id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2007-0111 | Buffer overflow in Resco Photo Viewer for PocketPC 4.11 and 6.01, as used in mobile devices running Windows Mobile 5.0, 2003, and 2003SE, allows remote attackers to execute arbitrary code via a crafted PNG image. | [
"cpe:2.3:a:resco:photo_viewer:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:resco:photo_viewer:6.11:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-w8pp-vvm7-4qqr | An issue was discovered in Mattermost Desktop App before 4.4.0. The Same Origin Policy is mishandled during access-control decisions for web APIs, aka MMSA-2020-0006. | [] | null | null | null | null |
|
CVE-2014-9203 | Buffer overflow in the Field Device Tool (FDT) Frame application in the HART Device Type Manager (DTM) library, as used in MACTek Bullet DTM 1.00.0, GE Vector DTM 1.00.0, GE SVi1000 Positioner DTM 1.00.0, GE SVI II AP Positioner DTM 2.00.1, and GE 12400 Level Transmitter DTM 1.00.0, allows remote attackers to cause a denial of service (DTM outage) via crafted packets. | [
"cpe:2.3:a:ge:12400_level_transmitter_device_type_manager:1.00.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:svi_ii_ap_positioner_device_type_manager:2.00.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ge:vector_device_type_manager:1.00.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mactek:bullet_device_type_manager:1.00.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-7644-j7jq-m5v9 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35794. | [] | null | 8.1 | null | null |
|
CVE-2006-3020 | Multiple cross-site scripting (XSS) vulnerabilities in FullPhoto.asp in WS-Album 1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) image and (2) PublisedDate parameters. | [
"cpe:2.3:a:planete_afrique:ws-album:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2008-7312 | The Filtering Service in Websense Enterprise 5.2 through 6.3 does not consider the IP address during URL categorization, which makes it easier for remote attackers to bypass filtering via an HTTP request, as demonstrated by a request to a compromised server associated with a specific IP address. | [
"cpe:2.3:a:websense:enterprise:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:websense:enterprise:6.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-6587-ppvj-ch5c | SQL injection vulnerability in includes/core.inc.php in ODFaq 2.1.0 allows remote attackers to execute arbitrary SQL commands via the (1) cat and (2) srcText parameters to faq.php. | [] | null | null | null | null |
|
CVE-2021-40408 | An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->username variable, that has the value of the userName parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. | [
"cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*",
"cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
|
GHSA-p7x3-54m2-2976 | Cross-site scripting (XSS) vulnerability in admin/login.php in Sticky Notes 0.3.09062012.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the username parameter. | [] | null | null | null | null |
|
GHSA-6pv9-8vp3-8q9q | A sandboxing issue in Odoo Community 15.0 and Odoo Enterprise 15.0 allows authenticated administrators to executed arbitrary code, leading to privilege escalation. | [] | null | null | 8.7 | null |
|
GHSA-hfqx-26hm-hmgj | Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access. | [] | null | null | 6.5 | null |
|
CVE-2019-15362 | The Lava Iris 88 Go Android device with a build fingerprint of LAVA/iris88_go/iris88_go:8.1.0/O11019/1538188945:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [
"cpe:2.3:o:lavamobiles:iris_88_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lavamobiles:iris_88:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2008-1194 | Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors. | [
"cpe:2.3:a:sun:jdk:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-25240 | An improper SameSite Attribute vulnerability in pimCore v10.5.15 allows attackers to execute arbitrary code. | [
"cpe:2.3:a:pimcore:pimcore:10.5.15:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2007-3838 | Cross-site scripting (XSS) vulnerability in takeprofedit.php in TBDev.NET DR 11-10-05-BETA-SF1:111005 and earlier allows remote attackers to inject arbitrary web script or HTML via the SRC attribute of a SCRIPT element in the avatar parameter. NOTE: this may be related to the tracker program in the Janitor package. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:tbdev.net:dr:11-10-05-beta-sf1_1:*:*:*:*:*:*:*",
"cpe:2.3:a:tbdev.net:dr:16-12-05-beta-1_161:*:*:*:*:*:*:*",
