id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-gx7j-9f5h-mcm4 | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the export_submittion_attendees function in all versions up to, and including, 4.0.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download list of attendees for any event. | [] | null | 4.3 | null | null |
|
CVE-2002-2421 | acWEB 1.14 allows remote attackers to cause a denial of service (crash) via an HTTP request for a MS-DOS device name such as COM2. | [
"cpe:2.3:a:andrey_cherezov:acweb:1.14:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-3pjv-r7w4-2cf5 | Grails data binding causes JVM crash and/or other denial of service | ImpactA specially crafted web request can lead to a JVM crash or denial of service. Any Grails framework application using Grails data binding is vulnerable.PatchesPatches are available for Grails 3 and later.WorkaroundsNo workaround is possible except to avoid data binding to request data.References[Blog post](https://grails.org/blog/2023-12-20-cve-data-binding-dos.html)[Discussion](https://github.com/grails/grails-core/issues/13302)[Mitre CVD record](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46131) | [] | null | 6.5 | null | null |
CVE-2017-3385 | Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_outbound_telephony:12.2.6:*:*:*:*:*:*:*"
] | null | null | 8.2 | 5.8 |
|
GHSA-vmxh-c7g7-xw6f | Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter. | [] | null | null | null | null |
|
GHSA-gjgr-g54p-g5jh | Cross-site scripting (XSS) vulnerability in list.php in Complete PHP Counter allows remote attackers to inject arbitrary web script or HTML via the c parameter. | [] | null | null | null | null |
|
GHSA-4w5p-qwh4-xc23 | A vulnerability has been found in PHPGurukul Online Nurse Hiring System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/manage-nurse.php. The manipulation of the argument profilepic leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting vulnerability classes. | [] | 6.9 | 6.5 | null | null |
|
CVE-2017-14930 | Memory leak in decode_line_info in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file. | [
"cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*"
] | null | null | 5.5 | 7.1 |
|
CVE-2008-4376 | SQL injection vulnerability in index.php in Live TV Script allows remote attackers to execute arbitrary SQL commands via the mid parameter. | [
"cpe:2.3:a:livetvscript:live_tv_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-0970 | Cross-site request forgery (CSRF) vulnerability in SearchBlox before 8.2 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2024-33999 | moodle: unsafe direct use of $_SERVER['HTTP_REFERER'] in admin/tool/mfa/index.php | The referrer URL used by MFA required additional sanitizing, rather than being used directly. | [] | null | 9.8 | null | null |
GHSA-rfxv-rpwj-gvc7 | Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 alllows a remote attacker to execute arbitrary code via the ST, L, O, OU, CN parameters. | [] | null | 6.1 | null | null |
|
CVE-2024-41725 | Dover Fueling Solutions ProGauge MAGLINK LX CONSOLE Cross-site Scripting | ProGauge MAGLINK LX CONSOLE does not have sufficient filtering on input
fields that are used to render pages which may allow cross site
scripting. | [
"cpe:2.3:a:doverfuelingsolutions:maglink_lx_console:*:*:*:*:*:*:*:*",
"cpe:2.3:a:doverfuelingsolutions:maglink_lx4_console:*:*:*:*:*:*:*:*",
"cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx_console_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx_console:-:*:*:*:*:*:*:*",
"cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx4_console_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx4_console:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | null | null |
CVE-2015-0292 | Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-7670 | DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software | A maliciously crafted DWFX file, when parsed in w3dtk.dll through Autodesk Navisworks, can force an Out-of-Bounds Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [
"cpe:2.3:a:autodesk:navisworks_freedom:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks_simulate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks_manage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks:2025:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks:2025.1:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:navisworks:2025.2:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-26762 | Sme.UP ERP TOKYO V6R1M220406 was discovered to contain an arbitrary file upload vulnerability. | [
"cpe:2.3:a:smeup:erp:tokyo_v6r1m220406:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-q4rv-9jhx-3frp | Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | 7.8 | null | null |
|
RHSA-2022:7025 | Red Hat Security Advisory: firefox security update | expat: a use-after-free in the doContent function in xmlparse.c | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.1 | null | null |
