id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2020-8498
|
XSS exists in the shortcode functionality of the GistPress plugin before 3.0.2 for WordPress via the includes/class-gistpress.php id parameter. This allows an attacker with the WordPress Contributor role to execute arbitrary JavaScript code with the privileges of other users (e.g., ones who have the publish_posts capability).
|
[
"cpe:2.3:a:gistpress_project:gistpress:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | 3.5 | null |
|
ICSA-21-194-01
|
Schneider Electric C-Bus Toolkit
|
An improper authentication issue exists and could allow an attacker to use a crafted webpage that can enable remote access to the system.CVE-2021-22784 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
|
[] | null | null | 6.5 | null | null |
GHSA-9fxh-rh2f-f88p
|
A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cashconfirm.php. The manipulation of the argument transactioncode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-pgcw-hp94-qc6c
|
Hanwha Techwin SRN-4000, SRN-4000 firmware versions prior to SRN4000_v2.16_170401, A specially crafted http request and response could allow an attacker to gain access to the device management page with admin privileges without proper authentication.
|
[] | null | null | 9.8 | null | null |
|
CVE-2021-1848
|
The issue was addressed with improved UI handling. This issue is fixed in iOS 14.5 and iPadOS 14.5. A local user may be able to view sensitive information in the app switcher.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2023-27363
|
Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability
|
Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.
|
[
"cpe:2.3:a:foxit:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-782v-4ghj-5xm3
|
Multiple cross-site request forgery (CSRF) vulnerabilities in phpMyAdmin before 2.9.1-rc1 allow remote attackers to perform unauthorized actions as another user by (1) directly setting a token in the URL though dynamic variable evaluation and (2) unsetting arbitrary variables via the _REQUEST array, related to (a) libraries/common.lib.php, (b) session.inc.php, and (c) url_generating.lib.php. NOTE: the PHP unset function vector is covered by CVE-2006-3017.
|
[] | null | null | null | null | null |
|
CVE-2020-25763
|
Seat Reservation System version 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading PHP files.
|
[
"cpe:2.3:a:seat_reservation_system_project:seat_reservation_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-hfm3-j43v-9h2m
|
Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
|
[] | null | 5.5 | null | null | null |
|
CVE-2020-35704
|
Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Lead screen.
|
[
"cpe:2.3:a:daybydaycrm:daybyday:2.1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2018-19901
|
No-CMS 1.1.3 is prone to Persistent XSS via the blog/manage_article/index/ "article_title" parameter.
|
[
"cpe:2.3:a:no-cms_project:no-cms:1.1.3:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-3gw2-vfgh-v3jw
|
An issue was discovered in ZOHO ManageEngine OpManager 12.2. The 'apiKey' parameter of "/api/json/admin/getmailserversettings" and "/api/json/dashboard/gotoverviewlist" is vulnerable to a Blind SQL Injection attack.
|
[] | null | null | 7.5 | null | null |
|
GHSA-rmfh-4vqx-qf9v
|
In rw_t2t_extract_default_locks_info of rw_t2t_ndef.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-147310721
|
[] | null | null | null | null | null |
|
CVE-2009-4263
|
SQL injection vulnerability in main_forum.php in PTCPay GeN3 forum 1.3 allows remote attackers to execute arbitrary SQL commands via the cat parameter.
|
[
"cpe:2.3:a:ptcpay:gen3:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-hrf4-f43m-jqm2
|
The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a "--" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.
|
[] | null | null | null | null | null |
|
GHSA-6jxg-4jpx-jgfm
|
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191.
|
[] | null | null | null | null | null |
|
GHSA-rrvx-pwf8-p59p
|
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
|
[] | null | null | 7.5 | null | null |
GHSA-h3fp-pvj7-r9g9
|
Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-13255
|
RESTful Web Services - Critical - Access bypass - SA-CONTRIB-2024-019
|
Exposure of Sensitive Information Through Data Queries vulnerability in Drupal RESTful Web Services allows Forceful Browsing.This issue affects RESTful Web Services: from 7.X-2.0 before 7.X-2.10.