"cpe:2.3:a:tbdev.net:dr:010306:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2006-6975 | PHP remote file inclusion vulnerability in centipaid_class.php in CentiPaid 1.4.3 allows remote attackers to execute arbitrary code via a URL in the class_pwd parameter. NOTE: this issue has been disputed by CVE and multiple third parties, who state that $class_pwd is set to a static value before the relevant include statement | [
"cpe:2.3:a:centipaid:centipaid:1.4.3:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5.1 |
|
GHSA-m42q-f292-m7wq | In adjustStreamVolume of AudioService.java, there is a possible way for unprivileged app to change audio stream volume due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-189857506 | [] | null | null | null | null |
|
GHSA-3pjc-4g34-p4r8 | Unknown vulnerability in mail for Solaris 2.6 through 9 allows local users to read the email of other users. | [] | null | null | null | null |
|
GHSA-r3cx-42vx-5v5p | Location Framework in Apple iOS before 8.4.1 allows local users to bypass intended restrictions on filesystem modification via a symlink. | [] | null | null | null | null |
|
CVE-2017-12185 | xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-q867-5773-cmf9 | Multiple cross-site scripting (XSS) vulnerabilities in PHP Live! 3.2.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) search_string parameter in (a) setup/transcripts.php, the (2) l parameter in (b) index.php, the (3) login field in (c) phplive/index.php, and the (4) deptid and (5) x parameters in (d) phplive/message_box.php. | [] | null | null | null | null |
|
CVE-2009-0461 | Whole Hog Password Protect: Enhanced 1.x allows remote attackers to bypass authentication and obtain administrative access via an integer value in the adminid cookie. | [
"cpe:2.3:a:wholehogsoftware:password_protect:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2023:5206 | Red Hat Security Advisory: RHACS 4.2 enhancement and security update | stackrox: Missing HTTP security headers allows for clickjacking in web UI | [
"cpe:/a:redhat:advanced_cluster_security:4.2::el8"
] | null | 6.1 | null | null |
GHSA-8ghq-86mh-wh98 | SeaCMS 6.61 has stored XSS in admin_collect.php via the siteurl parameter. | [] | null | null | 6.1 | null |
|
CVE-2023-6632 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via DOM in all versions up to and including 3.9.1.1 (versions up to 2.9.1.1 in Happy Addons for Elementor Pro) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:pro:wordpress:*:*"
] | null | 6.1 | null | null |
|
GHSA-r892-94gp-v735 | An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consumption of resources, ultimately resulting in a Denial of Service (DoS).When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the Routing Engine (RE), rather than being handled appropriately. Continuous receipt of these MPLS packets causes resources to be exhausted. MPLS config is not required to be affected by this issue.This issue affects Junos OS Evolved ACX 7000 Series:All versions before 21.4R3-S9-EVO,22.2-EVO before 22.2R3-S4-EVO,22.3-EVO before 22.3R3-S3-EVO,22.4-EVO before 22.4R3-S2-EVO,23.2-EVO before 23.2R2-EVO,23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO. | [] | 7.7 | 8.2 | null | null |
|
GHSA-5x8p-x36c-4gwr | CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE. | [] | null | 7.5 | null | null |
|
GHSA-p8r9-jrq7-f9j3 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. Crafted data in a DCM file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-15098. | [] | null | null | null | null |
|
CVE-2022-20422 | In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7 | null | null |
|
CVE-2020-12926 | The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device. | [
"cpe:2.3:a:amd:trusted_platform_modules_reference:-:*:*:*:*:*:*:*"
] | null | 6.4 | null | 4.4 |
|
GHSA-rqfx-p88v-f7ff | Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via gmalloc in gmem.cc | [] | null | null | null | null |
|
CVE-2021-33469 | COVID19 Testing Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the "Admin name" parameter. | [
"cpe:2.3:a:phpgurukul:covid19_testing_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2022-25656 | Possible integer overflow and memory corruption due to improper validation of buffer size sent to write to console when computing the payload size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
|
CVE-2022-0954 | Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in microweber/microweber | Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11. | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null |
