id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2013:0249 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0 CP10 security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4",
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
] | null | null | null | null |
GHSA-pj4x-5742-w9p8 | Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 9.0, 9.1, 9.2.3, 10.0.1, and 10.3 allows remote attackers to affect integrity, related to WLS Console. | [] | null | null | null | null |
|
CVE-2006-5334 | Unspecified vulnerability in Oracle Spatial component in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 has unknown impact and remote authenticated attack vectors related to mdsys.md2, aka Vuln# DB03. NOTE: as of 20061023, Oracle has not disputed reports from reliable third parties that DB03 is related to one or more of (1) a buffer overflow in the (a) RELATE function or (2) SQL injection in the (b) TESSELATE_FIXED and (c) TESSELATE function. | [
"cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2019-9310 | In libFDK, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112891546 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2020-22819 | MKCMS V6.2 has SQL injection via the /ucenter/active.php verify parameter. | [
"cpe:2.3:a:mkcms_project:mkcms:6.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2024-12453 | Uptodown APK Download Widget <= 0.1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Uptodown APK Download Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'utd-widget' shortcode in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-j7m7-m8xx-ph22 | Memory leak in org.apache.jasper.runtime.JspWriterImpl.response in the JavaServer Pages (JSP) component in IBM WebSphere Application Server (WAS) before 7.0.0.15 allows remote attackers to cause a denial of service (memory consumption) by accessing a JSP page of an application that is repeatedly stopped and restarted. | [] | null | null | null | null |
|
CVE-2024-2484 | Orbit Fox by ThemeIsle <= 2.10.34 - Authenticated (Contributor+) Stored Cross-Site Scripting via Services and Post Type Grid Widgets | The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Services and Post Type Grid widgets in all versions up to, and including, 2.10.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
GHSA-rvgf-h7p5-vc4h | Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote attackers to execute arbitrary code via a long type 77 request. | [] | null | null | null | null |
|
CVE-1999-1052 | Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users. | [
"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-9562 | D-Link DIR-605L formSetWizard2 buffer overflow | A vulnerability classified as critical was found in D-Link DIR-605L 2.13B01 BETA. This vulnerability affects the function formSetWizard1/formSetWizard2. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 |
CVE-2013-0190 | The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2023-36871 | Azure Active Directory Security Feature Bypass Vulnerability | Azure Active Directory Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-mc9m-5hw4-g3g6 | A Server-Side Request Forgery (SSRF) vulnerability was discovered in gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability allows an attacker to construct a response link by saving the response in a folder named after the SHA-1 hash of the target URL. This enables the attacker to access the response directly, potentially leading to unauthorized access to internal systems, data theft, service disruption, or further attacks such as port scanning and accessing metadata endpoints. | [] | null | null | 6.5 | null |
|
CVE-2014-1292 | WebKit, as used in Apple iOS before 7.1 and Apple TV before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-2014-1293, and CVE-2014-1294. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-qvg3-8v2m-xhxm | Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2, 12.0.6, and 12.1.3 allows remote attackers to affect confidentiality via unknown vectors related to Autoconfig Templates. | [] | null | null | null | null |
|
RHSA-2024:7856 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null |
GHSA-2phr-4qpj-wc46 | Multiple unspecified vulnerabilities in SPIP before 1.9.2.o, 2.0.x before 2.0.18, and 2.1.x before 2.1.13 have unknown impact and attack vectors that are not related to cross-site scripting (XSS), different vulnerabilities than CVE-2012-2151. | [] | null | null | null | null |
|
GHSA-mx9m-hpp3-577c | IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. | [] | null | null | null | null |
|
GHSA-qxcw-72gh-mh4g | Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to Unix File System (UFS). | [] | null | null | null | null |
|
CVE-2020-17025 | Windows Remote Access Elevation of Privilege Vulnerability | Windows Remote Access Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
CVE-2025-24201 | An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.). | [] | null | 7.1 | null | null |
|
CVE-2023-43477 | Post-Auth Command Injection in Telstra Smart Modem Gen 2 (Arcadyan LH1000) | The ping_from parameter of ping_tracerte.cgi in the web UI of Telstra Smart Modem Gen 2 (Arcadyan LH1000), firmware versions < 0.18.15r, was not properly sanitized before being used in a system call, which could allow an authenticated attacker to achieve command injection as root on the device. | [
"cpe:2.3:h:telstra:arcadyan_lh1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telstra:arcadyan_lh1000_firmware:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