|
[] | null | 7.5 | null | null | null |
RHSA-2014:1287
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.1 update
|
Validator: JSM bypass via ReflectionHelper
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | null | null | null |
CVE-2006-5722
|
Multiple PHP remote file inclusion vulnerabilities in Segue CMS 1.5.9 and earlier, when magic_quotes_gpc is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the theme parameter to (1) themesettings.php or (2) index.php, a different vector than CVE-2006-5497. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:middlebury_college:segue_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:middlebury_college:segue_cms:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:middlebury_college:segue_cms:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:middlebury_college:segue_cms:1.5.8:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2019-2214
|
In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
GHSA-mv27-mx2x-hxr7
|
Directory traversal vulnerability in index.php in GPhotos 1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the rep parameter.
|
[] | null | null | null | null | null |
|
RHSA-2016:0711
|
Red Hat Security Advisory: jenkins security update
|
jenkins: Remote code execution vulnerability in remoting module (SECURITY-232) jenkins: HTTP response splitting vulnerability (SECURITY-238) jenkins: Non-constant time comparison of API token (SECURITY-241) jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245) jenkins: Remote code execution through remote API (SECURITY-247)
|
[
"cpe:/a:redhat:openshift:3.1::el7"
] | null | null | null | null | null |
GHSA-pr3r-4pq6-4jw6
|
An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.
|
[] | null | 4.6 | null | null | null |
|
GHSA-cc8j-46rm-jw6f
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7634.
|
[] | null | 5.5 | null | null | null |
|
CVE-2016-10979
|
The fossura-tag-miner plugin before 1.1.5 for WordPress has XSS.
|
[
"cpe:2.3:a:fossura:tag_miner:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2019-5770
|
Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2013-4402
|
The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
|
[
"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-3826
|
Multiple integer underflows in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allow remote attackers to cause a denial of service (loop) via vectors related to the R3 dissector, a different vulnerability than CVE-2012-2392.
|
[
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
RHSA-2022:0780
|
Red Hat Security Advisory: cyrus-sasl security update
|
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 8.8 | null | null | null |
GHSA-p396-jmwr-p8q2
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 6.5 | null | null | null |
|
CVE-2016-7012
|
Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-f6r5-5pp4-r7jw
|
IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
|
[] | null | null | null | null | null |
|
CVE-2018-8848
|
Philips e-Alert Unit (non-medical device), Version R2.1 and prior. The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor.
|
[
"cpe:2.3:o:philips:e-alert_firmware:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2022-48480
|
Integer overflow vulnerability in some phones. Successful exploitation of this vulnerability may affect service confidentiality.
|
[
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-543h-6vp9-2f5c
|
Vulnerability discovered is related to the peer-to-peer (p2p) communications, attackers can craft consensus messages, send it to individual nodes and take them offline. An attacker can crawl the network peers using getaddr message and attack the unpatched nodes.
|
[] | null | 9.1 | null | null | null |
|
GHSA-rx38-v4jx-9vw9
|
Cross-site scripting (XSS) vulnerability in the Users module in Zikula before 1.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: it is possible that this overlaps CVE-2011-0535.
|
[] | null | null | null | null | null |
|
GHSA-3957-gqh2-v47w
|
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in TC Ultimate WP Query Search Filter plugin <= 1.0.10 versions.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-28273
|
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
|
[
"cpe:2.3:a:set-in_project:set-in:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2024:7704
|
Red Hat Security Advisory: firefox security update
|
firefox: Clipboard write permission bypass firefox: thunderbird: Compromised content process can bypass site isolation firefox: thunderbird: Cross-origin access to PDF contents through multipart responses firefox: thunderbird: Cross-origin access to JSON contents through multipart responses firefox: thunderbird: Potential memory corruption may occur when cloning certain objects firefox: thunderbird: Potential directory upload bypass via clickjacking firefox: thunderbird: External protocol handlers could be enumerated via popups firefox: thunderbird: Specially crafted WebTransport requests could lead to denial of service firefox: thunderbird: Potential memory corruption during JIT compilation firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 firefox: thunderbird: Memory safety bugs fixed in Firefox 131 and Thunderbird 131
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 7.5 | null | null | null |
GHSA-w44m-x962-x72w
|
In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out.
|
[] | null | null | null | null | null |
|
CVE-2022-40263
|
BD Totalys MultiProcessor - Hardcoded Credentials
|
BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability.
