can be granted to the system.Referencessee https://sakaiproject.atlassian.net/browse/SAK-50571
[]
8.7
0
null
null
null
RHSA-2016:1605
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
nodejs-negotiator: Regular expression denial-of-service nodejs-minimatch: Regular expression denial-of-service
[ "cpe:/a:redhat:openshift:3.1::el7", "cpe:/a:redhat:openshift:3.2::el7" ]
null
null
5.3
null
null
CVE-2023-42838
An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Ventura 13.6.3, macOS Sonoma 14.1, macOS Monterey 12.7.2. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2025-30372
Emlog Pro contains an SQL injection vulnerability.
Emlog is an open source website building system. Emlog Pro versions pro-2.5.7 and pro-2.5.8 contain an SQL injection vulnerability. `search_controller.php` does not use addslashes after urldecode, allowing the preceeding addslashes to be bypassed by URL double encoding. This could result in potential leakage of sensitive information from the user database. Version pro-2.5.9 fixes the issue.
[]
7.7
null
null
null
null
CVE-2011-3105
Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 19.0.1084.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the :first-letter pseudo-element.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1028.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1029.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1030.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1031.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1032.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1033.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1034.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1035.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1036.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1037.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1038.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1039.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1040.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1041.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1042.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1043.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1044.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1045.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1046.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1047.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1048.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1049.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1050.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1051.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1052.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1053.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1054.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1055.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1056.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1056.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1057.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1058.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1058.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1059.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1060.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1060.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1061.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1061.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1062.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1062.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1063.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1063.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1064.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1065.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1066.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1067.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1068.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1068.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1069.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1070.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1071.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1072.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1073.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1074.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1075.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1076.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1076.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1077.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1078.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1079.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1080.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1081.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1081.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1082.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1082.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1083.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:19.0.1084.50:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-38443
Adobe Dimension GLB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension versions 3.4.5 is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-rm24-r627-m4hc
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H).
[]
null
5.5
null
null
null
GHSA-vqq2-52wh-vqj8
An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
[]
null
null
8.8
null
null
RHSA-2005:275
Red Hat Security Advisory: ia32el security update
security flaw
[ "cpe:/a:redhat:rhel_extras:3" ]
null
null
null
null
null
CVE-2007-6204
Multiple stack-based buffer overflows in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allow remote attackers to execute arbitrary code via unspecified long arguments to (1) ovlogin.exe, (2) OpenView5.exe, (3) snmpviewer.exe, and (4) webappmon.exe, as demonstrated via a long Action parameter to OpenView5.exe.
[ "cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2024-51903
WordPress WP Listings Pro plugin <= 3.0.14 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imFORZA WP Listings Pro allows Stored XSS.This issue affects WP Listings Pro: from n/a through 3.0.14.
[]
null
6.5
null
null
null
CVE-2024-45328
An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.
[]
null
7.1
null
null
null
GHSA-69wg-j2xh-f235
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Worklist). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Workflow accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
null
GHSA-mq5p-7q76-276p
In the Linux kernel, the following vulnerability has been resolved:net: let net.core.dev_weight always be non-zeroThe following problem was encountered during stability test:(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \ returned 1, exceeding its budget of 0. ------------[ cut here ]------------ list_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \ next=ffff88905f746e40. WARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \ __list_add_valid_or_report+0xf3/0x130 CPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+ RIP: 0010:__list_add_valid_or_report+0xf3/0x130 Call Trace: ? __warn+0xcd/0x250 ? __list_add_valid_or_report+0xf3/0x130 enqueue_to_backlog+0x923/0x1070 netif_rx_internal+0x92/0x2b0 __netif_rx+0x15/0x170 loopback_xmit+0x2ef/0x450 dev_hard_start_xmit+0x103/0x490 __dev_queue_xmit+0xeac/0x1950 ip_finish_output2+0x6cc/0x1620 ip_output+0x161/0x270 ip_push_pending_frames+0x155/0x1a0 raw_sendmsg+0xe13/0x1550 __sys_sendto+0x3bf/0x4e0 __x64_sys_sendto+0xdc/0x1b0 do_syscall_64+0x5b/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7eThe reproduction command is as follows: sysctl -w net.core.dev_weight=0 ping 127.0.0.1This is because when the napi's weight is set to 0, process_backlog() may return 0 and clear the NAPI_STATE_SCHED bit of napi->state, causing this napi to be re-polled in net_rx_action() until __do_softirq() times out. Since the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can be retriggered in enqueue_to_backlog(), causing this issue.Making the napi's weight always non-zero solves this problem.Triggering this issue requires system-wide admin (setting is not namespaced).