CVE-2024-43756 | Photoshop Desktop | Heap-based Buffer Overflow (CWE-122) | Photoshop Desktop versions 24.7.4, 25.11 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-hfx5-8g8x-xrp8 | Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4.3.0.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Essbase accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N). | [] | null | 2.2 | null | null |
|
CVE-2008-3243 | Multiple unspecified vulnerabilities in the scanning engine before 4.4.4 in F-Prot Antivirus before 6.0.9.0 allow remote attackers to cause a denial of service via (1) a crafted UPX-compressed file, which triggers an engine crash; (2) a crafted Microsoft Office file, which triggers an infinite loop; or (3) an ASPack-compressed file, which triggers an engine crash. | [
"cpe:2.3:a:f-prot:f-prot_antivirus:3.11b:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.12a:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.12b:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.12c:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.12d:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.13a:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14a:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14b:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14c:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14d:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.14e:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.15a:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.15b:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16a:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16b:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16c:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16d:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16e:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:3.16f:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:f-prot_antivirus:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:f-prot:scanning_engine:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2008-7217 | Microsoft Office 2008 for Mac, when running on Macintosh systems that restrict Office access to administrators, does not enforce this restriction for user ID 502, which allows local users with that ID to bypass intended security policy and access Office programs, related to permissions and ownership for certain directories. | [
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-q59q-2whf-h2x9 | WordPress before 4.5.3 allows remote attackers to bypass intended password-change restrictions by leveraging knowledge of a cookie. | [] | null | null | 7.5 | null |
|
CVE-2014-4619 | EMC RSA Identity Management and Governance (IMG) 6.5.x before 6.5.1 P11, 6.5.2 before P02HF01, and 6.8.x before 6.8.1 P07, when Novell Identity Manager (aka NovellIM) is used, allows remote attackers to bypass authentication via an arbitrary valid username. | [
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_identity_management_and_governance:6.8.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2002-1737 | Astaro Security Linux 2.016 creates world-writable files and directories, which allows local users to overwrite arbitrary files. | [
"cpe:2.3:o:astaro:security_linux:2.01:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2007-3232 | The IBM TotalStorage DS400 with firmware 4.15 uses a blank password for the (1) root, (2) user, (3) manager, (4) administrator, and (5) operator accounts, which allows remote attackers to gain login access via certain Linux daemons, including a telnet daemon on a nonstandard port, tcp/6000. | [
"cpe:2.3:h:ibm:totalstorage_ds400:4.15:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2015-2662 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect availability via vectors related to DHCP Server. | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
CVE-2024-37021 | fpga: manager: add owner module and take its refcount | In the Linux kernel, the following vulnerability has been resolved:
fpga: manager: add owner module and take its refcount
The current implementation of the fpga manager assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the manager if
the parent device does not have a driver.
To address this problem, add a module owner pointer to the fpga_manager
struct and use it to take the module's refcount. Modify the functions for
registering the manager to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the manager as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a manager without setting the owner.
Also, update the documentation to keep it consistent with the new interface
for registering an fpga manager.