GHSA-2mp6-9mjc-p6jg | An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. | [] | null | 7.5 | null | null |
|
GHSA-3mg4-6264-fvx2 | S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_newsauth parameter at /admin/ajax.php. | [] | null | 9.8 | null | null |
|
CVE-2006-1997 | Unspecified vulnerability in Sybase Pylon Anywhere groupware synchronization server before 7.0 allows local users to obtain sensitive information such as email and PIM data of another user via unknown attack vectors. | [
"cpe:2.3:a:sybase:pylon_anywhere:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sybase:pylon_anywhere:6.4.9:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-23798 | WordPress Layer Slider Plugin <= 1.1.9.7 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Muneeb Layer Slider plugin <= 1.1.9.7 versions. | [
"cpe:2.3:a:web-settler:layer_slider:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-rf9c-2wqq-gfrc | Cross-Site Request Forgery (CSRF) vulnerability in Kemal YAZICI - PluginPress Shortcode IMDB plugin <= 6.0.8 versions. | [] | null | 4.3 | null | null |
|
CVE-2023-33175 | ToUI allows user-specific variables to be shared between users | ToUI is a Python package for creating user interfaces (websites and desktop apps) from HTML. ToUI is using Flask-Caching (SimpleCache) to store user variables. Websites that use `Website.user_vars` property. It affects versions 2.0.1 to 2.4.0. This issue has been patched in version 2.4.1. | [
"cpe:2.3:a:toui_project:toui:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
RHSA-2018:3400 | Red Hat Security Advisory: libvirt security update | hw: cpu: speculative store bypass | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 5.6 | null |
CVE-2017-1635 | IBM Tivoli Monitoring V6 6.2.2.x could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free error. A remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 133243. | [
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_monitoring:6.2.2.9:*:*:*:*:*:*:*"
] | null | null | 8 | 5.2 |
|
CVE-2013-5190 | Smart Card Services in Apple Mac OS X before 10.9 does not properly implement certificate-revocation checks, which allows remote attackers to cause a denial of service (Smart Card usage outage) by interfering with the revocation-check procedure. | [
"cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-h8mf-4jj6-cgx8 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14878. | [] | null | null | null | null |
|
GHSA-j6g7-h9mx-698p | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via vectors related to SMB server kernel module. | [] | null | null | null | null |
|
GHSA-jpwc-c28p-36cc | A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Reset` packet missing an expected `ResetType` field. | [] | null | 6.5 | null | null |
|
GHSA-hw3c-cw6g-7h26 | Certain Starcharge products are affected by Improper Input Validation. The affected products include: Nova 360 Cabinet <= 1.3.0.0.7b102 - Fixed: Beta1.3.0.1.0 and Titan 180 Premium <= 1.3.0.0.6 - Fixed: 1.3.0.0.9. | [] | null | 8.8 | null | null |
|
CVE-2014-8723 | GetSimple CMS 3.3.4 allows remote attackers to obtain sensitive information via a direct request to (1) plugins/anonymous_data.php or (2) plugins/InnovationPlugin.php, which reveals the installation path in an error message. | [
"cpe:2.3:a:get-simple:getsimple_cms:3.3.4:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-cqwm-8779-r274 | XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-cggv-m6ff-v652 | Weak permissions on the "%PROGRAMDATA%\MSI\Dragon Center" folder in Dragon Center 2.6.2003.2401, shipped with Micro-Star MSI Gaming laptops, allows local authenticated users to overwrite system files and gain escalated privileges. One attack method is to change the Recommended App binary within App.json. Another attack method is to use this part of %PROGRAMDATA% for mounting an RPC Control directory. | [] | null | null | null | null |
|
GHSA-w58q-m7pq-48p4 | In the Linux kernel, the following vulnerability has been resolved:usb: isp1760: Fix out-of-bounds array accessRunning the driver through kasan gives an interesting splat:BUG: KASAN: global-out-of-bounds in isp1760_register+0x180/0x70c
Read of size 20 at addr f1db2e64 by task swapper/0/1
(...)
isp1760_register from isp1760_plat_probe+0x1d8/0x220
(...)This happens because the loop reading the regmap fields for the
different ISP1760 variants look like this:for (i = 0; i < HC_FIELD_MAX; i++) { ... }Meaning it expects the arrays to be at least HC_FIELD_MAX - 1 long.However the arrays isp1760_hc_reg_fields[], isp1763_hc_reg_fields[],
isp1763_hc_volatile_ranges[] and isp1763_dc_volatile_ranges[] are
dynamically sized during compilation.Fix this by putting an empty assignment to the [HC_FIELD_MAX]
and [DC_FIELD_MAX] array member at the end of each array.