[]
null
null
null
null
null
CVE-2019-6708
PHPSHE 1.7 has SQL injection via the admin.php?mod=order state parameter.
[ "cpe:2.3:a:phpshe:phpshe:1.7:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
GHSA-f8jx-5r24-p453
Inappropriate implementation in PictureInPicture in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
[]
null
4.3
null
null
null
GHSA-7hc8-j4c9-mf24
Unspecified vulnerability in the SQL Performance Advisories/UIs component in Oracle Database Server 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Oracle Enterprise Manager Grid Control 10.1.0.6, 10.2.0.5, and 11.1.0.1; allows remote attackers to affect confidentiality, integrity, and availability, related to SQL Details UI & Explain Plan.
[]
null
null
null
null
null
CVE-2008-0352
The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
[ "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2022-25514
stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttUSHORT() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input.
[ "cpe:2.3:a:nothings:stb_truetype.h:1.26:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-q597-3v27-cmvx
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an xwrite out-of-bounds read.
[]
null
6.5
null
null
null
GHSA-7p54-g429-c636
A heap-based buffer overflow exists in the AP4_CttsAtom::AP4_CttsAtom component located in /Core/Ap4Utils.h of Bento4 version 06c39d9. This can lead to a denial of service (DOS).
[]
null
null
null
null
null
GHSA-w8q3-pxrq-r5fg
SQL injection vulnerability in keyword_search_action.php in Vastal I-Tech Shaadi Zone 1.0.9 allows remote attackers to execute arbitrary SQL commands via the tage parameter.
[]
null
null
null
null
null
GHSA-79pm-w7jm-jv2r
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452.
[]
null
null
null
null
null
CVE-2018-7434
zzcms 8.2 allows remote attackers to discover the full path via a direct request to 3/qq_connect2.0/API/class/ErrorCase.class.php or 3/ucenter_api/code/friend.php.
[ "cpe:2.3:a:zzcms:zzcms:8.2:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2022-4539
Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass
The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.
[ "cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:*:*:*", "cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
CVE-2022-31065
Cross site scripting vulnerability for private chat in bigbluebutton
BigBlueButton is an open source web conferencing system. In affected versions an attacker can embed malicious JS in their username and have it executed on the victim's client. When a user receives a private chat from the attacker (whose username contains malicious JavaScript), the script gets executed. Additionally when the victim receives a notification that the attacker has left the session. This issue has been patched in version 2.4.8 and 2.5.0. There are no known workarounds for this issue.
[ "cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha4:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha5:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:alpha6:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.1:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.2:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.3:*:*:*:*:*:*", "cpe:2.3:a:bigbluebutton:bigbluebutton:2.5:rc.4:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-3712
Potential user privilege escalation
Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.  Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).
[ "cpe:2.3:o:honeywell:pm43_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:pm43:-:*:*:*:*:*:x86:*" ]
null
6.6
null
null
null
CVE-2021-23432
Prototype Pollution
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
[ "cpe:2.3:a:mootools_project:mootools:*:*:*:*:*:node.js:*:*" ]
null
5.4
null
null
null
GHSA-6x72-2h6h-rcwq
The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
null
5.4
null
null
null
GHSA-jjcj-5hm4-fh8v
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2381.
[]
null
null
null
null
null
GHSA-fmrc-w6m3-5hv4
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: dbg-tlv: ensure NUL terminationThe iwl_fw_ini_debug_info_tlv is used as a string, so we must ensure the string is terminated correctly before using it.
[]
null
9.1
null
null
null
RHSA-2021:1030
Red Hat Security Advisory: tomcat security update
tomcat: Session fixation when using FORM authentication tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
[ "cpe:/o:redhat:rhel_eus:7.7::computenode", "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
4.3
null
null
null
CVE-2025-0353
Divi Torque Lite <= 4.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets
The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-gh63-grcf-3799
A vulnerability in the web interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability affects the following Cisco products running Cisco IMC Software: Unified Computing System (UCS) B-Series M3 and M4 Blade Servers, Unified Computing System (UCS) C-Series M3 and M4 Rack Servers. More Information: CSCvc37931. Known Affected Releases: 3.1(2c)B.
[]
null
null
6.1
null
null
CVE-2025-30811
WordPress ValidateCertify plugin <= 1.6.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Javier Revilla ValidateCertify allows Cross Site Request Forgery. This issue affects ValidateCertify: from n/a through 1.6.1.
