id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-mf6g-r32j-f7qw
|
Huawei P9 versions earlier before EVA-AL10C00B373, versions earlier before EVA-CL00C92B373, versions earlier before EVA-DL00C17B373, versions earlier before EVA-TL00C01B373 have a lock-screen bypass vulnerability. An unauthenticated attacker could force the phone to the fastboot mode and delete the user's password file during the reboot process, then login the phone without screen lock password after reboot.
|
[] | null | null | 6.8 | null | null |
|
GHSA-w3w2-396g-wrc6
|
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(SLEEP(5)))FWlC) AND 'butz'='butz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223325 was assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2013-7260
|
Multiple stack-based buffer overflows in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allow remote attackers to execute arbitrary code via a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file, a different issue than CVE-2013-6877.
|
[
"cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.0.282:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0._481:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.1.1737:-:-:*:-:macos:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-14409
|
SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.
|
[
"cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12533:*:*:*:vsphere:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12658:*:*:*:vsphere:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build12859:*:*:*:vsphere:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13170:*:*:*:vsphere:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13586:*:*:*:vsphere:*:*",
"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build13861:*:*:*:vsphere:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2025-26966
|
WordPress PrivateContent plugin <= 8.11.5 - Unauthenticated Account Takeover vulnerability
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Aldo Latino PrivateContent. This issue affects PrivateContent: from n/a through 8.11.5.
|
[] | null | 9.8 | null | null | null |
GHSA-mv9m-fc3f-6m5j
|
Vulnerability in the Database Vault component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Easily exploitable vulnerability allows high privileged attacker having Create Public Synonym privilege with network access via Oracle Net to compromise Database Vault. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Database Vault accessible data as well as unauthorized read access to a subset of Database Vault accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | null | null | null | null |
|
RHEA-2024:7620
|
Red Hat Enhancement Advisory: microcode_ctl bug fix and enhancement update
|
kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) kernel: Local information disclosure on Intel(R) Atom(R) processors kernel: Local information disclosure in some Intel(R) processors kernel: Possible Denial of Service on Intel(R) Processors kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode intel-microcode: Race conditions in some Intel(R) Processors intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 4.7 | null | null | null |
GHSA-v33x-2h3j-c3m3
|
There is a Cross Site Scripting (XSS) vulnerability in the "column" parameter of index.php in PHPJabbers Document Creator v1.0.
|
[] | null | 6.1 | null | null | null |
|
GHSA-5pvr-hmqg-8283
|
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.260), Parasolid V35.1 (All versions < V35.1.246), Parasolid V36.0 (All versions < V36.0.156). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21266)
|
[] | null | 7.8 | null | null | null |
|
GHSA-mp8h-4283-jr44
|
In the Linux kernel, the following vulnerability has been resolved:EDAC/bluefield: Fix potential integer overflowThe 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index. With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2009:0409
|
Red Hat Security Advisory: krb5 security update
|
krb5: ASN.1 decoder can free uninitialized pointer when decoding an invalid encoding (MITKRB5-SA-2009-002)
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null | null |
GHSA-286q-p8mv-qhjh
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | 2.7 | null | null | null |
|
GHSA-5px3-vmv6-3cq9
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 7.5 | null | null | null |
|
GHSA-gr3q-7g86-63q2
|
Windows Graphics Component Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
GHSA-w6f8-mxf5-4vf8
|
Missing authorization in Liferay portal
|
The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.
