id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-v9h5-mm27-9j99
|
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6w7q-qww7-p95w
|
A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to inefficient regular expression complexity. It is recommended to upgrade the affected component.
|
[] | 6.9 | 5.7 | null | null | null |
|
CVE-2007-3080
|
SQL injection vulnerability in haberoku.asp in Hunkaray Okul Portaly 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:hunkaray_okul:portaly:1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-1883
|
Improper Access Control in thorsten/phpmyfaq
|
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
GHSA-348p-j6mh-fgrx
|
Cross-site scripting (XSS) vulnerability in dspStats.php in PowerPhlogger 2.2.5 allows remote attackers to inject arbitrary web script or HTML via the edit parameter.
|
[] | null | null | null | null | null |
|
CVE-2005-3024
|
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.
|
[
"cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-9008
|
itsourcecode Online Tour and Travel Management System sms_setting.php sql injection
|
A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/sms_setting.php. The manipulation of the argument uname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2018-13637
|
The mintToken function of a smart contract implementation for CikkaCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:cikkaa:cikkacoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2013:0841
|
Red Hat Security Advisory: kernel security update
|
kernel: perf_swevent_enabled array out-of-bound access
|
[
"cpe:/o:redhat:rhel_eus:6.1"
] | null | null | null | null | null |
CVE-2025-49258
|
WordPress Maia <= 1.1.15 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Maia allows PHP Local File Inclusion. This issue affects Maia: from n/a through 1.1.15.
|
[] | null | 8.1 | null | null | null |
GHSA-g6hx-g7jj-f2v5
|
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
|
[] | null | null | null | null | null |
|
GHSA-mrff-5fq9-xcxc
|
MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string.
|
[] | null | null | null | null | null |
|
CVE-2012-0539
|
Unspecified vulnerability in Oracle Sun Solaris 8, 9, and 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to (1) bsmconv and (2) bsmunconv.
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
ICSA-19-094-03
|
Rockwell Automation Stratix 5400/5410/5700/8000/8300 and ArmorStratix 5700
|
Sending a specially crafted open shortest path first version 3 (OSPFv3) packet could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial-of-service condition.CVE-2018-0466 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a malformed HTTP packet in the web framework of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition on an affected device, resulting in a denial-of-service condition.CVE-2018-0470 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a custom precision time protocol (PTP) packet to or through an affected device could allow an unauthenticated remote attacker to cause a denial-of-service condition of PTP, which may result in time synchronization issues across the network.CVE-2018-0473 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Sending a malicious IPv6 packet to or through the affected device could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial-of-service condition.CVE-2018-0467 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H). Sending a high rate of Cisco discovery protocol packets to an affected device could allow an unauthenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial-of-service condition.CVE-2018-15373 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
|
[] | null | null | 7.4 | null | null |
RHSA-2019:3165
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | 7 | null | null |
GHSA-hj5v-574p-mj7c
|
py vulnerable to Regular Expression Denial of Service
|
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
|
[] | 8.7 | 7.5 | null | null | null |
RHSA-2019:2130
|
Red Hat Security Advisory: libreoffice security and bug fix update
|
libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.8 | null | null |
GHSA-mhv9-pjh5-g3cf
|
DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367
|
[] | null | 6.4 | null | null | null |
|
GHSA-fwrf-6v6g-jrvx
|
A hard-coded password vulnerability has been reported to affect earlier versions of QES. If exploited, this vulnerability could allow attackers to log in with a hard-coded password. QNAP has already fixed the issue in QES 2.1.1 Build 20200515 and later.
|
[] | null | null | null | null | null |
|
GHSA-jxq3-2hwh-v5qg
|
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
[] | null | 7.2 | null | null | null |
|
GHSA-qmhg-2cm5-r44c
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-cv5w-c2ph-vhhw
|
Improper check or handling of exceptional conditions vulnerability
affecting Vonetsindustrial wifi bridge relays and wifi bridge repeaters, software versions 3.3.23.6.9 and prior, enable an unauthenticated
remote attacker to cause a denial of service. A specially-crafted
HTTP request to pre-authentication resources can crash the service.
