id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-3713 | QuickTime in Apple OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted movie file. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-g5m7-gw4j-cjhj | Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field. | [] | null | null | null | null |
|
GHSA-gcg3-3cx8-rgqh | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist. | [] | null | null | 7.8 | null |
|
CVE-2016-8429 | An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32160775. References: N-CVE-2016-8429. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-824g-39r8-p8w4 | Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. | [] | null | 6.5 | null | null |
|
CVE-2019-12579 | A vulnerability in the London Trust Media Private Internet Access (PIA) VPN Client v82 for Linux and macOS could allow an authenticated, local attacker to run arbitrary code with elevated privileges. The PIA Linux/macOS binary openvpn_launcher.64 binary is setuid root. This binary accepts several parameters to update the system configuration. These parameters are passed to operating system commands using a "here" document. The parameters are not sanitized, which allow for arbitrary commands to be injected using shell metacharacters. A local unprivileged user can pass special crafted parameters that will be interpolated by the operating system calls. | [
"cpe:2.3:a:londontrustmedia:private_internet_access_vpn_client:82:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2023-33356 | IceCMS v1.0.0 is vulnerable to Cross Site Scripting (XSS). | [
"cpe:2.3:a:thecosy:icecms:1.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
PYSEC-2020-104 | null | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | [] | null | null | null | null |
GHSA-9fhq-2p6p-h9p8 | A vulnerability has been found in openBI up to 1.0.8 and classified as critical. This vulnerability affects the function uploadIcon of the file /application/index/controller/Icon.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252310 is the identifier assigned to this vulnerability. | [] | null | 7.3 | null | null |
|
GHSA-jq8g-94vx-pgrm | An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service. | [] | null | null | null | null |
|
GHSA-v5j8-4g8q-9q2c | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to launch a denial-of-service (DoS) attack.We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later | [] | 5.1 | null | null | null |
|
GHSA-55j8-4mpr-wfvp | An issue was discovered in EMC ScaleIO 2.0.1.x. A buffer overflow vulnerability in the SDBG service may potentially allow a remote unauthenticated attacker to execute arbitrary commands with root privileges on an affected server. | [] | null | null | 9.8 | null |
|
CVE-2014-4005 | SAP Brazil add-on has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. | [
"cpe:2.3:a:sap:brazil:-:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-16082 | A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name. There are 2 likely scenarios in which one would likely be vulnerable. 1) Executing unsafe, user-supplied sql which contains a malicious column name. 2) Connecting to an untrusted database and executing a query which returns results where any of the column names are malicious. | [
"cpe:2.3:a:node-postgres:pg:*:*:*:*:*:node.js:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-4426-wxwq-q9rv | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. | [] | null | 7.8 | null | null |
|
CVE-2024-3875 | Tenda F1202 Natlimit fromNatlimit stack-based overflow | A vulnerability was found in Tenda F1202 1.2.0.20(408). It has been rated as critical. This issue affects the function fromNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260909 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 8.8 | 8.8 | 9 |
GHSA-wv72-9v4w-73w6 | A stored cross-site scripting (XSS) vulnerability in /home/user/edit_submit of gougucms v4.08.18 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the headimgurl parameter. | [] | null | 5.4 | null | null |
|
GHSA-c589-hx7c-9gj9 | An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service. | [] | null | null | 7.5 | null |
|
GHSA-v7vj-pg9w-p92q | Cross-site scripting (XSS) vulnerability in EMC Smarts IP Manager, Smarts Service Assurance Manager, Smarts Server Manager, Smarts VoIP Availability Manager, Smarts Network Protocol Manager, and Smarts MPLS Manager before 9.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [] | null | null | null | null |
|
GHSA-x944-3w5c-5hcg | The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) WordPress plugin before 5.10.3 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] | null | 5.4 | null | null |
|
GHSA-v9cj-6wcq-m4j9 | Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable. | [] | null | null | null | null |
|
CVE-2017-1522 | IBM Content Navigator & CMIS 2.0.3, 3.0.0, and 3.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129832. | [
"cpe:2.3:a:ibm:content_navigator:2.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:content_navigator:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:content_navigator:3.0.1:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-3vfw-f9fg-pj3x | A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. | [] | null | 5.4 | null | null |
|
GHSA-hr66-f59g-prqh | A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640. | [] | null | null | 4.3 | null |
|
CVE-2018-1442 | IBM Application Performance Management - Response Time Monitoring Agent (IBM Monitoring 8.1.4) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139598. | [
"cpe:2.3:a:ibm:monitoring:8.1.4:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-q778-7mc2-5qmc | Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check. | [] | null | 7.5 | null | null |