|
[] | null | 7.5 | null | null | null |
GHSA-g3fw-hx3v-rvcr
|
A vulnerability in specific CLI commands in Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have valid Administrator privileges on an affected device.This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
|
[] | null | 6 | null | null | null |
|
GHSA-rc4r-wh2q-q6c4
|
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
|
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. This bug is fixed in Moby (Docker Engine) 20.10.18. Users should update to this version when it is available. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade, this problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.Thanks to Steven Murdoch for reporting this issue.ImpactIf an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container.PatchesThis bug is fixed in Moby (Docker Engine) 20.10.18. Users should update to this version when it is available.WorkaroundsThis problem can be worked around by not using the `"USER $USERNAME"` Dockerfile instruction. Instead by calling `ENTRYPOINT ["su", "-", "user"]` the supplementary groups will be set up properly.Referenceshttps://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/For more informationIf you have any questions or comments about this advisory:[Open an issue](https://github.com/moby/moby/issues/new)Email us at [[email protected]](mailto:[email protected])
|
[] | null | 5.3 | null | null | null |
GHSA-39rq-5648-q49j
|
Unspecified vulnerability on the HP ProCurve JC###A, JC###B, JD###A, JD###B, JE###A, JF###A, JF###B, JF###C, JG###A, 658250-B21, and 658247-B21; HP 3COM routers and switches; and HP H3C routers and switches allows remote authenticated users to execute arbitrary code or obtain sensitive information via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-3h7g-j24x-p7v7
|
** DISPUTED ** Unspecified vulnerability in the grsecurity patch has unspecified impact and remote attack vectors, a different vulnerability than the expand_stack vulnerability from the Digital Armaments 20070110 pre-advisory. NOTE: the grsecurity developer has disputed this issue, stating that "the function they claim the vulnerability to be in is a trivial function, which can, and has been, easily checked for any supposed vulnerabilities." The developer also cites a past disclosure that was not proven.
|
[] | null | null | null | null | null |
|
CVE-2024-29821
|
Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.
|
[
"cpe:2.3:a:ivanti:desktop_\\&_server_management:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
CVE-2018-7677
|
CSRF in NetIQ Access Manager (NAM) Identity Server component
|
A CSRF exposure exists in NetIQ Access Manager (NAM) 4.4 Identity Server component.
|
[
"cpe:2.3:a:netiq:access_manager:4.4:*:*:*:*:*:*:*"
] | null | null | 3.5 | null | null |
CVE-2004-0503
|
Microsoft Outlook 2003 allows remote attackers to bypass the default zone restrictions and execute script within media files via a Rich Text Format (RTF) message containing an OLE object for the Windows Media Player, which bypasses Media Player's setting to disallow scripting and may lead to unprompted installation of an executable when exploited in conjunction with predictable-file-location exposures such as CVE-2004-0502.
|
[
"cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-3qjj-43rh-65fq
|
Unspecified vulnerability in Support Tools Manager (xstm, cstm, and stm) on HP-UX B.11.11 and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2023-2936
|
Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-41445
|
Library MDF (mdflib) v2.1 is vulnerable to a heap-based buffer overread via a crafted mdf4 file is parsed using the ReadData function
|
[
"cpe:2.3:a:ihedvall:mdf_library:2.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2014-2125
|
Cross-site scripting (XSS) vulnerability in the Web Inbox in Cisco Unity Connection 8.6(2a)SU3 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCui33028.