This will make the array one member longer than it needs to be,
but avoids the risk of overwriting whatever is inside
[HC_FIELD_MAX - 1] and is simple and intuitive to read. Also
add comments explaining what is going on. | [] | null | 7.1 | null | null |
|
CVE-2016-1000232 | NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0. | [
"cpe:2.3:a:salesforce:tough-cookie:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_connect:5.0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.3:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-4jrr-pcvg-6fp6 | Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user | [] | null | 5.3 | null | null |
|
CVE-2021-25516 | An improper check or handling of exceptional conditions in Exynos baseband prior to SMR Dec-2021 Release 1 allows attackers to track locations. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-8f2f-h9hr-hqj6 | The Fotobook WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping and the use of $_SERVER['PHP_SELF'] found in the ~/options-fotobook.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 3.2.3. | [] | null | null | null | null |
|
GHSA-j85r-37ch-rchw | Heap-based buffer overflow in the bmp_decode_rle function in libnsbmp.c in Libnsbmp 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the last row of RLE data in a crafted BMP file. | [] | null | null | null | null |
|
RHSA-2024:6156 | Red Hat Security Advisory: kernel security update | kernel: perf: Fix list corruption in perf_cgroup_switch() kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() kernel: virtio-net: tap: mlx5_core short frame denial of service kernel: virtio-net: tun: mlx5_core short frame denial of service | [
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 7.1 | null | null |
CVE-2017-14543 | STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .epub file, related to "Data from Faulting Address controls Branch Selection starting at STDUEPubFile!DllUnregisterServer+0x0000000000039335." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
CVE-2019-10136 | It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum. | [
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:spacewalk:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
CVE-2022-49477 | ASoC: samsung: Fix refcount leak in aries_audio_probe | In the Linux kernel, the following vulnerability has been resolved:
ASoC: samsung: Fix refcount leak in aries_audio_probe
of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
If extcon_find_edev_by_node() fails, it doesn't call of_node_put()
Calling of_node_put() after extcon_find_edev_by_node() to fix this. | [] | null | 5.5 | null | null |
GHSA-45fx-8598-pqhv | Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten. | [] | null | 8.8 | null | null |
|
GHSA-cqpr-pcm7-m3jc | Potential segfault in `localtime_r` invocations | ImpactUnix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.WorkaroundsNo workarounds are known. | [] | null | null | null | null |
RHSA-2024:7374 | Red Hat Security Advisory: Security update for service-interconnect rhel9 container images | curl: HTTP/2 push headers memory-leak pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection glib2: Signal subscription vulnerabilities krb5: GSS message token handling krb5: GSS message token handling | [
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 6.5 | null | null |
GHSA-8j3m-968h-m85q | GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a shell injection vulnerability via the interface check_ovpn_client_config. | [] | null | 9.8 | null | null |
|
GHSA-5888-ffcr-r425 | Prototype Pollution leading to Remote Code Execution in superjson | ImpactThis is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call.PatchesThis has been patched in superjson 1.8.1 and Blitz.js 0.45.3.If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1.WorkaroundsNoneFor more informationIf you have any questions or comments about this advisory:Open an issue in https://github.com/blitz-js/superjsonEmail us at [email protected]://www.sonarsource.com/blog/blitzjs-prototype-pollution/ | [] | null | 9 | null | null |
CVE-2009-4269 | The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution. | [
"cpe:2.3:a:apache:derby:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2007-3764 | The Skinny channel driver (chan_skinny) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a certain data length value in a crafted packet, which results in an "overly large memcpy." | [
"cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-3ppm-vmgq-rr54 | Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor. | [] | null | 7.5 | null | null |
|
CVE-2024-4808 | Kashipara College Management System delete_faculty.php sql injection | A vulnerability, which was classified as critical, was found in Kashipara College Management System 1.0. Affected is an unknown function of the file delete_faculty.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263928. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
RHSA-2017:1297 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: Use after free in seq file kernel: Oops in shash_async_export() kernel: EXT4 memory corruption / SLAB out-of-bounds read kernel: net/packet: overflow in check for priv area size | [
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null |
CVE-2020-5373 | Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an improper authentication vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to retrieve the system inventory data of the managed device. | [
"cpe:2.3:a:dell:emc_omimssc_for_sccm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_omimssc_for_scvmm:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2016-10124 | An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container. | [
"cpe:2.3:a:linuxcontainers:lxc:*:rc1:*:*:*:*:*:*"
] | null | null | 8.6 | 5 |
|
CVE-2024-36160 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