GHSA-j928-5x47-jv69 | SQL injection vulnerability in Vtiger CRM before 7.1.0 hotfix3 allows authenticated users to execute arbitrary SQL commands. | [] | null | 8.8 | null | null |
|
CVE-2017-8357 | In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.5-5:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-j2hp-7hfp-x96x | A vulnerability was found in code-projects Job Recruitment 1.0. It has been classified as problematic. Affected is the function fln_update of the file /_parse/_all_edits.php. The manipulation of the argument fname/lname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 4.3 | null | null |
|
GHSA-29pq-gr25-8674 | In the Linux kernel, the following vulnerability has been resolved:sysv: don't call sb_bread() with pointers_lock heldsyzbot is reporting sleep in atomic context in SysV filesystem [1], for
sb_bread() is called with rw_spinlock held.A "write_lock(&pointers_lock) => read_lock(&pointers_lock) deadlock" bug
and a "sb_bread() with write_lock(&pointers_lock)" bug were introduced by
"Replace BKL for chain locking with sysvfs-private rwlock" in Linux 2.5.12.Then, "[PATCH] err1-40: sysvfs locking fix" in Linux 2.6.8 fixed the
former bug by moving pointers_lock lock to the callers, but instead
introduced a "sb_bread() with read_lock(&pointers_lock)" bug (which made
this problem easier to hit).Al Viro suggested that why not to do like get_branch()/get_block()/
find_shared() in Minix filesystem does. And doing like that is almost a
revert of "[PATCH] err1-40: sysvfs locking fix" except that get_branch()
from with find_shared() is called without write_lock(&pointers_lock). | [] | null | 5.3 | null | null |
|
CVE-2016-0107 | Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0105, CVE-2016-0111, CVE-2016-0112, and CVE-2016-0113. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
RHSA-2024:4568 | Red Hat Security Advisory: java-17-openjdk security update | OpenJDK: potential UTF8 size overflow (8314794) OpenJDK: Excessive symbol length can lead to infinite loop (8319859) OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) OpenJDK: Out-of-bounds access in 2D image handling (8324559) OpenJDK: RangeCheckElimination array index overflow (8323231) | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.4 | null | null |
GHSA-c678-3r2p-7xm8 | Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle the printing of PDF documents, which allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a multi-page document. | [] | null | null | null | null |
|
CVE-2012-3426 | OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password. | [
"cpe:2.3:a:openstack:essex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:folsom-1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone:2012.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone:2012.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
RHSA-2020:3598 | Red Hat Security Advisory: kernel security and bug fix update | kernel: kernel: DAX hugepages not considered during mremap | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 7 | null | null |
GHSA-r56g-859f-3993 | Virtual servers in F5 BIG-IP systems 11.6.1 before 11.6.1 HF1 and 12.1.x before 12.1.2, when configured to parse RADIUS messages via an iRule, allow remote attackers to cause a denial of service (Traffic Management Microkernel restart) via crafted network traffic. | [] | null | null | 5.9 | null |
|
CVE-2020-6222 | SAP Business Objects Business Intelligence Platform (Web Intelligence HTML interface), versions 4.1, 4.2, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:sap:businessobjects_business_intelligence_platform:4.2:-:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2022-23074 | Recipes - Stored XSS in Name Parameter | In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover. | [
"cpe:2.3:a:tandoor:recipes:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
CVE-2021-40020 | There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-36926 | powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE | In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE
At the time of LPAR boot up, partition firmware provides Open Firmware
property ibm,dma-window for the PE. This property is provided on the PCI
bus the PE is attached to.
There are execptions where the partition firmware might not provide this
property for the PE at the time of LPAR boot up. One of the scenario is
where the firmware has frozen the PE due to some error condition. This
PE is frozen for 24 hours or unless the whole system is reinitialized.
Within this time frame, if the LPAR is booted, the frozen PE will be
presented to the LPAR but ibm,dma-window property could be missing.
Today, under these circumstances, the LPAR oopses with NULL pointer
dereference, when configuring the PCI bus the PE is attached to.
BUG: Kernel NULL pointer dereference on read at 0x000000c8
Faulting instruction address: 0xc0000000001024c0
Oops: Kernel access of bad area, sig: 7 [#1]
LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
Supported: Yes
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1
Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries
NIP: c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450
REGS: c0000000037db5c0 TRAP: 0300 Not tainted (6.4.0-150600.9-default)
MSR: 8000000002009033 <SF,VEC,EE,ME,IR,DR,RI,LE> CR: 28000822 XER: 00000000
CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0
...
NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0
LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0
Call Trace:
pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable)
pcibios_setup_bus_self+0x1c0/0x370
__of_scan_bus+0x2f8/0x330
pcibios_scan_phb+0x280/0x3d0
pcibios_init+0x88/0x12c
do_one_initcall+0x60/0x320
kernel_init_freeable+0x344/0x3e4
kernel_init+0x34/0x1d0
ret_from_kernel_user_thread+0x14/0x1c | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
RHSA-2025:0064 | Red Hat Security Advisory: kernel-rt security update | kernel: i40e: Do not allow untrusted VF to remove administratively set MAC kernel: net/sched: Fix UAF when resolving a clash kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 5.9 | null | null |
CVE-2008-0862 | IBM Lotus Notes 6.0, 6.5, 7.0, and 8.0 signs an unsigned applet when a user forwards an email message to another user, which allows user-assisted remote attackers to bypass Execution Control List (ECL) protection. | [
"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-7j85-cwr3-f2w3 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the url parameter in the setUrlFilterRules function. | [] | null | 9.8 | null | null |
|
ICSA-18-254-02 | Fuji Electric V-Server Lite | A maliciously crafted project file may cause a buffer overflow, which may allow the attacker to execute arbitrary code.CVE-2018-10637 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). | [] | null | null | 7.8 | null |
CVE-2020-26882 | In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input. | [
"cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-1796 | SourceCodester Employee Payslip Generator Create News cross site scripting | A vulnerability classified as problematic has been found in SourceCodester Employee Payslip Generator 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_position of the component Create News Handler. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224748. | [
"cpe:2.3:a:employee_payslip_generator_system_project:employee_payslip_generator_system:1.0:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
CVE-2023-41278 | QTS, QuTS hero, QuTScloud | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.2.2533 build 20230926 and later
QuTS hero h5.1.2.2534 build 20230927 and later
QuTScloud c5.1.5.2651 and later
| [
"cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.2.2533:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:-:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-3wg4-9v5r-3g2h | HTTP.sys Denial of Service Vulnerability | [] | null | 7.5 | null | null |
|
CVE-2020-26264 | LES Server DoS via GetProofsV2 | Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25. | [
"cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-43f7-xpq7-4gc9 | Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | [] | null | 7.8 | null | null |
|
CVE-2011-1187 | Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-42234 | There is a file inclusion vulnerability in the template management module in UCMS 1.6 | [
"cpe:2.3:a:ucms_project:ucms:1.6:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2009-3951 | Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4820. | [
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
GHSA-qrp4-fhcg-859g | A directory traversal vulnerability exists in the TicketTemplateActions.aspx GetTemplateAttachment functionality of Lansweeper lansweeper 10.1.1.0. A specially-crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability. | [] | null | 6.5 | null | null |
|
CVE-2022-46914 | An issue in the firmware update process of TP-LINK TL-WA801N / TL-WA801ND V1 v3.12.16 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. | [
"cpe:2.3:o:tp-link:tl-wa801n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wa801n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wa801nd_v1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wa801nd_v1:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-4vfm-3965-w55g | Android App 'kintone mobile for Android' 1.0.0 to 2.5 allows an attacker to obtain credential information registered in the product via unspecified vectors. | [] | null | null | null | null |
|
GHSA-6q84-3g95-w6vx | A vulnerability, which was classified as critical, has been found in Totolink A7100RU 7.4cu.2313_B20191024. Affected by this issue is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248942 is the identifier assigned to this vulnerability. | [] | null | 9.8 | null | null |
|
GHSA-5qmr-w3f3-wh84 | Multiple buffer overflows in UMN gopher daemon (gopherd) 2.x and 3.x before 3.0.6 allows attackers to execute arbitrary code via (1) a long filename as a result of a LIST command, and (2) the GSisText function, which calculates the view-type. | [] | null | null | null | null |
|
CVE-2023-46842 | x86 HVM hypercalls may trigger Xen bug check | Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes. This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation. Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers. For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall. When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
| [] | null | 6.5 | null | null |
CVE-2019-3925 | Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 are vulnerable to command injection via SNMP OID iso.3.6.1.4.1.3212.100.3.2.9.3. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. | [
"cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
RHEA-2019:3850 | Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update | hw: Intel SGX information leak | [
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 6 | null |