|
[
"cpe:2.3:o:bd:totalys_multiprocessor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bd:totalys_multiprocessor:-:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
GHSA-w6h6-4w93-vgvw
|
In BlackBerry QNX Software Development Platform (SDP) 6.6.0 and 6.5.0 SP1 and earlier, an information disclosure vulnerability in the default configuration of the QNX SDP could allow an attacker to gain information relating to memory layout of higher privileged processes by manipulating environment variables that influence the loader.
|
[] | null | null | 4.9 | null | null |
|
GHSA-2xxm-h632-fmch
|
Local privilege escalation in admin services in Windows environment can occur due to an arbitrary read issue in XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
|
[] | null | null | null | null | null |
|
GHSA-px36-5x6h-5x8g
|
The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.
|
[] | null | null | null | null | null |
|
CVE-2025-2575
|
Z Companion <= 1.1.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
|
The Z Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. Note: This requires Royal Shop theme to be installed.
|
[] | null | 6.4 | null | null | null |
GHSA-gqmm-fccw-xjf3
|
In the Linux kernel, the following vulnerability has been resolved:clk: mmp2: call pm_genpd_init() only after genpd.name is setSetting the genpd's struct device's name with dev_set_name() is
happening within pm_genpd_init(). If it remains NULL, things can blow up
later, such as when crafting the devfs hierarchy for the power domain:Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read
...
Call trace:
strlen from start_creating+0x90/0x138
start_creating from debugfs_create_dir+0x20/0x178
debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144
genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90
genpd_debug_init from do_one_initcall+0x5c/0x244
do_one_initcall from kernel_init_freeable+0x19c/0x1f4
kernel_init_freeable from kernel_init+0x1c/0x12c
kernel_init from ret_from_fork+0x14/0x28Bisecting tracks this crash back to commit 899f44531fe6 ("pmdomain: core:
Add GENPD_FLAG_DEV_NAME_FW flag"), which exchanges use of genpd->name
with dev_name(&genpd->dev) in genpd_debug_add.part().
|
[] | null | 5.5 | null | null | null |
|
GHSA-fpgg-qjcj-58g7
|
Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a .. (dot dot) in the path parameter of HTTP API requests. NOTE: This vulnerability is due to an incomplete fix to CVE-2015-3297.
|
[] | null | null | null | null | null |
|
CVE-2008-4130
|
Cross-site scripting (XSS) vulnerability in Gallery 2.x before 2.2.6 allows remote attackers to inject arbitrary web script or HTML via a crafted Flash animation, related to the ability of the animation to "interact with the embedding page."
|
[
"cpe:2.3:a:gallery:gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery:gallery:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery:gallery:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery:gallery:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery:gallery:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery:gallery:2.2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-12033
|
Jupiter X Core <= 4.8.5 - Missing Authorization to Authenticated Library Sync
|
The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the sync_libraries() function in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to sync libraries
|
[] | null | 4.3 | null | null | null |
GHSA-38r2-j68m-9mr5
|
Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/classes/Master.php?f=delete_message.
|
[] | null | 7.2 | null | null | null |
|
CVE-2018-13604
|
The mintToken function of a smart contract implementation for wellieat, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:wellieat_project:wellieat:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-78gq-q74g-w632
|
In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user.
|
[] | null | 4.9 | null | null | null |
|
CVE-2023-28767
|
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36, USG FLEX 50(W) series firmware versions 5.10 through 5.36,
USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
|
[
"cpe:2.3:o:zyxel:atp_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50\\/w\\/_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_2200-vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_2200-vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn_100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn_300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn_300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_vpn_50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_vpn_50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp100w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zywall_atp800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:zywall_atp800:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2021-24674
|
Genie WP Favicon <= 0.5.2 - Arbitrary Favicon Change via CSRF
|
The Genie WP Favicon WordPress plugin through 0.5.2 does not have CSRF in place when updating the favicon, which could allow attackers to make a logged in admin change it via a CSRF attack
|
[
"cpe:2.3:a:genie_wp_favicon_project:genie_wp_favicon:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4.3 | null |
GHSA-7rm2-mhc5-4p95
|
Vulnerability in (1) Microsoft Excel 2002 and earlier and (2) Microsoft PowerPoint 2002 and earlier allows attackers to bypass macro restrictions and execute arbitrary commands by modifying the data stream in the document.
|
[] | null | null | null | null | null |
|
CVE-2013-3320
|
Cross-site Scripting (XSS) vulnerability in NetApp OnCommand System Manager before 2.2 allows remote attackers to inject arbitrary web script or HTML via the 'full-name' and 'comment' fields.
|
[
"cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-4570
|
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services.