|
[
"cpe:2.3:a:cisco:unity_connection:*:\\(2a\\)su3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6:\\(1\\):*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6:\\(2\\):*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6:\\(2a\\)su1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6:\\(2a\\)su2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unity_connection:8.6\\(2a\\):*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-48835
|
scsi: mpt3sas: Page fault in reply q processing
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: mpt3sas: Page fault in reply q processing
A page fault was encountered in mpt3sas on a LUN reset error path:
[ 145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) smid(3) msix_index(0)
[ 145.778932] scsi 1:0:0:0: task abort: FAILED scmd(0x0000000024ba29a2)
[ 145.817307] scsi 1:0:0:0: attempting device reset! scmd(0x0000000024ba29a2)
[ 145.827253] scsi 1:0:0:0: [sg1] tag#2 CDB: Receive Diagnostic 1c 01 01 ff fc 00
[ 145.837617] scsi target1:0:0: handle(0x0002), sas_address(0x500605b0000272b9), phy(0)
[ 145.848598] scsi target1:0:0: enclosure logical id(0x500605b0000272b8), slot(0)
[ 149.858378] mpt3sas_cm1: Poll ReplyDescriptor queues for completion of smid(0), task_type(0x05), handle(0x0002)
[ 149.875202] BUG: unable to handle page fault for address: 00000007fffc445d
[ 149.885617] #PF: supervisor read access in kernel mode
[ 149.894346] #PF: error_code(0x0000) - not-present page
[ 149.903123] PGD 0 P4D 0
[ 149.909387] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 149.917417] CPU: 24 PID: 3512 Comm: scsi_eh_1 Kdump: loaded Tainted: G S O 5.10.89-altav-1 #1
[ 149.934327] Hardware name: DDN 200NVX2 /200NVX2-MB , BIOS ATHG2.2.02.01 09/10/2021
[ 149.951871] RIP: 0010:_base_process_reply_queue+0x4b/0x900 [mpt3sas]
[ 149.961889] Code: 0f 84 22 02 00 00 8d 48 01 49 89 fd 48 8d 57 38 f0 0f b1 4f 38 0f 85 d8 01 00 00 49 8b 45 10 45 31 e4 41 8b 55 0c 48 8d 1c d0 <0f> b6 03 83 e0 0f 3c 0f 0f 85 a2 00 00 00 e9 e6 01 00 00 0f b7 ee
[ 149.991952] RSP: 0018:ffffc9000f1ebcb8 EFLAGS: 00010246
[ 150.000937] RAX: 0000000000000055 RBX: 00000007fffc445d RCX: 000000002548f071
[ 150.011841] RDX: 00000000ffff8881 RSI: 0000000000000001 RDI: ffff888125ed50d8
[ 150.022670] RBP: 0000000000000000 R08: 0000000000000000 R09: c0000000ffff7fff
[ 150.033445] R10: ffffc9000f1ebb68 R11: ffffc9000f1ebb60 R12: 0000000000000000
[ 150.044204] R13: ffff888125ed50d8 R14: 0000000000000080 R15: 34cdc00034cdea80
[ 150.054963] FS: 0000000000000000(0000) GS:ffff88dfaf200000(0000) knlGS:0000000000000000
[ 150.066715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 150.076078] CR2: 00000007fffc445d CR3: 000000012448a006 CR4: 0000000000770ee0
[ 150.086887] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 150.097670] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 150.108323] PKRU: 55555554
[ 150.114690] Call Trace:
[ 150.120497] ? printk+0x48/0x4a
[ 150.127049] mpt3sas_scsih_issue_tm.cold.114+0x2e/0x2b3 [mpt3sas]
[ 150.136453] mpt3sas_scsih_issue_locked_tm+0x86/0xb0 [mpt3sas]
[ 150.145759] scsih_dev_reset+0xea/0x300 [mpt3sas]
[ 150.153891] scsi_eh_ready_devs+0x541/0x9e0 [scsi_mod]
[ 150.162206] ? __scsi_host_match+0x20/0x20 [scsi_mod]
[ 150.170406] ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[ 150.178925] ? blk_mq_tagset_busy_iter+0x45/0x60
[ 150.186638] ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[ 150.195087] scsi_error_handler+0x3a5/0x4a0 [scsi_mod]
[ 150.203206] ? __schedule+0x1e9/0x610
[ 150.209783] ? scsi_eh_get_sense+0x210/0x210 [scsi_mod]
[ 150.217924] kthread+0x12e/0x150
[ 150.224041] ? kthread_worker_fn+0x130/0x130
[ 150.231206] ret_from_fork+0x1f/0x30
This is caused by mpt3sas_base_sync_reply_irqs() using an invalid reply_q
pointer outside of the list_for_each_entry() loop. At the end of the full
list traversal the pointer is invalid.