CVE-2007-4720 | Unspecified vulnerability in the Shared Trace Service in Hitachi JP1/Cm2/Network Node Manager (NNM) 07-10 through 07-10-05, and NNM Starter Edition Enterprise and 250 08-00 through 08-10, allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_01:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_01:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_01:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_02:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_02:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_02:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_03:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_03:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_03:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_04:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_04:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_04:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_05:*:hpux:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_05:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:07_10_05:*:windows:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:08_00:*:starter:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:08_00_01:*:starter:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:08_00_02:*:starter:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:08_00_03:*:starter:*:*:*:*:*",
"cpe:2.3:a:hitachi:jp1_cm2_network_node_manager:08_00_10:*:starter:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2019-7086 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
ICSA-23-320-07 | Siemens OPC UA Modeling Editor (SiOME) | Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system. | [] | null | 7.5 | null | null |
CVE-2024-36775 | A cross-site scripting (XSS) vulnerability in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the About Me parameter in the Edit Profile page. | [
"cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
CVE-2021-0591 | In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960 | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | 6.8 |
|
GHSA-5jm5-7748-8vmm | Cross-site scripting (XSS) vulnerability in the Pages module in Shadowed Portal allows remote attackers to inject arbitrary web script or HTML via the page parameter to load.php. | [] | null | null | null | null |
|
CVE-2022-0521 | Access of Memory Location After End of Buffer in radareorg/radare2 | Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2. | [
"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | null | 6.3 | null |
CVE-2009-5057 | The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4 does not configure the RANDFILE and HOME environment variables for OpenSSL, which might make it easier for remote attackers to decrypt e-mail messages that had lower than intended entropy available for cryptographic operations, related to inability to write to the seeding file. | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta7:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:0.5:beta8:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:otrs:otrs:2.3.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-4470 | Master Slider – Responsive Touch Slider <= 3.9.9 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Master Slider – Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ms_slide_info' shortcode in all versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied 'tag_name' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
GHSA-733c-h8w7-7f72 | SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network. | [] | null | null | null | null |
|
CVE-2009-4153 | Unspecified vulnerability in the XMLAccess component in IBM WebSphere Portal 6.1.x before 6.1.0.3 has unknown impact and attack vectors, related to the work directory. | [
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-p87p-59p8-545p | An authenticated SQL injection vulnerability in Aruba ClearPass Policy Manager can lead to privilege escalation. All versions of ClearPass are affected by multiple authenticated SQL injection vulnerabilities. In each case, an authenticated administrative user of any type could exploit this vulnerability to gain access to "appadmin" credentials, leading to complete cluster compromise. Resolution: Fixed in 6.7.6 and 6.6.10-hotfix. | [] | null | null | 7.2 | null |
|
GHSA-97rg-76q9-74vr | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity and availability via vectors related to Libc. | [] | null | null | null | null |
|
GHSA-j3f4-fw9x-x9c7 | The issue was addressed with improved validation of environment variables. This issue is fixed in macOS Sequoia 15.2. An app may be able to edit NVRAM variables. | [] | null | 5.5 | null | null |
|
CVE-2013-4504 | The Monster Menus module 7.x-1.x before 7.x-1.15 allows remote attackers to read arbitrary node comments via a crafted URL. | [
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-24q3-549v-f57v | SurfNOW 2.2 allows remote attackers to cause a denial of service (crash) via a series of long HTTP GET requests, possibly triggering a buffer overflow. | [] | null | null | null | null |
|
CVE-2013-4371 | Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors. | [
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
RHSA-2005:102 | Red Hat Security Advisory: dbus security update. | security flaw | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2024-52586 | eLabFTW MFA bypass | eLabFTW is an open source electronic lab notebook for research labs. A vulnerability has been found starting in version 4.6.0 and prior to version 5.1.0 that allows an attacker to bypass eLabFTW's built-in multifactor authentication mechanism. An attacker who can authenticate locally (by knowing or guessing the password of a user) can thus log in regardless of MFA requirements. This does not affect MFA that are performed by single sign-on services. Users are advised to upgrade to at least version 5.1.9 to receive a fix. | [] | null | 5.4 | null | null |
GHSA-237r-r8m4-4q88 | Guzzle OAuth Subscriber has insufficient nonce entropy | ImpactNonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source (https://github.com/guzzle/oauth-subscriber/blob/0.8.0/src/Oauth1.php#L192). This can leave servers vulnerable to replay attacks when TLS is not used.PatchesUpgrade to version 0.8.1 or higher.WorkaroundsNo.ReferencesIssue is similar to https://nvd.nist.gov/vuln/detail/CVE-2025-22376. | [] | 6.3 | null | null | null |