|
GHSA-r5rf-wpwj-h23p | In the Linux kernel, the following vulnerability has been resolved:net: usb: rtl8150: enable basic endpoint checkingSyzkaller reports [1] encountering a common issue of utilizing a wrong
usb endpoint type during URB submitting stage. This, in turn, triggers
a warning shown below.For now, enable simple endpoint checking (specifically, bulk and
interrupt eps, testing control one is not essential) to mitigate
the issue with a view to do other related cosmetic changes later,
if they are necessary.[1] Syzkaller report:
usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 1 PID: 2586 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 driv>
Modules linked in:
CPU: 1 UID: 0 PID: 2586 Comm: dhcpcd Not tainted 6.11.0-rc4-syzkaller-00069-gfc88bb11617>
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503
Code: 84 3c 02 00 00 e8 05 e4 fc fc 4c 89 ef e8 fd 25 d7 fe 45 89 e0 89 e9 4c 89 f2 48 8>
RSP: 0018:ffffc9000441f740 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888112487a00 RCX: ffffffff811a99a9
RDX: ffff88810df6ba80 RSI: ffffffff811a99b6 RDI: 0000000000000001
RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8881023bf0a8 R14: ffff888112452a20 R15: ffff888112487a7c
FS: 00007fc04eea5740(0000) GS:ffff8881f6300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0a1de9f870 CR3: 000000010dbd0000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
rtl8150_open+0x300/0xe30 drivers/net/usb/rtl8150.c:733
__dev_open+0x2d4/0x4e0 net/core/dev.c:1474
__dev_change_flags+0x561/0x720 net/core/dev.c:8838
dev_change_flags+0x8f/0x160 net/core/dev.c:8910
devinet_ioctl+0x127a/0x1f10 net/ipv4/devinet.c:1177
inet_ioctl+0x3aa/0x3f0 net/ipv4/af_inet.c:1003
sock_do_ioctl+0x116/0x280 net/socket.c:1222
sock_ioctl+0x22e/0x6c0 net/socket.c:1341
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl fs/ioctl.c:893 [inline]
__x64_sys_ioctl+0x193/0x220 fs/ioctl.c:893
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc04ef73d49
...This change has not been tested on real hardware. | [] | null | null | null | null |
|
GHSA-2h6h-4q8g-8rmw | The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file. | [] | null | null | 6.5 | null |
|
CVE-2023-21102 | In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-48c3-9c9f-chwr | Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: EPPCM_HIER_TOP). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] | null | null | 6.1 | null |
|
GHSA-wq3v-33f3-3c29 | IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801. | [] | null | 9.8 | null | null |
|
CVE-2015-5365 | Cross-site scripting (XSS) vulnerability in Zurmo CRM 3.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "What's going on?" profile field. | [
"cpe:2.3:a:zurmo:zurmo_crm:3.0.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2014-3838 | ownCloud Server before 5.0.16 and 6.0.x before 6.0.3 does not properly check permissions, which allows remote authenticated users to read the names of files of other users by leveraging access to multiple accounts. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
CVE-2016-7659 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-45jj-q8mv-p3p6 | Cross-site scripting (XSS) vulnerability in fichiers/add_url.php in Logz CMS 1.3.1 allows remote attackers to inject arbitrary web script or HTML via the art parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
GHSA-qv9v-xqjc-jc7f | Cross Site Scripting vulnerability in Quorum onQ OS v.6.0.0.5.2064 allows a remote attacker to obtain sensitive information via the msg parameter in the Login page. | [] | null | 6.1 | null | null |
|
GHSA-x2cv-5mxq-rr26 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC. | [] | null | null | null | null |
|
GHSA-hh4f-vg35-pgxc | An issue was discovered in AKCMS 6.1. CSRF can delete an article via an admincp deleteitem action to index.php. | [] | null | null | 6.5 | null |
|
GHSA-2vgm-gvf9-pg8j | An issue was discovered in Ivanti Avalanche for all versions between 5.3 and 6.2. A local user with database access privileges can read the encrypted passwords for users who authenticate via LDAP to Avalanche services. These passwords are stored in the Avalanche databases. This issue only affects customers who have enabled LDAP authentication in their configuration. | [] | null | null | 7.8 | null |
|
GHSA-2v9x-gpq4-8gg2 | CSRF vulnerability in Jenkins Shared Objects Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects. | [] | null | 4.3 | null | null |
GHSA-928h-h2fh-4474 | SQL injection vulnerability in the wt_directory extension before 1.4.2 for TYPO3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | null | null |
|
CVE-2015-4873 | Unspecified vulnerability in the Database Scheduler component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2021-21459 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-cfch-8h45-r4hc | Multiple cross-site scripting (XSS) vulnerabilities in myadmin/index.php in NextAge Shopping Cart allow remote attackers to inject arbitrary web script or HTML via the (1) username and (2) password parameters. | [] | null | null | null | null |
|
CVE-2016-3028 | IBM Security Access Manager for Web 7.0 before IF2 and 8.0 before 8.0.1.4 IF3 and Security Access Manager 9.0 before 9.0.1.0 IF5 allow remote authenticated users to execute arbitrary commands by leveraging LMI admin access. | [
"cpe:2.3:a:ibm:security_access_manager:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_web:8.0.1.4:*:*:*:*:*:*:*"
] | null | null | 9.1 | 9 |
|
GHSA-6rv4-4qv6-88g2 | Prototype Pollution in set-or-get | Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution. | [] | null | 9.8 | null | null |