CVE-2018-12776 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-42468 | Path traversal (CometVisu) | openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. CometVisuServlet in versions prior to 4.2.1 is susceptible to an unauthenticated path traversal vulnerability. Local files on the server can be requested via HTTP GET on the CometVisuServlet. This issue may lead to information disclosure. Users should upgrade to version 4.2.1 of the CometVisu add-on of openHAB to receive a patch. | [
"cpe:2.3:a:openhab:openhab_webui:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openhab:openhab:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-q8qv-35px-5j77 | In the Linux kernel, the following vulnerability has been resolved:geneve: make sure to pull inner header in geneve_rx()syzbot triggered a bug in geneve_rx() [1]Issue is similar to the one I fixed in commit 8d975c15c0cd
("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")We have to save skb->network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.pskb_inet_may_pull() makes sure the needed headers are in skb->head.[1]
BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]
BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
geneve_rx drivers/net/geneve.c:279 [inline]
geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108
udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186
udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346
__udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422
udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604
ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:461 [inline]
ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
__netif_receive_skb_one_core net/core/dev.c:5534 [inline]
__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
process_backlog+0x480/0x8b0 net/core/dev.c:5976
__napi_poll+0xe3/0x980 net/core/dev.c:6576
napi_poll net/core/dev.c:6645 [inline]
net_rx_action+0x8b8/0x1870 net/core/dev.c:6778
__do_softirq+0x1b7/0x7c5 kernel/softirq.c:553
do_softirq+0x9a/0xf0 kernel/softirq.c:454
__local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381
local_bh_enable include/linux/bottom_half.h:33 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]
__dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378
dev_queue_xmit include/linux/netdevice.h:3171 [inline]
packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
packet_snd net/packet/af_packet.c:3081 [inline]
packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
__sys_sendto+0x735/0xa10 net/socket.c:2191
__do_sys_sendto net/socket.c:2203 [inline]
__se_sys_sendto net/socket.c:2199 [inline]
__x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6bUninit was created at:
slab_post_alloc_hook mm/slub.c:3819 [inline]
slab_alloc_node mm/slub.c:3860 [inline]
kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
__alloc_skb+0x352/0x790 net/core/skbuff.c:651
alloc_skb include/linux/skbuff.h:1296 [inline]
alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394
sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783
packet_alloc_skb net/packet/af_packet.c:2930 [inline]
packet_snd net/packet/af_packet.c:3024 [inline]
packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
__sys_sendto+0x735/0xa10 net/socket.c:2191
__do_sys_sendto net/socket.c:2203 [inline]
__se_sys_sendto net/socket.c:2199 [inline]
__x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b | [] | null | 5.5 | null | null |
|
CVE-2006-2048 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Edwin van Wijk phpWebFTP 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) port, (2) server, and (3) user parameters. NOTE: it is possible that the affected version is actually 3.2. | [
"cpe:2.3:a:phpwebftp:phpwebftp:2.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2018-1000025 | Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in src/Firebase/Auth/IdTokenVerifier.php does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1. | [
"cpe:2.3:a:firebase_admin_sdk_for_php_project:firebase_admin_sdk_for_php:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2023-41109 | SmartNode SN200 (aka SN200) 3.21.2-23021 allows unauthenticated OS Command Injection. | [
"cpe:2.3:o:patton:smartnode_sn200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:patton:smartnode_sn200:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-qrpm-p2h7-hrv2 | Exposure of Sensitive Information to an Unauthorized Actor in nanoid | The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. | [] | null | 5.5 | null | null |
GHSA-vcf4-95pq-m6wr | iDRAC9 versions prior to 5.00.20.00 contain an input injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to iDRAC. | [] | null | null | null | null |
|
CVE-2006-6879 | Unrestricted file upload vulnerability in admin/uploads.php in PHP-Update 2.7 and earlier allows remote authenticated users to upload arbitrary PHP scripts to the gfx/ and files/ directories via the userfile parameter. | [
"cpe:2.3:a:php-update:php-update:*:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
CVE-2020-7185 | A tvxlanlegend expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h08:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0701:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0702:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0703h01:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
GHSA-qcrh-jqxf-mgm4 | Delinea Privilege Manager before 12.0.2 mishandles the security of the Windows agent. | [] | null | 7.3 | null | null |
|
GHSA-f9fx-wvgj-vvxm | In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: core: Fix ufshcd_abort_one racing issueWhen ufshcd_abort_one is racing with the completion ISR, the completed tag
of the request's mq_hctx pointer will be set to NULL by ISR. Return
success when request is completed by ISR because ufshcd_abort_one does not
need to do anything.The racing flow is:Thread A
ufshcd_err_handler step 1
...