Other changes: opportunistically move put_device() from __fpga_mgr_get() to
fpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the
manager device is taken in these functions. | [] | null | 5.5 | null | null |
GHSA-7hxv-5pvm-4mww | Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value. | [] | null | null | null | null |
|
CVE-2024-24417 | The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_protocol_configuration_options function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet. | [] | null | 7.5 | null | null |
|
GHSA-rwj7-6838-wfrj | Projectworlds Visitor Management System in PHP 1.0 allows SQL Injection. The file front.php does not perform input validation on the 'rid' parameter. An attacker can append SQL queries to the input to extract sensitive information from the database. | [] | null | null | null | null |
|
CVE-2023-50026 | SQL injection vulnerability in Presta Monster "Multi Accessories Pro" (hsmultiaccessoriespro) module for PrestaShop versions 5.1.1 and before, allows remote attackers to escalate privileges and obtain sensitive information via the method HsAccessoriesGroupProductAbstract::getAccessoriesByIdProducts(). | [
"cpe:2.3:a:prestamonster:multi_accessories_pro:*:*:*:*:*:prestashop:*:*"
] | null | 9.8 | null | null |
|
GHSA-7vm3-67hm-9frc | xzs-mysql >= t3.4.0 is vulnerable to Insecure Permissions. The front end of this open source system is an online examination system. There is an unsafe vulnerability in the functional method of submitting examination papers. An attacker can use burpuite to modify parameters in the packet to destroy real data. | [] | null | null | null | null |
|
CVE-2023-52262 | outdoorbits little-backup-box (aka Little Backup Box) before f39f91c allows remote attackers to execute arbitrary code because the PHP extract function is used for untrusted input. | [
"cpe:2.3:a:outdoorbits:little_backup_box:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-fwm3-rx8m-qmv5 | ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet. | [] | null | null | 5.9 | null |
|
CVE-2009-3012 | Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre does not properly block data: URIs in Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header. NOTE: the JavaScript executes outside of the context of the HTTP site. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:a1_pre:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.7:a1_pre:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3r84-hhrv-2935 | In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 7.8 | null | null |
|
CVE-2023-27443 | WordPress Simple Vimeo Shortcode Plugin <= 2.9.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Grant Kimball Simple Vimeo Shortcode plugin <= 2.9.1 versions. | [
"cpe:2.3:a:simple_vimeo_shortcode_project:simple_vimeo_shortcode:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
GHSA-5v4m-rq7q-2xcf | Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests. | [] | null | null | null | null |
|
GHSA-468v-hjgx-r39h | game-music-emu before 0.6.1 mishandles unspecified integer values. | [] | null | null | 9.8 | null |
|
RHSA-2023:7782 | Red Hat Security Advisory: linux-firmware security update | amd: Return Address Predictor vulnerability leading to information disclosure hw: amd: Cross-Process Information Leak | [
"cpe:/o:redhat:rhel_aus:7.6::server"
] | null | 6.5 | null | null |
CVE-2014-6476 | Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6527. | [
"cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update_67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update_20:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-3wjv-m5rx-86vp | Session fixation vulnerability in Red Hat Network (RHN) Satellite Server 5.4 allows remote attackers to hijack web sessions via unspecified vectors related to Spacewalk. | [] | null | null | null | null |
|
CVE-2024-26588 | LoongArch: BPF: Prevent out-of-bounds memory access | In the Linux kernel, the following vulnerability has been resolved:
LoongArch: BPF: Prevent out-of-bounds memory access
The test_tag test triggers an unhandled page fault:
