id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
PYSEC-2019-221
| null |
Home Assistant before 0.67.0 was vulnerable to an information disclosure that allowed an unauthenticated attacker to read the application's error log via components/api.py.
|
[] | null | null | null | null | null |
CVE-2024-49868
|
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
[BUG]
Syzbot reported a NULL pointer dereference with the following crash:
FAULT_INJECTION: forcing a failure.
start_transaction+0x830/0x1670 fs/btrfs/transaction.c:676
prepare_to_relocate+0x31f/0x4c0 fs/btrfs/relocation.c:3642
relocate_block_group+0x169/0xd20 fs/btrfs/relocation.c:3678
...
BTRFS info (device loop0): balance: ended with status: -12
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cc: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000660-0x0000000000000667]
RIP: 0010:btrfs_update_reloc_root+0x362/0xa80 fs/btrfs/relocation.c:926
Call Trace:
<TASK>
commit_fs_roots+0x2ee/0x720 fs/btrfs/transaction.c:1496
btrfs_commit_transaction+0xfaf/0x3740 fs/btrfs/transaction.c:2430
del_balance_item fs/btrfs/volumes.c:3678 [inline]
reset_balance_state+0x25e/0x3c0 fs/btrfs/volumes.c:3742
btrfs_balance+0xead/0x10c0 fs/btrfs/volumes.c:4574
btrfs_ioctl_balance+0x493/0x7c0 fs/btrfs/ioctl.c:3673
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
[CAUSE]
The allocation failure happens at the start_transaction() inside
prepare_to_relocate(), and during the error handling we call
unset_reloc_control(), which makes fs_info->balance_ctl to be NULL.
Then we continue the error path cleanup in btrfs_balance() by calling
reset_balance_state() which will call del_balance_item() to fully delete
the balance item in the root tree.
However during the small window between set_reloc_contrl() and
unset_reloc_control(), we can have a subvolume tree update and created a
reloc_root for that subvolume.
Then we go into the final btrfs_commit_transaction() of
del_balance_item(), and into btrfs_update_reloc_root() inside
commit_fs_roots().
That function checks if fs_info->reloc_ctl is in the merge_reloc_tree
stage, but since fs_info->reloc_ctl is NULL, it results a NULL pointer
dereference.
[FIX]
Just add extra check on fs_info->reloc_ctl inside
btrfs_update_reloc_root(), before checking
fs_info->reloc_ctl->merge_reloc_tree.
That DEAD_RELOC_TREE handling is to prevent further modification to the
reloc tree during merge stage, but since there is no reloc_ctl at all,
we do not need to bother that.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2025-43244
|
A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to cause unexpected system termination.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2017:3193
|
Red Hat Security Advisory: httpd security update
|
httpd: ap_get_basic_auth_pw() authentication bypass httpd: mod_ssl NULL pointer dereference httpd: ap_find_token() buffer overread httpd: mod_mime buffer overread httpd: Uninitialized memory reflection in mod_auth_digest httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
|
[
"cpe:/o:redhat:rhel_eus:7.2::computenode",
"cpe:/o:redhat:rhel_eus:7.2::server"
] | null | null | 5.9 | null | null |
GHSA-qvw5-8j7m-vjcv
|
A CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists which could leak sensitive information transmitted between the software and the Modicon M218, M241, M251, and M258 controllers.
|
[] | null | null | null | null | null |
|
GHSA-2jw5-w5pg-58h8
|
Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
|
[] | null | null | null | null | null |
|
CVE-2020-25091
|
Ecommerce-CodeIgniter-Bootstrap before 2020-08-03 allows XSS in application/modules/vendor/views/add_product.php.
|
[
"cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-835v-j5fw-qqvq
|
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
|
[] | null | null | 5.9 | null | null |
|
GHSA-39jg-cp5w-9278
|
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx.
|
[] | null | 9.4 | null | null | null |
|
CVE-2007-1081
|
The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information.