Move the _base_process_reply_queue() call inside of the loop.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-f69c-c87p-g4rh
|
This issue was addressed through improved state management. This issue is fixed in iOS 17.5 and iPadOS 17.5. An attacker with physical access to a device may be able to disable Stolen Device Protection.
|
[] | null | 9.1 | null | null | null |
|
GHSA-4hqp-qgvw-892g
|
Insufficient script validation of the admin page enables XSS, which causes unauthorized users to steal admin privileges. When uploading file in a specific menu, the verification of the files is insufficient. It allows remote attackers to upload arbitrary files disguising them as image files.
|
[] | null | 6.1 | null | null | null |
|
CVE-2019-9929
|
Northern.tech CFEngine Enterprise 3.12.1 has Insecure Permissions.
|
[
"cpe:2.3:a:northern:cfengine:3.12.1:*:*:*:enterprise:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-ccv7-gxf5-xxcc
|
The Logback component in Terminalfour before 8.3.14.1 allows OS administrators to obtain sensitive information from application server logs when debug logging is enabled. The fixed versions are 8.2.18.7, 8.2.18.2.2, 8.3.11.1, and 8.3.14.1.
|
[] | null | 4.9 | null | null | null |
|
GHSA-j8rm-cj64-mfw6
|
family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.
|
[] | null | null | null | null | null |
|
GHSA-757r-jmm6-p24p
|
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
|
[] | null | null | 7.4 | null | null |
|
GHSA-854q-hrj6-hq2f
|
Directory traversal vulnerability in the loadConfig function in index.php in phpWebSite 0.10.2 and earlier allows remote attackers to include arbitrary local files and execute arbitrary PHP code via the hub_dir parameter, as demonstrated by including access_log. NOTE: in some cases, arbitrary remote file inclusion could be performed under PHP 5 using an SMB share argument such as "\\systemname\sharename".
|
[] | null | null | null | null | null |
|
GHSA-2cvh-5946-f6w5
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Check pipe offset before setting vblankpipe_ctx has a size of MAX_PIPES so checking its index before accessing
the array.This fixes an OVERRUN issue reported by Coverity.
|
[] | null | null | null | null | null |
|
CVE-2019-5045
|
A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.
|
[
"cpe:2.3:a:gonitro:nitropdf:12.12.1.522:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-xq5r-4h6f-r3gp
|
A Stack-based Buffer Overflow issue was discovered in Emerson Process Management ControlWave Micro Process Automation Controller: ControlWave Micro [ProConOS v.4.01.280] firmware: CWM v.05.78.00 and prior. A stack-based buffer overflow vulnerability caused by sending crafted packets on Port 20547 could force the PLC to change its state into halt mode.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2023:3108
|
Red Hat Security Advisory: webkit2gtk3 security update
|
webkitgtk: Regression of CVE-2023-28205 fixes in the Red Hat Enterprise Linux
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null | null |
CVE-2025-6250
|
Privilege Management for Windows - Elevation of Privilege
|
Prior to 25.4.270.0, when wmic.exe is elevated with a full admin token the user can stop the Defendpoint service, bypassing anti-tamper protections. Once the service is disabled, the malicious user can add themselves to Administrators group and run any process with elevated permissions.
|
[] | 7.1 | null | null | null | null |
GHSA-jv2q-vcmw-2c62
|
A vulnerability was found in code-projects Job Diary 1.0 and classified as critical. This issue affects some unknown processing of the file /view-details.php. The manipulation of the argument job_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-3xj2-xvqh-gvp5
|
Elevation of privilege vulnerability in GE HealthCare EchoPAC products
|
[] | null | 8.4 | null | null | null |
|
GHSA-v2jp-3gq5-h2jm
|
The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
|
[] | null | null | 7.5 | null | null |
|
CVE-2012-1419
|
The TAR file parser in ClamAV 0.96.4 and Quick Heal (aka Cat QuickHeal) 11.00 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial [aliases] character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
|
[
"cpe:2.3:a:cat:quick_heal:11.00:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4hmr-hm34-jj9g
|
A Command Injection vulnerability exists in formWriteFacMac of the httpd binary in Tenda AC9 v15.03.06.42. As a result, attacker can execute OS commands with root privileges.
|
[] | null | 9.8 | null | null | null |
|
CVE-2009-1615
|
Unrestricted file upload vulnerability in Leap CMS 0.1.4 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via an admin.system.files (aka Manage Files) request to the default URI, then accessing the file via a direct request.