|
[] | 9.4 | 9.1 | null | null | null |
|
GHSA-rp86-6w48-vm5m
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an integer overflow vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | 6.5 | null | null |
|
CVE-2021-39723
|
Product: AndroidVersions: Android kernelAndroid ID: A-209014813References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-gjj8-m83c-qv9h
|
Cross-site Scripting in evershop
|
Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted scripts to the Admin Panel.
|
[] | null | 6.1 | null | null | null |
GHSA-p83v-cqh9-x6qv
|
A vulnerability was found in Campcodes Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edit_branch.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2.1 | 6.3 | null | null | null |
|
CVE-2021-25446
|
Improper access control vulnerability in SmartThings prior to version 1.7.67.25 allows untrusted applications to cause arbitrary webpage loading in webview.
|
[
"cpe:2.3:o:samsung:smartthings_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:smartthings:-:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
RHSA-2020:2367
|
Red Hat Security Advisory: Red Hat support for Spring Boot 2.1.13 security and bug fix update
|
undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS undertow: AJP File Read/Inclusion Vulnerability tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
|
[
"cpe:/a:redhat:openshift_application_runtimes:1.0"
] | null | 7.6 | 7.5 | null | null |
RHSA-2021:2051
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update
|
velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null | null |
GHSA-xprp-4qjc-gqwc
|
Security keys are logged when any WCDMA call is configured or reconfigured in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX20, SXR1130
|
[] | null | null | 5.5 | null | null |
|
PYSEC-2020-93
| null |
A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.
|
[] | null | null | null | null | null |
CVE-2021-1985
|
Possible buffer over read due to lack of data length check in QVR Service configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
|
[
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
GHSA-7f3f-x5f5-79gw
|
Salt's file contents overwrite the VirtKey class
|
File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.
|
[] | null | 5.6 | null | null | null |
CVE-2013-5057
|
hxds.dll in Microsoft Office 2007 SP3 and 2010 SP1 and SP2 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted COM component on a web site that is visited with Internet Explorer, as exploited in the wild in December 2013, aka "HXDS ASLR Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp1:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6vgw-7v97-h3ch
|
The Hide My WP WordPress plugin before 6.2.9 does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
[] | null | 9.8 | null | null | null |
|
CVE-2024-24567
|
raw_call `value=` kwargs not disabled for static and delegate calls
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compiler allows passing a value in builtin raw_call even if the call is a delegatecall or a staticcall. But in the context of delegatecall and staticcall the handling of value is not possible due to the semantics of the respective opcodes, and vyper will silently ignore the value= argument. If the semantics of the EVM are unknown to the developer, he could suspect that by specifying the `value` kwarg, exactly the given amount will be sent along to the target. This vulnerability affects 0.3.10 and earlier versions.
|
[
"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*"
] | null | 4.8 | null | null | null |
GHSA-xprq-8xww-262w
|
SQL Injection exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-galleries&method=save Gallery[id] or Gallery[title] parameter.
|
[] | null | null | 9.8 | null | null |
|
GHSA-28jm-hff2-853w
|
Directory traversal vulnerability in classes/imgsize.php in Gelato 0.95 allows remote attackers to read arbitrary files via (1) a .. (dot dot) and possibly (2) a full pathname in the img parameter. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-52xg-w6c8-rp56
|
Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php.
|
[] | null | null | null | null | null |
|
GHSA-72f8-gmgh-g95g
|
Pexip Infinity 23.x before 23.3 has improper input validation, leading to a temporary software abort via RTP.
|
[] | null | null | null | null | null |
|
RHSA-2019:2949
|
Red Hat Security Advisory: httpd24-httpd and httpd24-nghttp2 security update
|
HTTP/2: large amount of data requests leads to denial of service HTTP/2: flood using PRIORITY frames results in excessive resource consumption HTTP/2: request for large response leads to denial of service
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.5 | null | null |
CVE-2024-42762
|
A Stored Cross Site Scripting (XSS) vulnerability was found in "/history.php" in Kashipara Bus Ticket Reservation System v1.0, which allows remote attackers to execute arbitrary code via the Name, Phone, and Email parameter fields.
|
[
"cpe:2.3:a:kashipara:bus_ticket_reservation_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
CVE-2024-10793
|
WP Activity Log <= 5.2.1 - Unauthenticated Stored Cross-Site Scripting via User_id Parameter
|
The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user_id parameter in all versions up to, and including, 5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page.