|
[
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:rc1:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-3wxf-2wrv-x2cq
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.4.1 allows remote authenticated users to affect confidentiality and integrity via vectors related to Install.
|
[] | null | null | 7.1 | null | null |
|
GHSA-6fg6-6393-xqhq
|
An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.
|
[] | null | null | null | null | null |
|
CVE-2025-34066
|
AVTECH IP camera, DVR, and NVR Devices Unauthenticated Information Disclosure
|
An improper certificate validation vulnerability exists in AVTECH IP cameras, DVRs, and NVRs due to the use of wget with --no-check-certificate in scripts like SyncCloudAccount.sh and SyncPermit.sh. This exposes HTTPS communications to man-in-the-middle (MITM) attacks.
|
[] | 8.3 | null | null | null | null |
CVE-2010-1948
|
Directory traversal vulnerability in scr/soustab.php in openMairie Openfoncier 2.00, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the dsn[phptype] parameter, a related issue to CVE-2007-2069.
|
[
"cpe:2.3:a:openmairie:openfoncier:2.00:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-2939
|
WP Cerber Security <= 9.0 - User Enumeration Bypass
|
The WP Cerber Security plugin for WordPress is vulnerable to security protection bypass in versions up to, and including 9.0, that makes user enumeration possible. This is due to improper validation on the value supplied through the 'author' parameter found in the ~/cerber-load.php file. In vulnerable versions, the plugin only blocks requests if the value supplied is numeric, making it possible for attackers to supply additional non-numeric characters to bypass the protection. The non-numeric characters are stripped and the user requested is displayed. This can be used by unauthenticated attackers to gather information about users that can targeted in further attacks.
|
[
"cpe:2.3:a:cerber:wp_cerber_security\\,_anti-spam_\\&_malware_scan:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
GHSA-489w-9jrv-g2w4
|
Improper permissions in the installer for the Intel(R) Falcon 8+ UAS AscTec Thermal Viewer, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
GHSA-q2xf-jvwq-327h
|
A vulnerability in the REST API of Cisco Managed Services Accelerator (MSX) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the way that the affected software logs certain API requests. An attacker could exploit this vulnerability by sending a flood of crafted API requests to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
|
[] | null | null | null | null | null |
|
GHSA-qqh2-h6gw-6x8x
|
Typo3 XSS Vulnerabilities
|
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters.
|
[] | null | null | null | null | null |
GHSA-27rp-rjv6-3rv3
|
The 360 Photo Spheres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sphere' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2024-8516
|
Themesflat Addons For Elementor <= 2.2.1 - Authenticated (Contributor+) Information Exposure
|
The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.1 via the render() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract limited post information from draft and future scheduled posts.
|
[
"cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-fphq-733x-752w
|
Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.
|
[] | null | 7.5 | null | null | null |
|
GHSA-m27g-7h9f-wrhv
|
A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
|
[] | null | 8.7 | null | null | null |
|
GHSA-wjcf-9gjx-gf27
|
Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Revy allows Upload a Web Shell to a Web Server.This issue affects Revy: from n/a through 1.18.
|
[] | null | 10 | null | null | null |
|
GHSA-mp4f-c796-xq7h
|
A vulnerability classified as critical was found in Tongda OA. This vulnerability affects unknown code of the file general/hr/manage/staff_reinstatement/delete.php. The manipulation of the argument REINSTATEMENT_ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-239860.
|
[] | null | null | 6.3 | null | null |
|
GHSA-g9p5-p7h5-p2wg
|
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. (There is also an interoperability problem because the selection of the k integer value does not properly consider the differences between basic ElGamal encryption and generalized ElGamal encryption.) This, for example, affects use of ElGamal in OpenPGP.