# ./test_tag
[ 130.640218] CPU 0 Unable to handle kernel paging request at virtual address ffff80001b898004, era == 9000000003137f7c, ra == 9000000003139e70
[ 130.640501] Oops[#3]:
[ 130.640553] CPU: 0 PID: 1326 Comm: test_tag Tainted: G D O 6.7.0-rc4-loong-devel-gb62ab1a397cf #47 61985c1d94084daa2432f771daa45b56b10d8d2a
[ 130.640764] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022
[ 130.640874] pc 9000000003137f7c ra 9000000003139e70 tp 9000000104cb4000 sp 9000000104cb7a40
[ 130.641001] a0 ffff80001b894000 a1 ffff80001b897ff8 a2 000000006ba210be a3 0000000000000000
[ 130.641128] a4 000000006ba210be a5 00000000000000f1 a6 00000000000000b3 a7 0000000000000000
[ 130.641256] t0 0000000000000000 t1 00000000000007f6 t2 0000000000000000 t3 9000000004091b70
[ 130.641387] t4 000000006ba210be t5 0000000000000004 t6 fffffffffffffff0 t7 90000000040913e0
[ 130.641512] t8 0000000000000005 u0 0000000000000dc0 s9 0000000000000009 s0 9000000104cb7ae0
[ 130.641641] s1 00000000000007f6 s2 0000000000000009 s3 0000000000000095 s4 0000000000000000
[ 130.641771] s5 ffff80001b894000 s6 ffff80001b897fb0 s7 9000000004090c50 s8 0000000000000000
[ 130.641900] ra: 9000000003139e70 build_body+0x1fcc/0x4988
[ 130.642007] ERA: 9000000003137f7c build_body+0xd8/0x4988
[ 130.642112] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
[ 130.642261] PRMD: 00000004 (PPLV0 +PIE -PWE)
[ 130.642353] EUEN: 00000003 (+FPE +SXE -ASXE -BTE)
[ 130.642458] ECFG: 00071c1c (LIE=2-4,10-12 VS=7)
[ 130.642554] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
[ 130.642658] BADV: ffff80001b898004
[ 130.642719] PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)
[ 130.642815] Modules linked in: [last unloaded: bpf_testmod(O)]
[ 130.642924] Process test_tag (pid: 1326, threadinfo=00000000f7f4015f, task=000000006499f9fd)
[ 130.643062] Stack : 0000000000000000 9000000003380724 0000000000000000 0000000104cb7be8
[ 130.643213] 0000000000000000 25af8d9b6e600558 9000000106250ea0 9000000104cb7ae0
[ 130.643378] 0000000000000000 0000000000000000 9000000104cb7be8 90000000049f6000
[ 130.643538] 0000000000000090 9000000106250ea0 ffff80001b894000 ffff80001b894000
[ 130.643685] 00007ffffb917790 900000000313ca94 0000000000000000 0000000000000000
[ 130.643831] ffff80001b894000 0000000000000ff7 0000000000000000 9000000100468000
[ 130.643983] 0000000000000000 0000000000000000 0000000000000040 25af8d9b6e600558
[ 130.644131] 0000000000000bb7 ffff80001b894048 0000000000000000 0000000000000000
[ 130.644276] 9000000104cb7be8 90000000049f6000 0000000000000090 9000000104cb7bdc
[ 130.644423] ffff80001b894000 0000000000000000 00007ffffb917790 90000000032acfb0
[ 130.644572] ...
[ 130.644629] Call Trace:
[ 130.644641] [<9000000003137f7c>] build_body+0xd8/0x4988
[ 130.644785] [<900000000313ca94>] bpf_int_jit_compile+0x228/0x4ec
[ 130.644891] [<90000000032acfb0>] bpf_prog_select_runtime+0x158/0x1b0
[ 130.645003] [<90000000032b3504>] bpf_prog_load+0x760/0xb44
[ 130.645089] [<90000000032b6744>] __sys_bpf+0xbb8/0x2588
[ 130.645175] [<90000000032b8388>] sys_bpf+0x20/0x2c
[ 130.645259] [<9000000003f6ab38>] do_syscall+0x7c/0x94
[ 130.645369] [<9000000003121c5c>] handle_syscall+0xbc/0x158
[ 130.645507]
[ 130.645539] Code: 380839f6 380831f9 28412bae <24000ca6> 004081ad 0014cb50 004083e8 02bff34c 58008e91
[ 130.645729]
[ 130.646418] ---[ end trace 0000000000000000 ]---
On my machine, which has CONFIG_PAGE_SIZE_16KB=y, the test failed at
loading a BPF prog with 2039 instructions:
prog = (struct bpf_prog *)ffff80001b894000
insn = (struct bpf_insn *)(prog->insnsi)fff
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-9r55-2wr2-74c5 | An elevation of privilege exists in hdAudio.sys which may lead to an out of band write, aka 'Windows Media Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
cisco-sa-vim-privesc-T2tsFUf | Cisco Virtualized Infrastructure Manager Privilege Escalation Vulnerability | A vulnerability in the configuration file protections of Cisco Virtualized Infrastructure Manager (VIM) could allow an authenticated, local attacker to access confidential information and elevate privileges on an affected device.