Refer to the 'Security Update for for MyASUS' section on the ASUS Security Advisory for more information.
|
[] | 6.9 | null | null | null | null |
|
GHSA-857m-9c4p-fvf4
|
A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
|
[] | null | 7.8 | null | null | null |
|
GHSA-jcmm-rj83-g6xp
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in cornershop Better Section Navigation Widget allows Stored XSS. This issue affects Better Section Navigation Widget: from n/a through 1.6.1.
|
[] | null | 6.5 | null | null | null |
|
GHSA-25wg-pp2p-rfw9
|
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1167.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-13697
|
Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss <= 2.7.4 - Unauthenticated Limited Server-Side Request Forgery in nice_links
|
The Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.4 via the 'nice_links'. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Successful exploitation requires the "Enable link previews" to be enabled (default).
|
[] | null | 4.8 | null | null | null |
GHSA-rrhw-54r8-545q
|
Path Traversal in FileGator
|
Path Traversal in FileGator prior to 7.8.0 for non-admin users. Files created with `..\` as part of their name will be interpreted as a path. Users are thus able to add filesystem entries outside the scope of their user to their dashboard and subsequently are able to modify those files.
|
[] | null | null | 5.4 | null | null |
GHSA-vhv3-639r-j6rp
|
The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, visionOS 2.1. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
|
[] | null | 5.4 | null | null | null |
|
GHSA-29pw-vrcf-rqvp
|
There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E1000 router firmware version v.2.1.03 and before, leading to remote code execution.
|
[] | null | 6.7 | null | null | null |
|
CVE-2020-14422
|
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
|
[
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
GHSA-qjp4-fmhh-wjw3
|
Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Preloader for Website.This issue affects Preloader for Website: from n/a through 1.2.2.
|
[] | null | 5.3 | null | null | null |
|
GHSA-vcc7-6g6c-99x9
|
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
|
[] | null | null | null | null | null |
|
CVE-2020-15244
|
RCE in Magento
|
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.
|
[
"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*"
] | null | 8 | null | null | null |
RHSA-2024:7848
|
Red Hat Security Advisory: openssl security update
|
openssl: SSL_select_next_proto buffer overread
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 5.9 | null | null |
CVE-2008-0996
|
The Printing component in Apple Mac OS X 10.5.2 might save authentication credentials to disk when starting a job on an authenticated print queue, which might allow local users to obtain the credentials.
|
[
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*"
] | null | null | null | 1.7 | null |
|
GHSA-pj44-9rqm-rw9w
|
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
|
[] | null | null | null | null | null |
|
CVE-2022-40113
|
Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the cust_id parameter at /net-banking/send_funds.php.
|
[
"cpe:2.3:a:online_banking_system_project:online_banking_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2021-33831
|
api/account/register in the TH Wildau COVID-19 Contact Tracing application through 2021-09-01 has Incorrect Access Control. An attacker can interfere with tracing of infection chains by creating 500 random users within 2500 seconds.
|
[
"cpe:2.3:a:th-wildau:covid-19_contact_tracing:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-5ff8-37w8-2jph
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Find Your Nearest allows Reflected XSS. This issue affects WP Find Your Nearest: from n/a through 0.3.1.
|
[] | null | 7.1 | null | null | null |
|
GHSA-f5wr-jggw-qg46
|
In the Linux kernel, the following vulnerability has been resolved:driver core: fix potential deadlock in __driver_attachIn __driver_attach function, There are also AA deadlock problem,
like the commit b232b02bf3c2 ("driver core: fix deadlock in
__device_attach").stack like commit b232b02bf3c2 ("driver core: fix deadlock in
__device_attach").
list below:
In __driver_attach function, The lock holding logic is as follows:
...