GHSA-m2q8-9rr2-r2ww | A mechanism to spoof the Firefox for Android addressbar using a "javascript:" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications. This vulnerability affects Firefox < 53. | [] | null | null | 7.5 | null |
|
GHSA-f9f8-xghc-582j | Multiple cross-site scripting (XSS) vulnerabilities in the Zingiri Web Shop plugin 2.4.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter in zing.inc.php or (2) notes parameter in fws/pages-front/onecheckout.php. | [] | null | null | null | null |
|
CVE-2015-5165 | The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus_from_rhui:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2014-9731 | The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
RHSA-2017:2731 | Red Hat Security Advisory: kernel security and bug fix update | kernel: stack buffer overflow in the native Bluetooth stack | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
] | null | null | 7.5 | null |
GHSA-hrfm-36wx-2cfx | The WPC Admin Columns plugin for WordPress is vulnerable to privilege escalation in versions 2.0.6 to 2.1.0. This is due to the plugin not properly restricting user meta values that can be updated through the ajax_edit_save() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to that of an administrator. | [] | null | 8.8 | null | null |
|
GHSA-mfqq-q5rf-3hvq | Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise. | [] | null | null | 9.8 | null |
|
CVE-2023-39392 | Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten. | [
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2007-1633 | Directory traversal vulnerability in bbcode_ref.php in the Giorgio Ciranni Splatt Forum 4.0 RC1 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by bbcode_ref.php. | [
"cpe:2.3:a:giorgio_ciranni:splatt_forum:4.0_rc1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-9c9v-ch99-46qw | The Remote Installation Service (RIS) in Microsoft Windows 2000 SP4 uses a TFTP server that allows anonymous access, which allows remote attackers to upload and overwrite arbitrary files to gain privileges on systems that use RIS. | [] | null | null | null | null |
|
GHSA-7wwm-57j8-wx2j | An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32. | [] | null | 8.8 | null | null |
|
GHSA-4r48-94p2-qwq4 | The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-h3v7-cvf6-7jhw | The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes. | [] | null | null | null | null |
|
CVE-2019-15068 | A broken access control vulnerability discovered in Smart Battery A4 | A broken access control vulnerability in Smart Battery A4, a multifunctional portable charger, firmware version ?<= r1.7.9 allows an attacker to get/reset administrator’s password without any authentication. | [
"cpe:2.3:o:gigastone:smart_battery_a4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gigastone:smart_battery_a4:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
ICSA-19-106-02 | WAGO Series 750-88x and 750-87x | By exploiting the undocumented service access, it is possible to change the settings of a device and access web-based management with administrator privileges. An attacker can exploit this vulnerability to lock other users out from the device or open closed network ports. It is also possible to use this service access as an FTP user and exchange or delete the application.CVE-2019-10712 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
GHSA-v66p-hmjm-wrxm | Target influence via framing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to inject arbitrary web script or HTML via application pages inability to break out of 3rd party HTML frames. | [] | null | null | 6.1 | null |
|
GHSA-4mcf-r6j9-cvfh | The GUP generic update process in Notepad++ before 4.8.1 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning. | [] | null | null | null | null |
|
CVE-2020-8742 | Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc8i7behga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7behga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7bekqa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7bekqa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i3behfa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i3behfa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i5behfa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i5behfa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i5bekpa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i5bekpa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i3beh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i3beh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i3behs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i3behs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i3bek_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i3bek:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i5beh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i5beh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i5behs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i5behs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i5bek_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i5bek:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7beh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7beh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1c32gk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1c32gk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1c64gk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1c64gk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hvkva:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc8i7hvk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc8i7hvk