ufshcd_abort_one
ufshcd_try_to_abort_task
ufshcd_cmd_inflight(true) step 3
ufshcd_mcq_req_to_hwq
blk_mq_unique_tag
rq->mq_hctx->queue_num step 5Thread B
ufs_mtk_mcq_intr(cq complete ISR) step 2
scsi_done
...
__blk_mq_free_request
rq->mq_hctx = NULL; step 4Below is KE back trace.
ufshcd_try_to_abort_task: cmd at tag 41 not pending in the device.
ufshcd_try_to_abort_task: cmd at tag=41 is cleared.
Aborting tag 41 / CDB 0x28 succeeded
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194
pc : [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14
lr : [0xffffffddd6155b84] ufshcd_mcq_req_to_hwq+0x1c/0x40 [ufs_mediatek_mod_ise]
do_mem_abort+0x58/0x118
el1_abort+0x3c/0x5c
el1h_64_sync_handler+0x54/0x90
el1h_64_sync+0x68/0x6c
blk_mq_unique_tag+0x8/0x14
ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise]
process_one_work+0x208/0x4fc
worker_thread+0x228/0x438
kthread+0x104/0x1d4
ret_from_fork+0x10/0x20 | [] | null | 5.5 | null | null |
|
RHSA-2023:7258 | Red Hat Security Advisory: dotnet6.0 security update | dotnet: Arbitrary File Write and Deletion Vulnerability: FormatFtpCommand dotnet: ASP.NET Security Feature Bypass Vulnerability in Blazor forms | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.5 | null | null |
GHSA-9jjv-7crp-6rr2 | [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR] | [] | null | 9.8 | null | null |
|
GHSA-4hjg-62xc-cfw3 | Huawei ViewPoint 8660 V100R008C03 have a memory leak vulnerability. The software does not release allocated memory properly when parse XML Schema data. An authenticated attacker could upload a crafted XML file, successful exploit could cause the system service abnormal since run out of memory. | [] | null | null | 3.3 | null |
|
CVE-2023-49829 | WordPress Tutor LMS Plugin <= 2.2.4 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Tutor LMS – eLearning and online course solution allows Stored XSS.This issue affects Tutor LMS – eLearning and online course solution: from n/a through 2.2.4.
| [
"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
CVE-1999-1194 | chroot in Digital Ultrix 4.1 and 4.0 is insecurely installed, which allows local users to gain privileges. | [
"cpe:2.3:o:digital:ultrix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-3rcq-vwx7-jh65 | Notable v1.8.4 does not filter text editing, allowing attackers to execute arbitrary code via a crafted payload injected into the Title text field. | [] | null | 9.8 | null | null |
|
CVE-2020-29147 | A SQL injection vulnerability in wy_controlls/wy_side_visitor.php of Wayang-CMS v1.0 allows attackers to obtain sensitive database information. | [
"cpe:2.3:a:wayang-cms_project:wayang-cms:1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-c4x7-5j2r-4346 | The kernel-mode driver in Microsoft Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | [] | null | null | 7.8 | null |
|
GHSA-xf27-r9vm-q26m | An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. | [] | null | null | 7.8 | null |
|
GHSA-2xpj-7m85-mm88 | Missing Authorization vulnerability in Themeum WP Crowdfunding allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Crowdfunding: from n/a through 2.1.10. | [] | null | 6.4 | null | null |
|
CVE-2023-36354 | TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request. | [
"cpe:2.3:h:tp-link:tl-wr940n_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr740n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:v8:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:v10:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr740n:v1:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr740n:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr941nd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:v6:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2021:4585 | Red Hat Security Advisory: gcc-toolset-10-gcc security update | environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.5 | null | null |
CVE-2023-0121 | Allocation of Resources Without Limits or Throttling in GitLab | A denial of service issue was discovered in GitLab CE/EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | null |
GHSA-5g4m-52c9-q9f8 | Java in Mac OS X 10.4 through 10.4.11 allows remote attackers to bypass Keychain access controls and add or delete arbitrary Keychain items via a crafted Java applet. | [] | null | null | null | null |
|
CVE-2010-2955 | The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2024-30247 | Command Injection as root in NextCloudPi web panel | NextcloudPi is a ready to use image for Virtual Machines, Raspberry Pi, Odroid HC1, Rock64 and other boards. A command injection vulnerability in NextCloudPi allows command execution as the root user via the NextCloudPi web-panel. Due to a security misconfiguration this can be used by anyone with access to NextCloudPi web-panel, no authentication is required. It is recommended that the NextCloudPi is upgraded to 1.53.1. | [