|
[] | null | 7.5 | null | null | null |
|
GHSA-vfhr-rxhw-fm44
|
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /module.php?module=karma
|
[] | null | 8.8 | null | null | null |
|
RHSA-2008:0213
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP02 security update
|
OpenOffice.org-base allows Denial-of-Service and command injection Absolute path traversal Apache Tomcat WEBDAV JFreeChart: XSS vulnerabilities in the image map feature EJBQL injection via 'order' parameter Tomcat information disclosure vulnerability
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
] | null | null | null | null | null |
GHSA-m5p3-37gc-m3x3
|
In Storage Performance Development Kit (SPDK) before 19.01, a malicious vhost client (i.e., virtual machine) could carefully construct a circular descriptor chain that would result in a partial denial of service in the SPDK vhost target, because the vhost target did not properly detect such chains.
|
[] | null | null | 5.3 | null | null |
|
GHSA-628r-386p-mrwh
|
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-4410
|
The Permalink Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including 2.2.20.3 due to improper output escaping on post/page/media titles. This makes it possible for attackers to inject arbitrary web scripts on the permalink-manager page if another plugin or theme is installed on the site that allows lower privileged users with unfiltered_html the ability to modify post/page titles with malicious web scripts.
|
[
"cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null | null |
|
GHSA-fxrf-v868-58jw
|
lighttpd 1.4.18, and possibly other versions before 1.5.0, does not properly calculate the size of a file descriptor array, which allows remote attackers to cause a denial of service (crash) via a large number of connections, which triggers an out-of-bounds access.
|
[] | null | null | null | null | null |
|
CVE-2010-0383
|
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
|
[
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-f6wr-29pp-rx76
|
SAJ Solar Inverter allows remote attackers to obtain potentially sensitive information via a direct request for the inverter_info.htm or english_main.htm URI.
|
[] | null | null | 7.5 | null | null |
|
GHSA-vjx6-6r3w-rpqc
|
** DISPUTED ** Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding.
|
[] | null | 6.1 | null | null | null |
|
GHSA-cr5q-mgrc-j4qj
|
Cisco ONS15454 and ONS15327 running ONS before 3.4 allows remote attackers to modify the system configuration and delete files by establishing an FTP connection to the TCC, TCC+ or XTC using a username and password that does not exist.
|
[] | null | null | null | null | null |
|
GHSA-xvgx-mppj-c76r
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elicus WPMozo Addons Lite for Elementor allows PHP Local File Inclusion.This issue affects WPMozo Addons Lite for Elementor: from n/a through 1.1.0.
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-11039
|
Out-of-bounds read in iconv.c
|
Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | null | 4.2 | null | null |
GHSA-pvxg-5348-rxvf
|
The session cookie in MailGates and MailAudit from Openfind does not have the HttpOnly flag enabled, allowing remote attackers to potentially steal the session cookie via XSS.
|
[] | null | 5.3 | null | null | null |
|
RHSA-2006:0270
|
Red Hat Security Advisory: Red Hat Directory Server 7.1 security update
|
memory leaks using ber_scanf when handling bad BER packets (CVE-2006-0453) recursion causes OOM with bad DN in dn2ancestor security flaw
|
[
"cpe:/a:redhat:directory_server:7.1"
] | null | null | null | null | null |
CVE-2009-5144
|
mod-gnutls does not validate client certificates when "GnuTLSClientVerify require" is set in a directory context, which allows remote attackers to spoof clients via a crafted certificate.
|
[
"cpe:2.3:a:mod_gnutls_project:mod_gnutls:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2017-7822
|
The AES-GCM implementation in WebCrypto API accepts 0-length IV when it should require a length of 1 according to the NIST Special Publication 800-38D specification. This might allow for the authentication key to be determined in some instances. This vulnerability affects Firefox < 56.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2018-18455
|
The GfxImageColorMap class in GfxState.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted pdf file, as demonstrated by pdftoppm.
|
[
"cpe:2.3:a:xpdfreader:xpdf:4.00:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2014-2347
|
Amtelco miSecureMessages (aka MSM) 6.2 does not properly manage sessions, which allows remote authenticated users to obtain sensitive information via a modified message request.