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7dnbe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7dnhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5dnkpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5dnkpc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5dnbe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5dnhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnhnc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnhnc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnktc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnktc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnbe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnbe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3dnke_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3dnke:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7cjysal:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7pjyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7bnhxg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7bnhxg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7bnkq_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7bnkq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3bnhxf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3bnhxf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnhxf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnhxf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnkp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3bnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3bnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7bnb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7bnb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3bnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3bnhx1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i3bnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i3bnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnhx1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i5bnk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i5bnk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7bnh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7bnh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc7i7bnhx1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc7i7bnhx1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6cayh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6cayh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:de3815tykhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:de3815tykhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5cpyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5cpyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5pgyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5pgyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5ppyh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5ppyh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3ryh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3ryhs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3ryhs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3ryhsn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3ryhsn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3ryk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3ryk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i5ryh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i5ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i5ryhs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i5ryhs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i5ryk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i5ryk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i7ryh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i7ryh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i5mybe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i5mybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i5myhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i5myhe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3mybe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3mybe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc5i3myhe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc5i3myhe:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
GHSA-6xx7-89q7-8hw4 | Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file. | [] | null | null | null | null |
|
CVE-2025-24242 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information. | [] | null | 4.4 | null | null |
|
CVE-2020-8887 | Telestream Tektronix Medius before 10.7.5 and Sentry before 10.7.5 have a SQL injection vulnerability allowing an unauthenticated attacker to dump database contents via the page parameter in a page=login request to index.php (aka the server login page). | [
"cpe:2.3:a:telestream:medius:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telestream:sentry:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-72r5-8cg4-8h5f | SQL injection vulnerability in /SASStudio/sasexec/sessions/{sessionID}/sql in SAS Studio 9.4 allows remote attacker to execute arbitrary SQL commands via the POST body request. | [] | null | 8.8 | null | null |
|
CVE-2025-32863 | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. | [] | 8.7 | 8.8 | null | null |
|
GHSA-gpp7-gqhm-5827 | A vulnerability was found in the search-api container in Red Hat Advanced Cluster Management for Kubernetes when a query in the search filter gets parsed by the backend. This flaw allows an attacker to craft specific strings containing special characters that lead to crashing the pod and affects system availability while restarting. | [] | null | 6.5 | null | null |
|