|
[
"cpe:2.3:a:gowondesigns:leap:0.1.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-vp38-57w4-9685
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.
|
[] | null | 4.3 | null | null | null |
|
CVE-2008-1640
|
SQL injection vulnerability in jgs_treffen.php in the JGS-XA JGS-Treffen 2.0.2 and earlier addon for Woltlab Burning Board (wBB) allows remote attackers to execute arbitrary SQL commands via the view_id parameter in an ansicht action.
|
[
"cpe:2.3:a:jgs-xa:jgs_treffen:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jgs-xa:jgs_treffen:2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-mv4c-6fpc-r32q
|
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
|
[] | null | null | null | null | null |
|
GHSA-xwfv-fh69-vfc3
|
IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
|
[] | null | null | null | null | null |
|
CVE-2025-27015
|
WordPress Hostiko Theme < 30.1 - Local File Inclusion vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in designingmedia Hostiko allows PHP Local File Inclusion.This issue affects Hostiko: from n/a before 30.1.
|
[] | null | 7.5 | null | null | null |
GHSA-crh9-79wp-32wv
|
Improper input validation in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | null | null | null | null |
|
CVE-2022-3430
|
A potential vulnerability in the WMI Setup driver on some consumer Lenovo Notebook devices may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.
|
[
"cpe:2.3:o:lenovo:d330-10igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:d330-10igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_pro_16iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_pro_16iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_pro_16arh7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_pro_16arh7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_duet_3_10igl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_duet_3_10igl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_16arh7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_16arh7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_imp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_imp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-14are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_slim_7-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_slim_7-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_slim_7-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_slim_7-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_slim_7-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_slim_7-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_13x_itg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_13x_itg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g2_are_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g2_are:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g2_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g2_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g3_acl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g3_acl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g3_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g3_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g4\\+_ara_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g4\\+_ara:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14_g4\\+_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14_g4\\+_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14p_g3_arh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14p_g3_arh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14s_yoga_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14s_yoga_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15_g2_are_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15_g2_are:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15_g2_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15_g2_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15_g3_acl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15_g3_acl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15_g3_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15_g3_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15_gd_aba_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15_g4_aba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_g2_ith_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_g2_ith:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_16_g4\\+_ara_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_16_g4\\+_ara:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_16_g4\\+_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_16_g4\\+_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_16p_g3_arh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_16p_g3_arh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_16p_nx_arh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_16p_nx_arh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_plus_g2_itg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_plus_g2_itg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_plus_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_plus_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_creator_7-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_creator_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_duet_7-13iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_duet_7-13iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_duet_7-13itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_duet_7-13itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_duet_7-13itl6-lte_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_duet_7-13itl6-lte:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro_16arh7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro_16arh7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7-15itl05:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
CVE-2018-1859
|
IBM API Connect 5.0.0.0 through 5.0.8.4 could allow a user authenticated as an administrator with limited rights to escalate their privileges. IBM X-Force ID: 151258.
|
[
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
RHSA-2024:7819
|
Red Hat Security Advisory: buildah security update
|
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2024-13906
|
Gallery by BestWebSoft – Customizable Image and Photo Galleries for WordPress <= 4.7.3 - Authenticated (Administrator+) PHP Object Injection
|
The Gallery by BestWebSoft – Customizable Image and Photo Galleries for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.7.3 via deserialization of untrusted input in the 'import_gallery_from_csv' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
|
[] | null | 7.2 | null | null | null |
CVE-2022-3622
|
The Blog2Social plugin for WordPress is vulnerable to authorization bypass due to missing capability checks in versions up to, and including, 6.9.11. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change some plugin settings intended to be modifiable by admins only.
|
[
"cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*"
] | null | 4.7 | null | null | null |
|
GHSA-rj5f-wj63-xvgc
|
IBM Maximo Asset Management 7.6.1.1, 7.6.1.2, 7.6.1.3 and the IBM Maximo Manage 8.3, 8.4 application in IBM Maximo Application Suite are vulnerable to CSV injection. IBM X-Force ID: 2306335.