|
[
"cpe:2.3:a:melapress:wp_activity_log:*:*:*:*:*:*:*:*",
"cpe:2.3:a:melapress:wp_activity_log:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | null | null |
CVE-2010-1197
|
Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
|
[
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2014-9998
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, IPQ8064, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, QCA4531, QCA6174A, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, QCA9558, QCA9880, QCA9886, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 625, SD 808, SD 810, SD 820, and SDX20, while processing firmware image signature, the internal buffer may overflow if the firmware signature size is large.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9378_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-gv3v-92v6-m48j
|
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
|
ImpactCross Site ScriptingCache PoisoningPage HijackingPatchesThis was fixed in version `2.2.1`.WorkaroundsIf you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters.References[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability.Root CauseThis roots cause back to this line in the Jooby codebase:https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting.Reported ByThis vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh))For more informationIf you have any questions or comments about this advisory:Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)
|
[] | null | 9.8 | null | null | null |
CVE-2024-42259
|
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
|
In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
Calculating the size of the mapped area as the lesser value
between the requested size and the actual size does not consider
the partial mapping offset. This can cause page fault access.
Fix the calculation of the starting and ending addresses, the
total size is now deduced from the difference between the end and
start addresses.
Additionally, the calculations have been rewritten in a clearer
and more understandable form.
[Joonas: Add Requires: tag]
Requires: 60a2066c5005 ("drm/i915/gem: Adjust vma offset for framebuffer mmap offset")
(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-c359-g3mh-v8vw
|
DECISO OPNsense 23.1 does not impose rate limits for authentication, allowing attackers to perform a brute-force attack to bypass authentication.
|
[] | null | 9.8 | null | null | null |
|
GHSA-92qh-jj8j-74cv
|
In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., by sdb.cc), which allows local users to gain the privileges of other users via a procedure in a file under /tmp. NOTE: this CVE Record is about sdb.cc and similar files in the Singular interface that have predictable /tmp pathnames; this CVE Record is not about the lack of a safe temporary-file creation capability in the Singular language.
|
[] | null | 7.8 | null | null | null |
|
ICSA-24-226-04
|
Rockwell Automation Pavilion8
|
A vulnerability exists in the affected product due to lack of encryption of sensitive information. The vulnerability results in data being sent between the Console and the Dashboard without encryption, which can be seen in the logs of proxy servers, potentially impacting the data's confidentiality.
|
[] | null | 7.4 | null | null | null |
GHSA-c2rq-57mc-g56m
|
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing SGI files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13356)
|
[] | null | null | null | null | null |
|
CVE-2006-4569
|
The popup blocker in Mozilla Firefox before 1.5.0.7 opens the "blocked popups" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
CVE-2008-6347
|
PHP remote file inclusion vulnerability in lib/onguma.class.php in the Onguma Time Sheet (com_ongumatimesheet20) 2.0 4b component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luigi_massa:onguma_time_sheet:2.04:beta:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-9pg9-hg9f-fw5m
|
Use after free in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null | null |
|
CVE-2022-39036
|
FLOWRING Agentflow BPM - Arbitrary File Upload
|
The file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.
|
[
"cpe:2.3:a:flowring:agentflow:4.0.0.1183.552:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2020-6949
|
A privilege escalation issue was discovered in the postUser function in HashBrown CMS through 1.3.3. An editor user can change the password hash of an admin user's account, or otherwise reconfigure that account.
|
[
"cpe:2.3:a:hashbrowncms:hashbrown_cms:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-8f9g-m2rf-c4h3
|
Cross-site scripting vulnerability in Help File search facility for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to embed scripts into another user's session.
|
[] | null | null | null | null | null |
|
GHSA-v269-87cf-4phh
|
Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity
|
[] | null | null | null | null | null |
|
GHSA-jwjc-9cxc-87j8
|
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-8835
|
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24320.
|
[
"cpe:2.3:a:pdf-xchange:pdf-tools:10.3.0.386:*:*:*:*:*:*:*",
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.3.0.386:*:*:*:*:*:*:*"
] | null | null | 3.3 | null | null |
GHSA-4f5g-64px-29pq
|
The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
|
[] | null | null | null | null | null |
|
CVE-2016-4851
|
Cross-site scripting (XSS) vulnerability in Let's PHP! simple chat before 2016-08-15 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:let\\'s_php\\!:simple_chat:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2011-0921
|
crs.exe in the Cell Manager Service in the client in HP Data Protector does not properly validate credentials associated with the hostname, domain, and username, which allows remote attackers to execute arbitrary code by sending unspecified data over TCP, related to the webreporting client, the applet domain, and the java username.