|
[
"cpe:2.3:a:amtelco:misecuremessages:6.2:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-3xgc-7mw7-pvhp
|
Unrestricted Upload of File with Dangerous Type vulnerability in Themefic BEAF allows Upload a Web Shell to a Web Server. This issue affects BEAF: from n/a through 4.6.10.
|
[] | null | 9.1 | null | null | null |
|
CVE-2024-49866
|
tracing/timerlat: Fix a race during cpuhp processing
|
In the Linux kernel, the following vulnerability has been resolved:
tracing/timerlat: Fix a race during cpuhp processing
There is another found exception that the "timerlat/1" thread was
scheduled on CPU0, and lead to timer corruption finally:
```
ODEBUG: init active (active state 0) object: ffff888237c2e108 object type: hrtimer hint: timerlat_irq+0x0/0x220
WARNING: CPU: 0 PID: 426 at lib/debugobjects.c:518 debug_print_object+0x7d/0xb0
Modules linked in:
CPU: 0 UID: 0 PID: 426 Comm: timerlat/1 Not tainted 6.11.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:debug_print_object+0x7d/0xb0
...
Call Trace:
<TASK>
? __warn+0x7c/0x110
? debug_print_object+0x7d/0xb0
? report_bug+0xf1/0x1d0
? prb_read_valid+0x17/0x20
? handle_bug+0x3f/0x70
? exc_invalid_op+0x13/0x60
? asm_exc_invalid_op+0x16/0x20
? debug_print_object+0x7d/0xb0
? debug_print_object+0x7d/0xb0
? __pfx_timerlat_irq+0x10/0x10
__debug_object_init+0x110/0x150
hrtimer_init+0x1d/0x60
timerlat_main+0xab/0x2d0
? __pfx_timerlat_main+0x10/0x10
kthread+0xb7/0xe0
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2d/0x40
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>
```
After tracing the scheduling event, it was discovered that the migration
of the "timerlat/1" thread was performed during thread creation. Further
analysis confirmed that it is because the CPU online processing for
osnoise is implemented through workers, which is asynchronous with the
offline processing. When the worker was scheduled to create a thread, the
CPU may has already been removed from the cpu_online_mask during the offline
process, resulting in the inability to select the right CPU:
T1 | T2
[CPUHP_ONLINE] | cpu_device_down()
osnoise_hotplug_workfn() |
| cpus_write_lock()
| takedown_cpu(1)
| cpus_write_unlock()
[CPUHP_OFFLINE] |
cpus_read_lock() |
start_kthread(1) |
cpus_read_unlock() |
To fix this, skip online processing if the CPU is already offline.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
CVE-2024-27326
|
PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22276.
|
[
"cpe:2.3:a:pdf-xchange:pdf-tools:10.1.1.381:*:*:*:*:*:*:*",
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.1.1.381:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
GHSA-65cw-h272-m27j
|
An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points.A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.
|
[] | null | 7.2 | null | null | null |
|
CVE-2017-4999
|
EMC RSA Archer 5.4.1.3, 5.5.3.1, 5.5.2.3, 5.5.2, 5.5.1.3.1, 5.5.1.1 is affected by an authorization bypass through user-controlled key vulnerability in Discussion Forum Messages. A remote low privileged attacker may potentially exploit this vulnerability to elevate their privileges and view other users' discussion forum messages.
|
[
"cpe:2.3:a:emc:rsa_archer_egrc:5.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5.3.1:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
GHSA-f388-xh2q-wcwr
|
The Ericom PowerTerm WebConnect 6.0 login portal can unsafely write an XSS payload from the AppPortal cookie into the page.
|
[] | null | 6.1 | null | null | null |
|
CVE-2023-40468
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. Crafted data in an EMF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20620.
|
[
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.5.367.0:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
CVE-2005-4347
|
The Linux 2.4 kernel patch in kernel-patch-vserver before 1.9.5.5 and 2.x before 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows attackers to access files on the host system that are outside of the vserver.