This vulnerability is due to improper access permissions for certain configuration files. An attacker with low-privileged credentials could exploit this vulnerability by accessing an affected device and reading the affected configuration files. A successful exploit could allow the attacker to obtain internal database credentials, which the attacker could use to view and modify the contents of the database. The attacker could use this access to the database to elevate privileges on the affected device.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
| [] | null | 7.8 | null | null |
CVE-2016-0032 | Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 PS1, 2013 Cumulative Update 10, 2013 Cumulative Update 11, and 2016 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Exchange Spoofing Vulnerability." | [
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_10:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_11:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2013-4779 | Cross-site scripting (XSS) vulnerability in core/handleTw.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:siemens:openscape_session_border_controller:1r4.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:openscape_session_border_controller:7r.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:enterprise_openscape_branch:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-47372 | net: macb: fix use after free on rmmod | In the Linux kernel, the following vulnerability has been resolved:
net: macb: fix use after free on rmmod
plat_dev->dev->platform_data is released by platform_device_unregister(),
use of pclk and hclk is a use-after-free. Since device unregister won't
need a clk device we adjust the function call sequence to fix this issue.
[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]
[ 31.275563] Freed by task 306:
[ 30.276782] platform_device_release+0x25/0x80 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2019-9676 | Buffer overflow vulnerability found in some Dahua IP Camera devices IPC-HFW1XXX,IPC-HDW1XXX,IPC-HFW2XXX Build before 2018/11. The vulnerability exits in the function of redirection display for serial port printing information, which can not be used by product basic functions. After an attacker logs in locally, this vulnerability can be exploited to cause device restart or arbitrary code execution. Dahua has identified the corresponding security problems in the static code auditing process, so it has gradually deleted this function, which is no longer available in the newer devices and softwares. Dahua has released versions of the affected products to fix the vulnerability. | [
"cpe:2.3:o:dahuasecurity:ipc-hfw1xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hfw1xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hdw1xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hdw1xxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:ipc-hfw2xxx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:ipc-hfw2xxx:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2014-2167 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCua86589. | [
"cpe:2.3:a:cisco:telepresence_tc_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_te_software:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_te_software:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_te_software:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_te_software:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_te_software:6.0:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-55fp-6c46-gr3x | The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg2000 file. | [] | null | null | 5.5 | null |
|
GHSA-8hxm-42v5-66hm | Multiple cross-site request forgery (CSRF) vulnerabilities in mod/wiki/ components in Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allow remote attackers to hijack the authentication of arbitrary users for requests that modify wiki data. | [] | null | null | null | null |
|
CVE-2022-39270 | Arbitrary HTML injection in table-of-contents theme component in DiscoTOC | DiscoTOC is a Discourse theme component that generates a table of contents for topics. Users that can create topics in TOC-enabled categories (and have sufficient trust level - configured in component's settings) are able to inject arbitrary HTML on that topic's page. The issue has been fixed on the `main` branch. Admins can update the theme component through the admin UI (Customize -> Themes -> Components -> DiscoTOC -> Check for Updates). Alternatively, admins can temporarily disable the DiscoTOC theme component. | [
"cpe:2.3:a:discourse:discotoc:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-95jq-gqgr-vj74 | Unspecified vulnerability in Dell Remote Access Card 4 (DRAC4) with firmware 1.50 Build 02.16 allows remote attackers to cause a denial of service (SSH daemon crash) via certain network traffic, as demonstrated by an "nmap -O" scan with nmap 4.03, possibly related to a Mocana (Mocanada) SSH vulnerability. | [] | null | null | null | null |
|
GHSA-f83v-8qph-hgj6 | The Notification WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/classes/Utils/Settings.php file which made it possible for attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 7.2.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | [] | null | null | null | null |
|
CVE-2020-1929 | The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code running in the same JVM. | [
"cpe:2.3:a:apache:beam:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2011-2462 | Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