GHSA-v99j-m2v5-3c7x | A SQL injection vulnerability in zzzphp v1.8.0 through /form/index.php?module=getjson may lead to a possible access restriction bypass. | [] | null | null | null | null |
|
CVE-2024-23715 | In PMRWritePMPageList of pmr.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2021-0416 | In memory management driver, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05336700. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2010-4963 | SQL injection vulnerability in folder/list in Hulihan BXR 0.6.8 allows remote attackers to execute arbitrary SQL commands via the order_by parameter. | [
"cpe:2.3:a:hulihanapplications:hulihan_bxr:0.6.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4w93-8hmg-4r2c | Directory traversal vulnerability in getfile.asp in Ultimate HelpDesk allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter. | [] | null | null | null | null |
|
CVE-2022-22722 | A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101) | [
"cpe:2.3:o:schneider-electric:easergy_p5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_p5:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5.4 |
|
CVE-2017-1002021 | Vulnerability in wordpress plugin surveys v1.01.8, The code in individual_responses.php does not sanitize the survey_id variable before placing it inside of an SQL query. | [
"cpe:2.3:a:surveys_project:surveys:1.01.8:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2014-8536 | McAfee Network Data Loss Prevention (NDLP) before 9.2.2 allows local users to obtain sensitive information by reading unspecified error messages. | [
"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:network_data_loss_prevention:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2013-3889 | Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:x86:*:*",
"cpe:2.3:a:microsoft:excel:2013:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2013:*:*:*:*:x86:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2011:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_2013_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2024:1911 | Red Hat Security Advisory: firefox security update | Mozilla: Permission prompt input delay could expire when not in focus Mozilla: Denial of Service using HTTP/2 CONTINUATION frames Mozilla: GetBoundName in the JIT returned the wrong object Mozilla: Out-of-bounds-read after mis-optimized switch statement Mozilla: Incorrect JITting of arguments led to use-after-free during garbage collection Mozilla: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer Mozilla: Potential use-after-free due to AlignedBuffer self-move Mozilla: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 7.5 | null | null |
CVE-2018-1114 | It was found that URLResource.getLastModified() in Undertow closes the file descriptors only when they are finalized which can cause file descriptors to exhaust. This leads to a file handler leak. | [
"cpe:2.3:a:redhat:undertow:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
GHSA-hp4x-r8hj-mqj6 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] | null | null | 3.7 | null |
|
CVE-2024-22385 | File and Directory Permission Vulnerability in Hitachi Storage Provider for VMware vCenter | Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4. | [] | null | 4.4 | null | null |
CVE-2023-2268 | Plane v0.7.1 - Unauthorized access to files | Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users. | [
"cpe:2.3:a:plane:plane:0.7.1:*:*:*:*:*:*:*"
] | null | 7.1 | null | null |
CVE-2024-45944 | In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution. | [
"cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2023-2111 | HollerBox < 2.1.4 - Admin+ SQL Injection | The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database. | [
"cpe:2.3:a:groundhogg:hollerbox:*:*:*:*:*:wordpress:*:*"
] | null | 4.9 | null | null |
GHSA-chrg-5pr2-gqgj | In the reference implementation of FUSE before 2.9.8 and 3.x before 3.2.5, local attackers were able to specify the allow_other option even if forbidden in /etc/fuse.conf, leading to exposure of FUSE filesystems to other users. This issue only affects systems with SELinux active. | [] | null | null | null | null |
|
CVE-2009-1775 | Multiple cross-site scripting (XSS) vulnerabilities in Ulteo Open Virtual Desktop 1.0 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) admin/applications.php, (2) admin/appsgroup.php, (3) admin/users.php, (4) admin/usersgroup.php, and (5) admin/tasks.php; (6) show parameter to admin/logs.php; and (7) mode parameter to admin/configuration-partial.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:ulteo:open_virtual_desktop:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-vmhp-cggp-f572 | In CMS Made Simple (CMSMS) through 2.2.7, the "file rename" operation in the admin dashboard contains a sensitive information disclosure vulnerability, exploitable by an admin user, that can cause DoS by moving config.php to the upload/ directory. | [] | null | null | 6.5 | null |
|
CVE-2021-30114 | Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege. | [
"cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-27cf-pw5g-62cx | Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tsp.dll or tvttsp.dll that is located in the same folder as a .p12, .pem, .pgp, .prk, .prvkr, .pubkr, .rnd, or .skr file. | [] | null | null | null | null |
|
CVE-2022-49607 | perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() | In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()
Yang Jihing reported a race between perf_event_set_output() and
perf_mmap_close():
CPU1 CPU2
perf_mmap_close(e2)
if (atomic_dec_and_test(&e2->rb->mmap_count)) // 1 - > 0
detach_rest = true
ioctl(e1, IOC_SET_OUTPUT, e2)
perf_event_set_output(e1, e2)
...