|
[] | null | 8.8 | null | null | null |
|
CVE-2018-6267
|
NVIDIA Tegra OpenMax driver (libnvomx) contains a vulnerability in which the software does not validate or incorrectly validates input that can affect the control flow or data flow of a program, which may lead to denial of service or escalation of privileges. Android ID: A-70857947.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-m665-jg8v-5m5r
|
The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-27400
|
HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1
|
[
"cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2021:3703
|
Red Hat Security Advisory: virt:av and virt-devel:av security and bug fix update
|
QEMU: net: Infinite loop in loopback mode may lead to stack overflow libvirt: Insecure sVirt label generation libvirt: Improper locking on ACL failure in virStoragePoolLookupByTargetPath API QEMU: usbredir: free() call on invalid pointer in bufp_alloc() ntfs-3g: Out-of-bounds heap buffer access in ntfs_get_attribute_value() due to incorrect check of bytes_in_use value in MFT records ntfs-3g: Heap buffer overflow triggered by a specially crafted Unicode string ntfs-3g: Heap buffer overflow in ntfs_attr_pread_i() triggered by specially crafted NTFS attributes ntfs-3g: Heap buffer overflow triggered by a specially crafted MFT section ntfs-3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname ntfs-3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections ntfs-3g: Heap buffer overflow in ntfs_inode_real_open() triggered by a specially crafted NTFS inode ntfs-3g: Heap buffer overflow in ntfs_attr_setup_flag() triggered by a specially crafted NTFS attribute from MFT ntfs-3g: NULL pointer dereference in ntfs_extent_inode_open() ntfs-3g: Out-of-bounds read in ntfs_ie_lookup() ntfs-3g: Out-of-bounds read in ntfs_runlists_merge_i() ntfs-3g: Integer overflow in memmove() leading to heap buffer overflow in ntfs_attr_record_resize() ntfs-3g: Out-of-bounds read ntfs_attr_find_in_attrdef() triggered by an invalid attribute ntfs-3g: Heap buffer overflow in ntfs_inode_lookup_by_name() ntfs-3g: Endless recursion from ntfs_attr_pwrite() triggered by an unallocated bitmap ntfs-3g: Out-of-bounds reads in ntfs_attr_find() and ntfs_external_attr_find() ntfs-3g: Out-of-bounds access in ntfs_inode_lookup_by_name() caused by an unsanitized attribute length ntfs-3g: Out-of-bounds access in ntfs_inode_sync_standard_information() ntfs-3g: Heap buffer overflow in ntfs_compressed_pwrite() ntfs-3g: Out-of-bounds access in ntfs_decompress() ntfs-3g: Heap buffer overflow in ntfs_get_attribute_value() caused by an unsanitized attribute
|
[
"cpe:/a:redhat:advanced_virtualization:8.4::el8"
] | null | 7.8 | null | null | null |
GHSA-f3r5-jm79-fwqg
|
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
|
[] | null | 3.3 | null | null | null |
|
GHSA-q6qp-q45j-jv6w
|
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
|
[] | null | 8.8 | null | null | null |
|
GHSA-q5hg-75fp-r6wm
|
A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists in Easergy T300 (firmware 2.7 and older), that would allow an attacker to trick a user into initiating an unintended action.
|
[] | null | null | null | null | null |
|
RHSA-2024:0772
|
Red Hat Security Advisory: squid:4 security update
|
squid: DoS against HTTP and HTTPS squid: Denial of Service in SSL Certificate validation squid: NULL pointer dereference in the gopher protocol code squid: Buffer over-read in the HTTP Message processing feature squid: Incorrect Check of Function Return Value In Helper Process management squid: denial of service in HTTP request parsing squid-cache: Squid Buffer Overflow
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.9 | null | null | null |
GHSA-fw2v-8868-mpvm
|
Cross-Site Request Forgery (CSRF) vulnerability in Infoway LLC Ebook Downloader allows Cross Site Request Forgery. This issue affects Ebook Downloader: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-34398
|
Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Some values of this table are serialized archive according boost library. The boost library contains a vulnerability/null pointer dereference.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-26088
|
An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the "number of recipients" field. NOTE: the vendor's position is that "no real impact is demonstrated."