|
[
"cpe:2.3:a:hp:data_protector:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2022-4691
|
Cross-site Scripting (XSS) - Stored in usememos/memos
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
|
[
"cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*"
] | null | null | 8.3 | null | null |
CVE-2009-4890
|
Multiple cross-site scripting (XSS) vulnerabilities in the login application in vBook 4.2.17 allow remote attackers to inject arbitrary web script or HTML via the (1) title and (2) message parameters.
|
[
"cpe:2.3:a:retrieve:vbook:4.2.17:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2005-0649
|
Pixel-Apes SafeHTML before 1.2.1 allows remote attackers to bypass cross-site scripting (XSS) protection via "hexadecimal HTML entities."
|
[
"cpe:2.3:a:pixel-apes_group:safehtml:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-9742
|
gdwfpcd.sys in G Data Total Security before 2019-02-22 allows an attacker to bypass ACLs because Interpreted Device Characteristics lacks FILE_DEVICE_SECURE_OPEN and therefore files and directories "inside" the \\.\gdwfpcd device are not properly protected, leading to unintended impersonation or object creation.
|
[
"cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2020-0342
|
There is a possible out of bounds write due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-160812576
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-rhww-hxr5-7wfg
|
IrfanView version 4.44 (32bit) might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpFreeHeap+0x00000000000003ca."
|
[] | null | null | 7.8 | null | null |
|
CVE-2009-4529
|
InterVations NaviCOPA Web Server 3.0.1.2 and earlier allows remote attackers to obtain the source code for a web page via a trailing encoded space character in a URI, as demonstrated by /index.html%20 and /index.php%20 URIs.
|
[
"cpe:2.3:a:intervations:navicopa_web_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intervations:navicopa_web_server:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:intervations:navicopa_web_server:3.01:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2003-0653
|
The OSI networking kernel (sys/netiso) in NetBSD 1.6.1 and earlier does not use a BSD-required "PKTHDR" mbuf when sending certain error responses to the sender of an OSI packet, which allows remote attackers to cause a denial of service (kernel panic or crash) via certain OSI packets.
|
[
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2018-5431
|
TIBCO JasperReports Server Cross Site Scripting Vulnerability
|
The domain designer component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a vulnerability which may allow, in the context of a non-default permissions configuration, persisted cross-site scripting (XSS) attacks. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2.
|
[
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:*:activematrix_bpm:*:*",
"cpe:2.3:a:tibco:jasperreports_server:*:*:*:*:community:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jasperreports_server:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:jaspersoft:*:*:*:*:*:aws_with_multi-tenancy:*:*",
"cpe:2.3:a:tibco:jaspersoft_reporting_and_analytics:*:*:*:*:*:aws:*:*"
] | null | null | 6.3 | null | null |
GHSA-38xr-6jm2-v69w
|
The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
|
[] | null | null | null | null | null |
|
CVE-2023-30792
|
Anchor tag hrefs in Lexical prior to v0.10.0 would render javascript: URLs, allowing for cross-site scripting on link clicks in cases where input was being parsed from untrusted sources.
|
[
"cpe:2.3:a:facebook:lexical:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-wmf8-8vrp-cvhv
|
controllers/member/api.php in dayrui FineCms 5.0.11 has XSS related to the dirname variable.
|
[] | null | null | 6.1 | null | null |
|
GHSA-9g2q-jwhw-j832
|
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
|
[] | null | null | 7.5 | null | null |
|
CVE-2005-0129
|
The Quick Buttons feature in Konversation 0.15 allows remote attackers to execute certain IRC commands via a channel name containing "%" variables, which are recursively expanded by the Server::parseWildcards function when the Part Button is selected.
|
[
"cpe:2.3:a:berlios:konversation:0.15:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-2598
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: SQR). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 8.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
] | null | null | 8.7 | 5.5 | null |
|
CVE-2021-46983
|
nvmet-rdma: Fix NULL deref when SEND is completed with error
|
In the Linux kernel, the following vulnerability has been resolved:
nvmet-rdma: Fix NULL deref when SEND is completed with error
When running some traffic and taking down the link on peer, a
retry counter exceeded error is received. This leads to
nvmet_rdma_error_comp which tried accessing the cq_context to
obtain the queue. The cq_context is no longer valid after the
fix to use shared CQ mechanism and should be obtained similar
to how it is obtained in other functions from the wc->qp.