list_for_each_entry_rcu(e, &e2->rb->event_list, rb_entry)
ring_buffer_attach(e, NULL);
// e1 isn't yet added and
// therefore not detached
ring_buffer_attach(e1, e2->rb)
list_add_rcu(&e1->rb_entry,
&e2->rb->event_list)
After this; e1 is attached to an unmapped rb and a subsequent
perf_mmap() will loop forever more:
again:
mutex_lock(&e->mmap_mutex);
if (event->rb) {
...
if (!atomic_inc_not_zero(&e->rb->mmap_count)) {
...
mutex_unlock(&e->mmap_mutex);
goto again;
}
}
The loop in perf_mmap_close() holds e2->mmap_mutex, while the attach
in perf_event_set_output() holds e1->mmap_mutex. As such there is no
serialization to avoid this race.
Change perf_event_set_output() to take both e1->mmap_mutex and
e2->mmap_mutex to alleviate that problem. Additionally, have the loop
in perf_mmap() detach the rb directly, this avoids having to wait for
the concurrent perf_mmap_close() to get around to doing it to make
progress. | [] | null | 4.7 | null | null |
CVE-2009-2408 | Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] | null | 5.9 | null | 6.8 |
|
GHSA-p786-v2xq-fcfr | IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 db2fm is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 193661. | [] | null | null | null | null |
|
GHSA-jpwr-2mxg-6vpf | An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. | [] | null | 9.8 | null | null |
|
cisco-sa-iosxr-dhcp-dos-3tgPKRdm | Cisco IOS XR Software DHCP Version 4 Server Denial of Service Vulnerability | A vulnerability in the DHCP version 4 (DHCPv4) server feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to trigger a crash of the dhcpd process, resulting in a denial of service (DoS) condition.
This vulnerability exists because certain DHCPv4 messages are improperly validated when they are processed by an affected device. An attacker could exploit this vulnerability by sending a malformed DHCPv4 message to an affected device. A successful exploit could allow the attacker to cause a crash of the dhcpd process. While the dhcpd process is restarting, which may take approximately two minutes, DHCPv4 server services are unavailable on the affected device. This could temporarily prevent network access to clients that join the network during that time period and rely on the DHCPv4 server of the affected device.
Notes:
Only the dhcpd process crashes and eventually restarts automatically. The router does not reload.
This vulnerability only applies to DHCPv4. DHCP version 6 (DHCPv6) is not affected.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75299"]. | [] | null | 5.3 | null | null |
GHSA-3gvr-wc48-xw73 | The Multilevel Referral Affiliate Plugin for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.27 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 6.5 | null | null |
|
CVE-2000-1126 | Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service. | [
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.4:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-c26p-5f2j-p2gv | A buffer overflow in the RecvSocketData function of Inovance HCPLC_AM401-CPU1608TPTN 21.38.0.0, HCPLC_AM402-CPU1608TPTN 41.38.0.0, and HCPLC_AM403-CPU1608TN 81.38.0.0 allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted Modbus message. | [] | null | 6.5 | null | null |
|
PYSEC-2021-170 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.