|
[
"cpe:2.3:a:debian:kernel-patch-vserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2024-33598
|
WordPress Annual Archive plugin <= 1.6.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twinpictures Annual Archive allows Stored XSS.This issue affects Annual Archive: from n/a through 1.6.0.
|
[] | null | 5.9 | null | null | null |
GHSA-5vh3-4h32-8gf3
|
A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could allow unauthorized access when an attacker uses brute force. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)
|
[] | null | 9.8 | null | null | null |
|
CVE-2016-3284
|
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_rt:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2024-52364
|
IBM Cloud Pak for Business Automation cross-site scripting
|
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 5.4 | null | null | null |
CVE-2024-12283
|
WP Pipes <= 1.4.1 - Reflected Cross-Site Scripting via x1 Parameter
|
The WP Pipes plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘x1’ parameter in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
GHSA-f79w-jc47-24f4
|
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
|
[] | null | null | null | null | null |
|
GHSA-4xgr-pf62-44v5
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, macOS Catalina 10.15.1, tvOS 13.2, watchOS 6.1. An application may be able to execute arbitrary code with kernel privileges.
|
[] | null | null | null | null | null |
|
CVE-2024-6527
|
SQL Injection in MegaBIP
|
SQL Injection vulnerability in parameter "w" in file "druk.php" in MegaBIP software allows unauthorized attacker to disclose the contents of the database and obtain administrator's token to modify the content of pages. This issue affects MegaBIP software versions through 5.13.
|
[
"cpe:2.3:a:jan_syski:megabip:*:*:*:*:*:*:*:*"
] | 9.3 | null | null | null | null |
GHSA-23wp-rxm7-f6f3
|
Biometric Shift Employee Management System has XSS via the Last_Name parameter in an index.php?user=ajax request.
|
[] | null | null | 5.4 | null | null |
|
CVE-2023-26592
|
Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access.
|
[
"cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*"
] | null | 3.8 | null | null | null |
|
RHSA-2003:386
|
Red Hat Security Advisory: freeradius security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::es"
] | null | null | null | null | null |
GHSA-m7mq-hvr6-vqf7
|
Multiple SQL injection vulnerabilities in Web4Future eDating Professional 5 allow remote attackers to execute arbitrary SQL commands via the (1) s, (2) pg, and (3) sortb parameters to (a) index.php; (4) cid parameter to (b) gift.php and (c) fq.php; and (5) cat parameter to (d) articles.php.
|
[] | null | null | null | null | null |
|
CVE-2010-0694
|
SQL injection vulnerability in the PerchaGallery (com_perchagallery) component before 1.5b for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an editunidad action to index.php.
|
[
"cpe:2.3:a:percha:com_perchagallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-jhv7-rhr9-5c2j
|
Vulnerability of undefined permissions in the Calendar app.
Impact: Successful exploitation of this vulnerability will affect availability.
|
[] | null | 7.5 | null | null | null |
|
CVE-2005-3452
|
Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13.
|
[
"cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2016-7031
|
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
|
[
"cpe:2.3:a:ceph_project:ceph:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ceph_storage:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 4.3 | null |
|
GHSA-jjq9-66vx-2w8q
|
Session fixation vulnerability in EMC Documentum Webtop before 6.7 SP2, Documentum WDK before 6.7 SP2, Documentum Taskspace before 6.7 SP2, and Documentum Records Manager before 6.7 SP2 allows remote attackers to hijack web sessions via unspecified vectors.
|
[] | null | null | null | null | null |
|
ICSA-20-182-02
|
Mitsubishi Electric Factory Automation Engineering Software Products
|
The vulnerability could allow a malicious attacker to send a file on the computer running the product to the outside.CVE-2020-5602 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability could allow a malicious attacker to cause the product to enter a denial-of-service condition.CVE-2020-5603 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
GHSA-84wp-3676-5rx2
|
In the Linux kernel, the following vulnerability has been resolved:usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabledWhen only PHY1 is used (for example on Odroid-HC4), the regmap init code
uses the usb2 ports when doesn't initialize the PHY1 regmap entry.This fixes:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
...
pc : regmap_update_bits_base+0x40/0xa0
lr : dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
...