GHSA-w8w3-m5jx-qwwr | A denial of service vulnerability exists in Schneider Electric's MiCOM Px4x (P540 range excluded) with legacy Ethernet board, MiCOM P540D Range with Legacy Ethernet Board, and MiCOM Px4x Rejuvenated could lose network communication in case of TCP/IP open requests on port 20000 (DNP3oE) if an older TCI/IP session is still open with identical IP address and port number. | [] | null | null | 6.5 | null |
|
CVE-2021-39755 | In DevicePolicyManager, there is a possible way to reveal the existence of an installed package without proper query permissions due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-204995407 | [
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2021-39362 | An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers. | [
"cpe:2.3:a:recaptcha_solver_project:recaptcha_solver:5.7:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-2xx3-w7pj-fmgj | The BestWebSoft Htaccess plugin through 1.8.1 for WordPress allows wp-admin/admin.php?page=htaccess.php&action=htaccess_editor CSRF. The flag htccss_nonce_name passes the nonce to WordPress but the plugin does not validate it correctly, resulting in a wrong implementation of anti-CSRF protection. In this way, an attacker is able to direct the victim to a malicious web page that modifies the .htaccess file, and takes control of the website. | [] | null | null | null | null |
|
GHSA-h8jx-25pr-hgm3 | The WooCommerce Ninja Forms Product Add-ons WordPress plugin before 1.7.1 does not validate the file to be uploaded, allowing any unauthenticated users to upload arbitrary files to the server, leading to RCE. | [] | null | 9.8 | null | null |
|
RHSA-2025:1212 | Red Hat Security Advisory: tbb security update | jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
] | null | 6.1 | null | null |
GHSA-x836-gjvx-j5rx | Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer. | [] | null | null | null | null |
|
GHSA-47hg-p45q-rp5q | In page_number of shared_mem.c, there is a possible code execution in secure world due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238366009References: N/A | [] | null | 7.8 | null | null |
|
GHSA-7p36-m8r7-pqhg | An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory, aka 'Windows Push Notification Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0940, CVE-2020-1001, CVE-2020-1006. | [] | null | null | null | null |
|
RHSA-2019:3722 | Red Hat Security Advisory: OpenShift Container Platform 4.1.22 openshift-enterprise-hypershift-container security update | atomic-openshift: reflected XSS in authentication flow | [
"cpe:/a:redhat:openshift:4.1::el7"
] | null | null | 4.6 | null |
CVE-2012-2679 | Red Hat Network (RHN) Configuration Client (rhncfg-client) in rhncfg before 5.10.27-8 uses weak permissions (world-readable) for /var/log/rhncfg-actions, which allows local users to obtain sensitive information about the rhncfg-client actions by reading the file. | [
"cpe:2.3:a:redhat:rhncfg:*:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-vf9r-m8g7-gv2c | A vulnerability in the IPsec packet processor of Cisco IOS XR Software could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition for IPsec sessions to an affected device. The vulnerability is due to improper handling of packets by the IPsec packet processor. An attacker could exploit this vulnerability by sending malicious ICMP error messages to an affected device that get punted to the IPsec packet processor. A successful exploit could allow the attacker to deplete IPsec memory, resulting in all future IPsec packets to an affected device being dropped by the device. Manual intervention is required to recover from this situation. | [] | null | null | null | null |
|
CVE-2022-25788 | A maliciously crafted JT file in Autodesk AutoCAD 2022 may be used to write beyond the allocated buffer while parsing JT files. This vulnerability can be exploited to execute arbitrary code. | [
"cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*",
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*",
"cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-hr2r-w6wc-25pv | Zenario uses Twig filters insecurely in the Twig Snippet plugin | Zenario before 9.5.60437 uses Twig filters insecurely in the Twig Snippet plugin, and in the site-wide HEAD and BODY elements, enabling code execution by a designer or an administrator. | [] | null | 9.8 | null | null |
GHSA-fm87-86w5-6fp9 | The Application Store component in Apple iOS before 9 allows remote attackers to cause a denial of service to an enterprise-signed app via a crafted ITMS URL. | [] | null | null | null | null |
|
CVE-2011-1811 | Google Chrome before 12.0.742.91 does not properly handle a large number of form submissions, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-g6qg-6fwx-vcmc | Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable. | [] | null | null | null | null |
|
GHSA-2rgx-x72w-66r6 | Authentication Bypass by Primary Weakness vulnerability in ZKSoftware Biometric Security Solutions UFace 5 allows Authentication Bypass.This issue affects UFace 5: through 12022024. | [] | null | 9.8 | null | null |
|
GHSA-c25g-pf3j-289j | VMware vCenter Chargeback Manager (aka CBM) before 2.0.1 does not properly handle XML API requests, which allows remote attackers to read arbitrary files or cause a denial of service via unspecified vectors. | [] | null | null | null | null |
|
CVE-2013-5887 | Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect availability via unknown vectors related to Deployment. | [
"cpe:2.3:a:oracle:jdk:1.6.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2025-4173 | SourceCodester Online Eyewear Shop Master.php delete_cart sql injection | A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is the function delete_cart of the file /oews/classes/Master.php?f=delete_cart. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2010-3192 | Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.