|
[
"cpe:2.3:a:bmc:remedy_it_service_management_suite:20.02:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2020-3968
|
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
|
[
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*"
] | null | 8.2 | null | 4.6 | null |
|
CVE-2005-0261
|
lspath in AIX 5.2, 5.3, and possibly earlier versions, does not drop privileges before processing the -f option, which allows local users to read one line of arbitrary files.
|
[
"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2017-8580
|
Win32k in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8577, CVE-2017-8578, CVE-2017-8581, and CVE-2017-8467.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | null | 7 | 6.2 | null |
|
CVE-2007-2874
|
Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora NetworkManager package before 0.6.5-3.fc7 allows user-assisted remote attackers to execute arbitrary code via malformed frames on a WPA2 network. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:o:redhat:fedora_core:*:*:networkmanager:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-hqwp-qwfv-mhrx
|
The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
|
[] | null | 5.6 | null | null | null |
|
GHSA-8x47-7hq5-rq2m
|
There is a DDE injection vulnerability in the GoldenDB database product. Attackers can inject DDE expressions through the interface, and when users download and open the affected file, the DDE commands can be executed.
|
[] | null | 8.4 | null | null | null |
|
CVE-2023-37533
|
HCL Connections is vulnerable to reflected cross-site scripting
|
HCL Connections is vulnerable to reflected cross-site scripting (XSS) where an attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user after visiting the vulnerable URL which contains the malicious script code. This may allow the attacker to steal cookie-based authentication credentials and comprise a user's account then launch other attacks.
|
[
"cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
CVE-2020-10412
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-csv.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-4jq3-g2q7-4pr6
|
A vulnerability was found in SourceCodester Simple Invoice Generator System 1.0 and classified as problematic. This issue affects some unknown processing of the file login.php. The manipulation of the argument cashier leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247343.
|
[] | null | 4.3 | null | null | null |
|
CVE-2024-39797
|
Improper access control in some drivers for Intel(R) Ethernet Connection I219 Series before version 12.19.1.39 may allow an authenticated user to potentially enable denial of service via local access.
|
[] | 5.7 | 6.5 | null | null | null |
|
RHSA-2021:2419
|
Red Hat Security Advisory: dhcp security update
|
dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient
|
[
"cpe:/o:redhat:rhel_els:6"
] | null | 8.8 | null | null | null |
GHSA-8wqq-xrhr-w6mf
|
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-46799
|
net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX
|
In the Linux kernel, the following vulnerability has been resolved:
net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX
If number of TX queues are set to 1 we get a NULL pointer
dereference during XDP_TX.
~# ethtool -L eth0 tx 1
~# ./xdp-trafficgen udp -A <ipv6-src> -a <ipv6-dst> eth0 -t 2
Transmitting on eth0 (ifindex 2)
[ 241.135257] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030
Fix this by using actual TX queues instead of max TX queues
when picking the TX channel in am65_cpsw_ndo_xdp_xmit().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2011-2468
|
Directory traversal vulnerability in the web interface in AnyMacro Mail System G4X allows remote attackers to read arbitrary files via directory traversal sequences in a request.
|
[
"cpe:2.3:a:anymacro:anymacro_mail_system:g4x:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2011-3685
|
Tembria Server Monitor before 6.0.5 Build 2252 uses a substitution cipher to encrypt application credentials, which allows local users to obtain sensitive information by leveraging read access to (1) authentication.dat or (2) XML files in the Exports directory.
|
[
"cpe:2.3:a:tembria:server_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tembria:server_monitor:6.0.3:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2022-38539
|
Archery v1.7.5 to v1.8.5 was discovered to contain a SQL injection vulnerability via the where parameter at /archive/apply.