__driver_attach
if (driver_allows_async_probing(drv))
device_lock(dev) // get lock dev
async_schedule_dev(__driver_attach_async_helper, dev); // func
async_schedule_node
async_schedule_node_domain(func)
entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);
/* when fail or work limit, sync to execute func, but
__driver_attach_async_helper will get lock dev as
will, which will lead to A-A deadlock. */
if (!entry || atomic_read(&entry_count) > MAX_WORK) {
func;
else
queue_work_node(node, system_unbound_wq, &entry->work)
device_unlock(dev)Reproduce:
and it can be reproduce by make the condition
(if (!entry || atomic_read(&entry_count) > MAX_WORK)) untenable, like
below:[ 370.785650] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables
this message.
[ 370.787154] task:swapper/0 state:D stack: 0 pid: 1 ppid:
0 flags:0x00004000
[ 370.788865] Call Trace:
[ 370.789374] <TASK>
[ 370.789841] __schedule+0x482/0x1050
[ 370.790613] schedule+0x92/0x1a0
[ 370.791290] schedule_preempt_disabled+0x2c/0x50
[ 370.792256] __mutex_lock.isra.0+0x757/0xec0
[ 370.793158] __mutex_lock_slowpath+0x1f/0x30
[ 370.794079] mutex_lock+0x50/0x60
[ 370.794795] __device_driver_lock+0x2f/0x70
[ 370.795677] ? driver_probe_device+0xd0/0xd0
[ 370.796576] __driver_attach_async_helper+0x1d/0xd0
[ 370.797318] ? driver_probe_device+0xd0/0xd0
[ 370.797957] async_schedule_node_domain+0xa5/0xc0
[ 370.798652] async_schedule_node+0x19/0x30
[ 370.799243] __driver_attach+0x246/0x290
[ 370.799828] ? driver_allows_async_probing+0xa0/0xa0
[ 370.800548] bus_for_each_dev+0x9d/0x130
[ 370.801132] driver_attach+0x22/0x30
[ 370.801666] bus_add_driver+0x290/0x340
[ 370.802246] driver_register+0x88/0x140
[ 370.802817] ? virtio_scsi_init+0x116/0x116
[ 370.803425] scsi_register_driver+0x1a/0x30
[ 370.804057] init_sd+0x184/0x226
[ 370.804533] do_one_initcall+0x71/0x3a0
[ 370.805107] kernel_init_freeable+0x39a/0x43a
[ 370.805759] ? rest_init+0x150/0x150
[ 370.806283] kernel_init+0x26/0x230
[ 370.806799] ret_from_fork+0x1f/0x30To fix the deadlock, move the async_schedule_dev outside device_lock,
as we can see, in async_schedule_node_domain, the parameter of
queue_work_node is system_unbound_wq, so it can accept concurrent
operations. which will also not change the code logic, and will
not lead to deadlock.
|
[] | null | null | null | null | null |
|
RHSA-2024:4416
|
Red Hat Security Advisory: less security update
|
less: OS command injection
|
[
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/o:redhat:rhel_tus:8.4::baseos"
] | null | 8.6 | null | null | null |
GHSA-h8fc-w45m-x9wj
|
Directory traversal vulnerability in ipdsserver.exe in Intermate WinIPDS 3.3 G52-33-021 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
|
[] | null | null | null | null | null |
|
CVE-2021-32560
|
The Logging subsystem in OctoPrint before 1.6.0 has incorrect access control because it attempts to manage files that are not *.log files.
|
[
"cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
CVE-2024-38823
|
CVE-2024-38823 Salt Advisory
|
Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.
|
[] | null | 2.7 | null | null | null |
GHSA-vmv6-chfj-88gf
|
The agent and task-agent components in Symantec Management Platform 7.0 and 7.1 before 7.1 SP2 Mp1.1v7 rollup, as used in certain Altiris products, use the same registry-entry encryption key across different customers' installations, which makes it easier for local users to obtain sensitive information about package-server access, or cause a denial of service, by leveraging knowledge of this key.
|
[] | null | null | null | null | null |
|
GHSA-3r56-gc76-cxqc
|
Missing Authorization vulnerability in Brady Vercher Cue allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Cue: from n/a through 2.4.4.