Call trace:
regmap_update_bits_base+0x40/0xa0
dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
dwc3_meson_g12a_usb2_init+0x7c/0xc8
dwc3_meson_g12a_usb_init+0x28/0x48
dwc3_meson_g12a_probe+0x298/0x540
platform_probe+0x70/0xe0
really_probe+0xf0/0x4d8
driver_probe_device+0xfc/0x168
...
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-32564
|
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.4.1 and below that could allow an attacker to achieve a remove code execution.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
CVE-2020-24639
|
There is a vulnerability caused by unsafe Java deserialization that allows for arbitrary command execution in a containerized environment within Airwave Glass before 1.3.3. Successful exploitation can lead to complete compromise of the underlying host operating system.
|
[
"cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-27095
|
Decidim cross-site scripting (XSS) in the admin panel
|
Decidim is a participatory democracy framework. The admin panel is subject to potential XSS attach in case the attacker manages to modify some records being uploaded to the server. This vulnerability is fixed in 0.27.6 and 0.28.1.
|
[
"cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:-:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc1:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc2:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc3:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc4:*:*:*:ruby:*:*",
"cpe:2.3:a:decidim:decidim:0.28.0:rc5:*:*:*:ruby:*:*"
] | null | 5.4 | null | null | null |
CVE-2022-22059
|
Memory corruption due to out of bound read while parsing a video file in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
|
[
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
CVE-2025-49285
|
WordPress WP Cookie Notice for GDPR, CCPA & ePrivacy Consent <= 3.8.0 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent allows Cross Site Request Forgery. This issue affects WP Cookie Notice for GDPR, CCPA & ePrivacy Consent: from n/a through 3.8.0.
|
[] | null | 4.3 | null | null | null |
CVE-2006-3873
|
Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869.
|
[
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2005-1080
|
Directory traversal vulnerability in the Java Archive Tool (Jar) utility in J2SE SDK 1.4.2 and 1.5, and OpenJDK, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in filenames in a .jar file.
|
[
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-rc26-54r6-7f8g
|
Lightwave ConsoleServer 3200 does not disconnect users after unsuccessful login attempts, which could allow remote attackers to conduct brute force password guessing.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-2508
|
In affected versions of Octopus Server it is possible to reveal the existence of resources in a space that the user does not have access to due to verbose error messaging.
|
[
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2024-51549
|
Absolute Path Traversal
|
Absolute File Traversal vulnerabilities allows access and modification of un-intended resources.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02
|
[
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] | 9.3 | 10 | null | null | null |
CVE-2004-1313
|
The Smc.exe process in My Firewall Plus 5.0 build 1117, and possibly other versions, does not drop privileges before invoking help, which allows local users to gain privileges.
|
[
"cpe:2.3:a:webroot_software:my_firewall_plus:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2025-46264
|
WordPress PowerPress Podcasting <= 11.12.5 - Arbitrary File Upload Vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Angelo Mandato PowerPress Podcasting allows Upload a Web Shell to a Web Server. This issue affects PowerPress Podcasting: from n/a through 11.12.5.
|
[] | null | 9.9 | null | null | null |
CVE-2022-43417
|
Jenkins Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[
"cpe:2.3:a:jenkins:katalon:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-rjwp-c3f6-mgx5
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wphrmanager WP-HR Manager: The Human Resources Plugin for WordPress allows Reflected XSS. This issue affects WP-HR Manager: The Human Resources Plugin for WordPress: from n/a through 3.1.0.
|
[] | null | 7.1 | null | null | null |
|
GHSA-rj7f-mcvj-v87g
|
Tad Book3 editing book page does not perform identity verification. Remote attackers can use the vulnerability to view and modify arbitrary content of books without permission.