[ 905.786331] nvmet_rdma: SEND for CQE 0x00000000e3337f90 failed with status transport retry counter exceeded (12).
[ 905.832048] BUG: unable to handle kernel NULL pointer dereference at 0000000000000048
[ 905.839919] PGD 0 P4D 0
[ 905.842464] Oops: 0000 1 SMP NOPTI
[ 905.846144] CPU: 13 PID: 1557 Comm: kworker/13:1H Kdump: loaded Tainted: G OE --------- - - 4.18.0-304.el8.x86_64 #1
[ 905.872135] RIP: 0010:nvmet_rdma_error_comp+0x5/0x1b [nvmet_rdma]
[ 905.878259] Code: 19 4f c0 e8 89 b3 a5 f6 e9 5b e0 ff ff 0f b7 75 14 4c 89 ea 48 c7 c7 08 1a 4f c0 e8 71 b3 a5 f6 e9 4b e0 ff ff 0f 1f 44 00 00 <48> 8b 47 48 48 85 c0 74 08 48 89 c7 e9 98 bf 49 00 e9 c3 e3 ff ff
[ 905.897135] RSP: 0018:ffffab601c45fe28 EFLAGS: 00010246
[ 905.902387] RAX: 0000000000000065 RBX: ffff9e729ea2f800 RCX: 0000000000000000
[ 905.909558] RDX: 0000000000000000 RSI: ffff9e72df9567c8 RDI: 0000000000000000
[ 905.916731] RBP: ffff9e729ea2b400 R08: 000000000000074d R09: 0000000000000074
[ 905.923903] R10: 0000000000000000 R11: ffffab601c45fcc0 R12: 0000000000000010
[ 905.931074] R13: 0000000000000000 R14: 0000000000000010 R15: ffff9e729ea2f400
[ 905.938247] FS: 0000000000000000(0000) GS:ffff9e72df940000(0000) knlGS:0000000000000000
[ 905.938249] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 905.950067] nvmet_rdma: SEND for CQE 0x00000000c7356cca failed with status transport retry counter exceeded (12).
[ 905.961855] CR2: 0000000000000048 CR3: 000000678d010004 CR4: 00000000007706e0
[ 905.961855] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 905.961856] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 905.961857] PKRU: 55555554
[ 906.010315] Call Trace:
[ 906.012778] __ib_process_cq+0x89/0x170 [ib_core]
[ 906.017509] ib_cq_poll_work+0x26/0x80 [ib_core]
[ 906.022152] process_one_work+0x1a7/0x360
[ 906.026182] ? create_worker+0x1a0/0x1a0
[ 906.030123] worker_thread+0x30/0x390
[ 906.033802] ? create_worker+0x1a0/0x1a0
[ 906.037744] kthread+0x116/0x130
[ 906.040988] ? kthread_flush_work_fn+0x10/0x10
[ 906.045456] ret_from_fork+0x1f/0x40
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2013:0500
|
Red Hat Security Advisory: hplip security, bug fix and enhancement update
|
hplip: insecure temporary file handling hplip: insecure temporary file handling flaws
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
RHSA-2023:0652
|
Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update
|
golang: out-of-bounds read in golang.org/x/text/language leads to DoS prometheus/client_golang: Denial of service using InstrumentHandlerCounter
|
[
"cpe:/a:redhat:openshift:4.11::el8"
] | null | 7.5 | null | null | null |
GHSA-f62q-42c7-p38c
|
Trudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function.
|
[] | null | 5.4 | null | null | null |
|
CVE-2005-0691
|
PHP remote file inclusion vulnerability in article mode for modules.php in SocialMPN allows remote attackers to execute arbitrary PHP code by modifying the name parameter to reference a URL on a remote web server that contains the code.