|
[
"cpe:2.3:a:archerydms:archery:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-4q98-jf5r-gpmg
|
In findAvailSpellCheckerLocked of TextServicesManagerService.java, there is a possible way to bypass the warning dialog when selecting an untrusted spell checker due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0Android ID: A-118694079
|
[] | null | null | 7.8 | null | null |
|
GHSA-pjh6-2v65-x4fj
|
STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
|
[] | null | 7.5 | null | null | null |
|
GHSA-h5pq-6h5f-x885
|
EMC RSA Archer, versions prior to 6.2.0.8, contains a redirect vulnerability in the QuickLinks feature. A remote attacker may potentially exploit this vulnerability to redirect genuine users to phishing websites with the intent of obtaining sensitive information from the users.
|
[] | null | null | 6.1 | null | null |
|
CVE-2020-2882
|
Vulnerability in the Oracle Human Resources product of Oracle E-Business Suite (component: Hierarchy Diagrammers). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Human Resources. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Human Resources accessible data as well as unauthorized access to critical data or complete access to all Oracle Human Resources accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:human_resources:*:*:*:*:*:*:*:*"
] | null | null | 8.1 | null | null |
|
GHSA-3vhm-28vh-hww9
|
Stack-based buffer overflow in the TEA decoding algorithm in RhinoSoft Serv-U FTP server 7.0.0.1, 9.0.0.5, and other versions before 9.1.0.0 allows remote attackers to execute arbitrary code via a long hexadecimal string.
|
[] | null | null | null | null | null |
|
CVE-2007-2381
|
The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
|
[
"cpe:2.3:a:mochikit:mochikit_framework:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2007-6291
|
SQL injection vulnerability in abm.aspx in Xigla Absolute Banner Manager .NET 4.0 allows remote attackers to execute arbitrary SQL commands via the z parameter.
|
[
"cpe:2.3:a:xigla:absolute_banner_manager.net:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-255p-hfwr-9qm4
|
This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4. An app with root privileges may be able to access private information.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-1087
|
Arbitrary Code Execution in Kong Insomnia Desktop Application
|
Kong Insomnia Desktop Application before 11.0.2 contains a template injection vulnerability that allows attackers to execute arbitrary code. The vulnerability exists due to insufficient validation of user-supplied input when processing template strings, which can lead to arbitrary JavaScript execution in the context of the application.
|
[] | 9.3 | null | null | null | null |
GHSA-vv5r-9wcq-cqcm
|
The impacted products, when configured to use SSO, are affected by an improper authentication vulnerability. This vulnerability allows the application to accept manual entry of any active directory (AD) account provisioned in the application without supplying a password, resulting in access to the application as the supplied AD account, with all associated privileges.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-7271
|
IrfanView CADImage Plugin DXF File Parsing Memory Corruption Remote Code Execution Vulnerability
|
IrfanView CADImage Plugin DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView CADImage Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26193.
|
[] | null | null | 7.8 | null | null |
GHSA-7cjm-g6f3-rgvg
|
A stored Cross-site scripting (XSS) vulnerability in Portainer through 1.19.1 allows remote authenticated users to inject arbitrary JavaScript and/or HTML via the Team Name field.
|
[] | null | null | 5.4 | null | null |
|
GHSA-fq4h-m3c8-8m2v
|
Improper Privilege Management in NocoDB
|
Improper Privilege Management in GitHub repository nocodb/nocodb prior to 0.91.8.
|
[] | null | 8.8 | null | null | null |
GHSA-4h9r-5ghh-22g9
|
Stormshield Network Security (SNS) 1.0.0 through 4.2.3 allows a Denial of Service.
|
[] | null | null | null | null | null |
|
CVE-2024-49909
|
drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func
This commit adds a null check for the set_output_gamma function pointer
in the dcn32_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null, but then it was being
dereferenced without any null check. This could lead to a null pointer
dereference if set_output_gamma is null.
To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-h3vv-p837-jj7r
|
A vulnerability identified in Advance Authentication that allows bash command Injection in administrative controlled functionality of backup due to improper
handling in provided command parameters. This issue affects NetIQ Advance Authentication version before 6.3.5.1.
|
[] | null | 5.1 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.