|
[] | null | 9.1 | null | null | null |
|
GHSA-w5fj-785g-f8cw
|
The default installation of Sourcefire 3D Sensor 1000, 2000, and 9900; and Defense Center 1000; uses the same static, private SSL keys for multiple devices and installations, which allows remote attackers to decrypt SSL traffic via a man-in-the-middle (MITM) attack.
|
[] | null | null | null | null | null |
|
GHSA-vgp2-mh42-2j9f
|
ShowOff! 1.5.4 allows remote attackers to cause a denial of service (server crash) via a malformed request to port 8083.
|
[] | null | null | null | null | null |
|
CVE-2021-1438
|
Cisco Wide Area Application Services Software Information Disclosure Vulnerability
|
A vulnerability in Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to read arbitrary files that they originally did not have permissions to access.
|
[
"cpe:2.3:a:cisco:wide_area_application_services:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2024-29385
|
DIR-845L router <= v1.01KRb03 has an Unauthenticated remote code execution vulnerability in the cgibin binary via soapcgi_main function.
|
[
"cpe:2.3:o:dlink:dir-845l_firmware:*:*:*:*:*:*:*:*"
] | null | 9 | null | null | null |
|
CVE-2002-1789
|
Format string vulnerability in newsx NNTP client before 1.4.8 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a call to the syslog function.
|
[
"cpe:2.3:a:newsx:newsx:1.4_pl6:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2025-22228
|
CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length
|
BCryptPasswordEncoder.matches(CharSequence,String) will incorrectly return true for passwords larger than 72 characters as long as the first 72 characters are the same.
|
[] | null | 7.4 | null | null | null |
GHSA-gxgf-4cfv-cmq2
|
In ERPNext, versions v11.0.0-beta through v13.0.2 are vulnerable to Missing Authorization, in the chat rooms functionality. A low privileged attacker can send a direct message or a group message to any member or group, impersonating themselves as the administrator. The attacker can also read chat messages of groups that they do not belong to, and of other users.
|
[] | null | 5.4 | null | null | null |
|
CVE-2022-30544
|
WordPress OSM – OpenStreetMap Plugin <= 6.0.1 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) in MiKa's OSM – OpenStreetMap plugin <= 6.0.1 versions.
|
[
"cpe:2.3:a:hyumika:openstreetmap:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
GHSA-6q2g-cq59-76q9
|
The OLE2 parsing in Norman Antivirus before 5.91.02 allows remote attackers to bypass the malware detection via a crafted DOC file, resulting from an "integer cast around".
|
[] | null | null | null | null | null |
|
GHSA-42qc-f87p-hg2h
|
Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01.
|
[] | null | 9.8 | null | null | null |
|
GHSA-99p3-qvxh-qjqh
|
The conversation-watson plugin before 0.8.21 for WordPress has a DOM-based XSS vulnerability that is executed when a chat message containing JavaScript is sent.
|
[] | null | null | null | null | null |
|
GHSA-7mx7-673f-gx44
|
A system is operating in "promiscuous" mode which allows it to perform packet sniffing.
|
[] | null | null | null | null | null |
|
GHSA-jj4j-cwgq-fx7g
|
ViMbAdmin Cross-site Scripting Vulnerabilities
|
Multiple cross-site scripting (XSS) vulnerabilities in ViMbAdmin 3.0.15 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) transport parameter to domain/add; the (3) name parameter to mailbox/add/did/<domain id>; the (4) goto parameter to alias/add/did/<domain id>; or the (5) captchatext parameter to auth/lost-password.
|
[] | null | null | 5.4 | null | null |
GHSA-g986-42m5-mxwm
|
An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-32222
|
D-Link DSL-G256DG firmware version vBZ_1.00.27 Authentication Bypass
|
D-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.
|
[
"cpe:2.3:a:d-link:dsl-g256dg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dsl-g256dg_firmware:bz_1.00.27:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-g256dg:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.