|
[
"cpe:2.3:a:socialmpn:socialmpn:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:socialmpn:socialmpn:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:socialmpn:socialmpn:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:socialmpn:socialmpn:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:socialmpn:socialmpn:1.2.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-24qc-25f9-3h95
|
A vulnerability in the Cisco application-hosting framework (CAF) component of the Cisco IOx application environment could allow an authenticated, remote attacker to write or modify arbitrary files in the virtual instance running on the affected device. The vulnerability is due to insufficient input validation of user-supplied application packages. An attacker who can upload a malicious package within Cisco IOx could exploit the vulnerability to modify arbitrary files. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52317.
|
[] | null | null | 8.1 | null | null |
|
GHSA-5c9f-6cwg-mhc5
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Laybuy Laybuy Payment Extension for WooCommerce allows Stored XSS.This issue affects Laybuy Payment Extension for WooCommerce: from n/a through 5.3.9.
|
[] | null | 6.5 | null | null | null |
|
CVE-2014-5589
|
The Now Browser (Material) (aka com.browser.nowbasic) 2.8.1 application Material for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:nowbrowser:now_browser_\\(material\\):2.8.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2002-1119
|
os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.
|
[
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2007-0894
|
MediaWiki before 1.9.2 allows remote attackers to obtain sensitive information via a direct request to (1) Simple.deps.php, (2) MonoBook.deps.php, (3) MySkin.deps.php, or (4) Chick.deps.php in wiki/skins, which shows the installation path in the resulting error message.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_alpha2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_rc4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.5_r14348:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.9.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2017-8051
|
Tenable Appliance 3.5 - 4.4.0, and possibly prior versions, contains a flaw in the simpleupload.py script in the Web UI. Through the manipulation of the tns_appliance_session_user parameter, a remote attacker can inject arbitrary commands.
|
[
"cpe:2.3:a:tenable:appliance:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:3.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:appliance:4.4.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-x9c6-rvmm-xwvg
|
Unspecified vulnerability in the Mobility Pack 1.1.2 and earlier in Novell Data Synchronizer 1.0.x, and 1.1.x through 1.1.1 build 428, allows remote authenticated users to access the accounts of other users via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-ggw9-xmqw-whqq
|
In the Linux kernel, the following vulnerability has been resolved:net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_registerof_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.mv88e6xxx_mdio_register() pass the device node to of_mdiobus_register().
We don't need the device node after it.Add missing of_node_put() to avoid refcount leak.
|
[] | null | 5.5 | null | null | null |
|
GHSA-7wrx-v7g3-3cj6
|
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
[] | null | null | 8.8 | null | null |
|
CVE-2021-37708
|
Command injection in mail agent settings
|
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a command injection vulnerability in mail agent settings. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
|
[
"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-gr4x-2wj5-g5m3
|
In JetBrains IntelliJ IDEA before 2025.2 credentials disclosure was possible via remote reference
|
[] | null | 4.7 | null | null | null |
|
GHSA-fh2g-32x6-6gch
|
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.9 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) APPS02 in the (a) CRM Technical Foundation component; (2) APPS03 in the (b) iProcurement component; and (3) APPS04, (4) APPS05, and (5) APPS06 in the Oracle Application Object Library component.
|
[] | null | null | null | null | null |
|
GHSA-ccpj-r729-pqcf
|
In the Linux kernel, the following vulnerability has been resolved:amt: fix possible memory leak in amt_rcv()If an amt receives packets and it finds socket.
If it can't find a socket, it should free a received skb.
But it doesn't.
So, a memory leak would possibly occur.
|
[] | null | 5.5 | null | null | null |
|
CVE-2011-1075
|
FreeBSD's crontab calculates the MD5 sum of the previous and new cronjob to determine if any changes have been made before copying the new version in. In particular, it uses the MD5File() function, which takes a pathname as an argument, and is called with euid 0. A race condition in this process may lead to an arbitrary MD5 comparison regardless of the read permissions.
|
[
"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*"
] | null | 3.7 | null | 4.3 | null |
|
GHSA-6rj2-w8v9-xrxq
|
The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 8.8 | null | null | null |
|
GHSA-gv6j-85xq-835j
|
A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in iOS 12.3, tvOS 12.3, watchOS 5.2.1. A device may be passively tracked by its WiFi MAC address.
|
[] | null | null | null | null | null |
|
CVE-2024-13299
|
Megamenu Framework - Critical - Unsupported - SA-CONTRIB-2024-065
|
Vulnerability in Drupal Megamenu Framework.This issue affects Megamenu Framework: *.*.
|
[] | null | 6.6 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.