"cpe:2.3:a:nextcloud:nextcloudpi:*:*:*:*:*:*:*:*"
] | null | 10 | null | null |
CVE-2017-12555 | A remote arbitrary file download and disclosure of information vulnerability in HPE Intelligent Management Center (iMC) Service Operation Management (SOM) version IMC SOM 7.3 E0501 was found. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*"
] | null | null | 6.5 | 6.8 |
|
GHSA-frv7-4h3q-2j9h | Cisco Emergency Responder 8.6 and 9.2 allows remote attackers to cause a denial of service (CPU consumption) by sending malformed UDP packets to the CERPT port, aka Bug ID CSCtx38369. | [] | null | null | null | null |
|
CVE-2020-6283 | SAP Fiori Launchpad does not sufficiently encode user controlled inputs, and hence allowing the attacker to inject the meta tag into the launchpad html using the vulnerable parameter, resulting in reflected Cross-Site Scripting (XSS) vulnerability. With a successful attack, the attacker can steal authentication information of the user, such as data relating to his or her current session. | [
"cpe:2.3:a:sap:fiori_launchpad:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad:754:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:fiori_launchpad:755:*:*:*:*:*:*:*"
] | null | null | 4.8 | null |
|
CVE-2021-21581 | Dell EMC iDRAC9 versions prior to 5.00.00.00 contain a cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link. | [
"cpe:2.3:o:dell:emc_idrac9_firmware:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-qwjf-rjgv-523g | Application Access Server (A-A-S) 1.0.37 and earlier allows remote authenticated users to cause a denial of service (application crash) via a long file request. | [] | null | null | null | null |
|
GHSA-3fhh-fr6w-p45p | Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name. | [] | null | null | null | null |
|
GHSA-r6vj-c75j-34h4 | An information disclosure vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability. | [] | null | 5.3 | null | null |
|
GHSA-r3qr-j593-ccqw | ** DISPUTED ** SQL injection vulnerability in inc/common.php in GlobalMegaCorp dvddb 0.6 allows remote attackers to execute arbitrary SQL commands via the user parameter. NOTE: this issue has been disputed by a reliable third party, who states that inc/common.php only contains function definitions. | [] | null | null | null | null |
|
GHSA-j87c-5cr6-p64r | BIG-IP APM clients may send IP traffic outside of the VPN tunnel. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | [] | null | 5.3 | null | null |
|
CVE-2016-1181 | ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899. | [
"cpe:2.3:a:oracle:banking_platform:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:portal:11.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:struts:1.3.10:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2018-0271 | A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services. The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center. This vulnerability affects Cisco DNA Center Software Releases prior to 1.1.2. Cisco Bug IDs: CSCvi09394. | [
"cpe:2.3:a:cisco:digital_network_architecture_center:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-m6c2-4qxx-95pf | A vulnerability was found in nafisulbari/itsourcecode Insurance Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file addClient.php. The manipulation of the argument CLIENT ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 3.5 | null | null |
|
RHSA-2019:2049 | Red Hat Security Advisory: libmspack security update | libmspack: Out-of-bounds write in mspack/cab.h libmspack: chmd_read_headers() fails to reject filenames containing NULL bytes | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.3 | null |
GHSA-j6w8-cfmf-6x5f | An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to obtain sensitive information or cause a denial of service via a crafted image. | [] | null | null | 7.1 | null |
|
GHSA-86jq-f3mw-w6pc | ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to execute commands remotely. Exploit details have been disclosed to the public. The existence and implications of this vulnerability are doubted by Apple even though multiple public videos demonstrating the attack exist. Upgrading to version 13.0 migt be able to address this issue. It is recommended to upgrade affected devices. | [] | null | 8.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.