|
[] | null | 4.3 | null | null | null |
|
CVE-2025-23600
|
WordPress Send to a Friend Addon plugin <= 1.4.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pinal.shah Send to a Friend Addon allows Reflected XSS. This issue affects Send to a Friend Addon: from n/a through 1.4.1.
|
[] | null | 7.1 | null | null | null |
GHSA-vmqr-c49v-3hhp
|
The getItemInfoByAtom function in the ActiveX control for Microsoft Windows Media Player 9.0 returns a 0 if the file does not exist and the size of the file if the file exists, which allows remote attackers to determine the existence of files on the local system.
|
[] | null | null | null | null | null |
|
GHSA-pj43-gpqr-fhm8
|
Insertion of Sensitive Information into Log File vulnerability in Searchiq SearchIQ.This issue affects SearchIQ: from n/a through 4.5.
|
[] | null | 7.5 | null | null | null |
|
GHSA-wjq5-mc5w-vxx8
|
The Easy Bootstrap Shortcode WordPress plugin through 4.5.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[] | null | 5.4 | null | null | null |
|
CVE-2021-41736
|
Faust v2.35.0 was discovered to contain a heap-buffer overflow in the function realPropagate() at propagate.cpp.
|
[
"cpe:2.3:a:grame:faust:2.35.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2007-0679
|
PHP remote file inclusion vulnerability in lang/leslangues.php in Nicolas Grandjean PHPMyRing 4.1.3b and earlier allows remote attackers to execute arbitrary PHP code via a URL in the fichier parameter.
|
[
"cpe:2.3:a:nicolas_grandjean:phpmyring:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nicolas_grandjean:phpmyring:4.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:nicolas_grandjean:phpmyring:4.1.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:nicolas_grandjean:phpmyring:4.1.2b:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-20180117-staros
|
Cisco StarOS CLI Command Injection Vulnerability
|
A vulnerability in the CLI of the Cisco StarOS operating system for Cisco ASR 5000 Series routers could allow an authenticated, local attacker to execute arbitrary commands with root privileges on an affected host operating system.
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting malicious command arguments into a vulnerable CLI command. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. To exploit this vulnerability, the attacker would need to authenticate to the affected system by using valid administrator credentials.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-staros ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-staros"]
|
[] | null | null | 6.7 | null | null |
GHSA-xr6j-9xr6-9xr7
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat Themesflat Addons For Elementor allows DOM-Based XSS.This issue affects Themesflat Addons For Elementor: from n/a through 2.2.2.
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-20727
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6100 before 1.0.0.63, R7800 before 1.0.2.52, R8900 before 1.0.4.2, R9000 before 1.0.4.2, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.68, and XR500 before 2.3.2.32.
|
[
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v1:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
CVE-2024-44771
|
BigId PrivacyPortal v179 is vulnerable to Cross Site Scripting (XSS) via the "Label" field in the Report template function.
|
[] | null | 6.1 | null | null | null |
|
CVE-2019-15737
|
An issue was discovered in GitLab Community and Enterprise Edition through 12.2.1. Certain account actions needed improved authentication and session management.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.5 | null | 6.4 | null |
|
GHSA-hfmf-q43v-2ffj
|
Improper Key Verification in openpgp
|
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.RecommendationUpgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
[] | null | null | 7.5 | null | null |
RHSA-2017:2457
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Information Disclosure via Security Bypass issue fixed in APSB17-23 flash-plugin: Remote Code Execution due to Type Confusion issue fixed in APSB17-23
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null | null |
RHSA-2002:251
|
Red Hat Security Advisory: apache security update
|
security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null | null |
CVE-2006-5853
|
Cross-site scripting (XSS) vulnerability in logon.aspx in Immediacy CMS (Immediacy .NET CMS) 5.2 allows remote attackers to inject arbitrary web script or HTML via the lang parameter, which is returned to the client in a lang cookie.
|
[
"cpe:2.3:a:immediacy:immediacy_.net_cms:5.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-ccp4-42w5-9q8g
|
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
GHSA-p2f3-23x7-8grw
|
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: Foundation UI & Servlets). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion BI+ accessible data as well as unauthorized read access to a subset of Hyperion BI+ accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hyperion BI+. CVSS 3.0 Base Score 4.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L).
|
[] | null | null | 4.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.