RHSA-2024:7103 | Red Hat Security Advisory: grafana-pcp security update | encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2024:3473 | Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update | axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:container_native_virtualization:4.14::el9"
] | null | 6.5 | null | null |
GHSA-mg6c-vwvq-75r2 | The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER['REQUEST_URI'] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below. | [] | null | 6.1 | null | null |
|
CVE-2018-8208 | An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214. | [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] | null | null | 7 | 6.9 |
|
GHSA-vrf2-xvjf-2888 | Foxit PDF Editor Square Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14360. | [] | null | null | 7.8 | null |
|
CVE-2022-34383 | Dell Edge Gateway 5200 (EGW) versions before 1.03.10 contain an operating system command injection vulnerability. A local malicious user may potentially exploit this vulnerability by using an SMI to bypass PMC mitigation and gain arbitrary code execution during SMM. | [
"cpe:2.3:o:dell:edge_gateway_5200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:edge_gateway_5200:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2023-5868 | Postgresql: memory disclosure in aggregate function calls | A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory. | [
"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6_aarch64:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.0_aarch64:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:/a:redhat:advanced_cluster_security:4.2::el8",
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_software_collections:3::el7",
"cpe:/a:redhat:advanced_cluster_security:3.74::el8",
"cpe:/a:redhat:advanced_cluster_security:4.1::el8",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:/a:redhat:rhel_software_collections:3"
] | null | 4.3 | null | null |
GHSA-c5w2-4jcq-rvf5 | Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules. | [] | null | null | 7.5 | null |
|
CVE-2023-42063 | PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20943. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.5.368.0:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
GHSA-3rvv-226f-xrr5 | Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson WP GoToWebinar allows Cross-Site Scripting (XSS).This issue affects WP GoToWebinar: from n/a through 15.7. | [] | null | 7.1 | null | null |
|
GHSA-m864-4qhx-m5pj | An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0867. | [] | null | null | null | null |
|
CVE-2009-3375 | content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
ICSA-21-194-17 | Siemens SINUMERIK ONE and SINUMERIK MC (Update A) | Affected devices are vulnerable to a memory protection bypass through a specific operation.
A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks. | [] | null | 8.1 | null | null |
GHSA-w4w9-rwjc-mvgm | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list. | [] | null | 6.1 | null | null |
|
GHSA-j2m3-6m57-7jjv | The tooltip manager (chrome/views/tooltip_manager.cc) in Google Chrome 0.2.149.29 Build 1798 and possibly other versions before 0.2.149.30 allows remote attackers to cause a denial of service (CPU consumption or crash) via a tag with a long title attribute, which is not properly handled when displaying a tooltip, a different vulnerability than CVE-2008-6994. NOTE: there is inconsistent information about the environments under which this issue exists. | [] | null | null | null | null |
|
GHSA-wcf5-qfp2-773g | FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object. | [] | null | null | null | null |
|
CVE-2012-5110 | The compositor in Google Chrome before 22.0.1229.92 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.89:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-434v-9hrw-chfc | Cross-Site Request Forgery (CSRF) vulnerability in BracketSpace Simple Post Notes.This issue affects Simple Post Notes: from n/a through 1.7.6. | [] | null | 4.3 | null | null |
|
GHSA-6wh4-77gr-x4gj | Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet. | [] | null | null | null | null |
|
GHSA-v3jq-qw95-xr88 | The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a denial of service (CPU consumption) via XML attributes in a crafted XML document. | [] | null | null | null | null |
|
CVE-2024-55099 | A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter. | [] | null | 9.8 | null | null |
|
GHSA-v479-fx8q-4c3m | Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when sending specific crafted IPV4 packet to the controller: Sending a specific IPv4 protocol package to Schneider Electric Modicon M218 Logic Controller can cause IPv4 devices to go down. The device does not work properly and must be powered back on to return to normal. | [] | null | null | null | null |
|
GHSA-rj3q-w987-rh94 | Microsoft Dynamics GP Elevation Of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23271, CVE-2022-23272. | [] | null | 7.1 | null | null |
|
CVE-2020-24827 | A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | [
"cpe:2.3:a:libelfin_project:libelfin:0.3:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-hmf4-wxg4-957f | Cross-site Scripting (XSS) - DOM in GitHub repository langchain-ai/chat-langchain prior to 0.0.0. | [] | null | null | 4.6 | null |
|
GHSA-hgwr-gpf8-663p | A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [] | null | 7.2 | null | null |
Subsets and Splits