[]
null
4.3
null
null
null
CVE-2025-30940
WordPress Melipayamak <= 2.2.12 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in melipayamak Melipayamak allows Stored XSS. This issue affects Melipayamak: from n/a through 2.2.12.
[]
null
5.9
null
null
null
GHSA-4776-frm5-r3rr
A vulnerability in the received packet parser of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) software could allow an unauthenticated, remote attacker to cause a reload of the affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient size validation of user-supplied data. An attacker could exploit this vulnerability by sending crafted H.224 data in Real-Time Transport Protocol (RTP) packets in an H.323 call. An exploit could allow the attacker to overflow a buffer in a cache that belongs to the received packet parser, which will result in a crash of the application, resulting in a DoS condition. All versions of Cisco Expressway Series Software and Cisco TelePresence VCS Software prior to version X8.8.2 are vulnerable. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCus99263.
[]
null
null
8.6
null
null
CVE-2024-49647
WordPress Simple Custom Admin plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Carl Alberto Simple Custom Admin allows Reflected XSS.This issue affects Simple Custom Admin: from n/a through 1.2.
[]
null
7.1
null
null
null
GHSA-w7r3-cc9h-pg34
Accellion Secure File Transfer Appliance before 8_0_105 allows remote authenticated administrators to bypass the restricted shell and execute arbitrary commands via shell metacharacters to the ping command, as demonstrated by modifying the cli program.
[]
null
null
null
null
null
GHSA-h3jg-w72m-c86w
A vulnerability was found in 1000 Projects Attendance Tracking Management System 1.0. It has been classified as critical. Affected is the function attendance_report of the file /admin/report.php. The manipulation of the argument course_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
GHSA-ffm8-j238-56p4
FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnerable to Cross Site Scripting (XSS) in the Time Range Configuration functionality of the administration interface. An attacker can inject malicious JavaScript into the "Time Range Name" field, which is improperly sanitized. When this input is saved, it is later executed in the browser of any user accessing the affected page, including administrators, resulting in arbitrary script execution in the user's browser.
[]
null
7.1
null
null
null
GHSA-q877-62m4-8x64
The FTP service in Zaurus PDAs SL-5000D and SL-5500 does not require authentication, which allows remote attackers to access the file system as root.
[]
null
null
null
null
null
GHSA-jggq-92ww-7r4w
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
[]
null
null
9.8
null
null
GHSA-m574-9366-9235
Substance3D - Viewer versions 0.25 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-p4vm-8rvv-j5fx
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Use of Default Password vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.
[]
null
8.8
null
null
null
CVE-2014-4629
EMC Documentum Content Server 7.0, 7.1 before 7.1 P10, and 6.7 before SP2 P19 allows remote authenticated users to read or delete arbitrary files via unspecified vectors related to an insecure direct object reference.
[ "cpe:2.3:a:emc:documentum_content_server:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:emc:documentum_content_server:6.7:sp1:*:*:*:*:*:*", "cpe:2.3:a:emc:documentum_content_server:6.7:sp2:*:*:*:*:*:*", "cpe:2.3:a:emc:documentum_content_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*" ]
null
null
null
9
null
CVE-2010-1701
SQL injection vulnerability in browse.html in PHP Video Battle Script allows remote attackers to execute arbitrary SQL commands via the cat parameter.
[ "cpe:2.3:a:rocky.nu:php_video_battle_script:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-46478
HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681.
[ "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2020-16299
A Division by Zero vulnerability in bj10v_print_page() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
[ "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
null
5.5
null
4.3
null
CVE-2023-2409
SourceCodester AC Repair and Services System view_service.php sql injection
A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. This affects an unknown part of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227703.
[ "cpe:2.3:a:oretnom23:ac_repair_and_services_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
GHSA-2w4f-8m3p-jrxr
A vulnerability has been identified in COMOS (All versions < V10.4.1). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
[]
null
6.1
null
null
null
CVE-2011-3452
Internet Sharing in Apple Mac OS X before 10.7.3 does not preserve the Wi-Fi configuration across software updates, which allows remote attackers to obtain sensitive information by leveraging the lack of a WEP password for a Wi-Fi network.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-25595
ASUS RT-AC86U - Improper Input Validation
ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.
[ "cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.45956:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2024-33870
An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
[]
null
6.3
null
null
null
GHSA-3ch5-6956-fx84
freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file.
[]
null
null
null
null
null
RHSA-2022:0265
Red Hat Security Advisory: polkit security update
polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector
[ "cpe:/o:redhat:rhel_eus:8.2::baseos" ]
null
7.8
null
null
null
GHSA-32ww-65cv-cvf4
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-11907.
[]
null
null
null
null
null