id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-r5px-8rrr-62mx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in karim42 Quran multilanguage Text & Audio allows Stored XSS. This issue affects Quran multilanguage Text & Audio: from n/a through 2.3.23. | [] |
|
GHSA-pwmr-6x4v-frjm | Softnext Mail SQR Expert has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files. | [] |
|
CVE-2006-4777 | Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446. | [
"cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*"
] |
|
CVE-2007-5921 | Unspecified vulnerability in the ioctl interface in the Solaris Volume Manager (SVM) in Sun Solaris 9 and 10 allows local users to cause a denial of service (panic) via unspecified vectors, a different vulnerability than CVE-2004-1346. | [
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] |
|
GHSA-2h3v-3p73-36m3 | A Unauthenticated Remote Denial of Service vulnerability was identified in HPE Integrated Lights-Out 3 (iLO 3) version v1.88 only. The vulnerability is resolved in iLO3 v1.89 or subsequent versions. | [] |
|
CVE-2025-22221 | VMware Aria Operations for Logs stored cross-site scripting vulnerability (CVE-2025-22221) | VMware Aria Operation for Logs contains a stored cross-site scripting vulnerability. A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration. | [] |
CVE-2013-2926 | Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.90:*:*:*:*:*:*:*"
] |
|
GHSA-hm26-8xrc-xm53 | config_converters.py in BSCW (Basic Support for Cooperative Work) 3.x and versions before 4.06 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name during filename conversion. | [] |
|
CVE-2011-4265 | Cross-site scripting (XSS) vulnerability in phpWebSite before 1.0.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:phpwebsite:phpwebsite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpwebsite:phpwebsite:0.10.2:*:*:*:*:*:*:*"
] |
|
GHSA-6r2f-w26r-95pf | In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300005c. | [] |
|
CVE-2024-53255 | Reflected Cross-site Scripting in /admin?page=media via file Parameter in BoidCMS | BoidCMS is a free and open-source flat file CMS for building simple websites and blogs, developed using PHP and uses JSON as a database. In affected versions a reflected Cross-site Scripting (XSS) vulnerability exists in the /admin?page=media endpoint in the file parameter, allowing an attacker to inject arbitrary JavaScript code. This code could be used to steal the user's session cookie, perform phishing attacks, or deface the website. This issue has been addressed in version 2.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:boidcms:boidcms:*:*:*:*:*:*:*:*"
] |
CVE-2019-14132 | Buffer over-write when this 0-byte buffer is typecasted to some other structure and hence memory corruption in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile in QCS605, SA6155P, SM8150 | [
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*"
] |
|
GHSA-cm79-7q92-x7r9 | A missing input validation in Samsung Flow Windows application prior to Version 4.8.5.0 allows attackers to overwrite abtraty file in the Windows known folders. | [] |
|
GHSA-vm7h-gxx5-wrm7 | Use-after-free vulnerability in the fz_subsample_pixmap function in fitz/pixmap.c in Artifex Software, Inc. MuPDF 1.10a allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted document. | [] |
|
GHSA-rv23-gf9q-6frc | The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument. | [] |
|
GHSA-r6c9-93g7-fmg3 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] |
|
CVE-2025-28892 | WordPress FTP Sync plugin <= 1.1.6 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in a2rocklobster FTP Sync allows Stored XSS. This issue affects FTP Sync: from n/a through 1.1.6. | [] |
GHSA-vgj7-5chx-3pc8 | fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135. | [] |
|
CVE-2019-18902 | wicked: Use-after-free when receiving invalid DHCP6 client options | A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-3.5.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-3.21.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.6.1. openSUSE Factory wicked versions prior to 0.6.62. | [
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*"
] |
CVE-2010-3284 | Unspecified vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*"
] |
|
GHSA-p5j5-mxj7-f5fg | The EasyEvent WordPress plugin through 1.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | [] |
|
GHSA-7wg6-8ch9-xw5r | Open-AudIT Professional 2.1 has CSRF, as demonstrated by modifying a user account or inserting XSS sequences via the credentials URI. | [] |
|
CVE-2025-25747 | Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint | [] |
|
GHSA-h94q-m4mx-m5hq | The CBBBRInit method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. | [] |
|
CVE-2011-2115 | IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted tSAC chunk, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-2111 and CVE-2011-2116. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*"
] |
|
CVE-2025-27014 | WordPress Hostiko Theme < 30.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in designingmedia Hostiko allows Reflected XSS.This issue affects Hostiko: from n/a before 30.1. | [] |
CVE-2018-0611 | The ANA App for iOS version 4.0.22 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:ana:ana:*:*:*:*:*:iphone_os:*:*"
] |
|
GHSA-7x5c-hvwv-chx9 | Improper initialization in BIOS firmware for some Intel(R) NUC 11 Pro Kits and Intel(R) NUC 11 Pro Boards before version TNTGL357.0064 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2013-1057 | Untrusted search path vulnerability in maas-import-pxe-files in MAAS before 13.10 allows local users to execute arbitrary code via a Trojan horse import_pxe_files configuration file in the current working directory. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:maas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:maas:12.04.1:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:maas:12.04.2:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:maas:12.04.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-21049 | In append_camera_metadata of camera_metadata.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-236688120References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-fhj8-953f-fx7h | Leif M. Wright's Blog 3.5 allows remote authenticated users with administrative privileges to execute arbitrary programs, including shell commands, by configuring the sendmail path to a malicious pathname. | [] |
|
GHSA-7wxw-w85f-h64p | Linux kernel 2.6.18 through 2.6.33, and possibly other versions, allows remote attackers to cause a denial of service (memory corruption) via a large number of Bluetooth sockets, related to the size of sysfs files in (1) net/bluetooth/l2cap.c, (2) net/bluetooth/rfcomm/core.c, (3) net/bluetooth/rfcomm/sock.c, and (4) net/bluetooth/sco.c. | [] |
|
GHSA-hrpw-5fq6-57r2 | The Secret City - Motion Comic (aka me.narr8.android.serial.the_secret_city) application 2.1.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-r7v6-m227-rm4x | A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands | [] |
|
CVE-2023-32401 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.6.6, macOS Big Sur 11.7.7, macOS Ventura 13.4. Parsing an office document may lead to an unexpected app termination or arbitrary code execution. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-m4px-ph3f-7964 | Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. | [] |
|
GHSA-3r46-m7qj-9cf6 | Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider. | [] |
|
CVE-2022-42498 | In Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-240662453References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-hc72-hpp4-jrpg | ts.exe (aka ts.cgi) in Walla TeleSite 3.0 and earlier allows remote attackers to access arbitrary local files via the querystring. | [] |
|
CVE-2023-23417 | Windows Partition Management Driver Elevation of Privilege Vulnerability | Windows Partition Management Driver Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2023-30924 | In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-33706 | Due to improper input validation in InfraBox, logs can be modified by an authenticated user. | [
"cpe:2.3:a:sap:infrabox:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-3321 | Services and files in Lenovo Fingerprint Manager before 8.01.42 have incorrect ACLs, which allows local users to invalidate local checks and gain privileges via standard filesystem operations. | [
"cpe:2.3:a:lenovo:fingerprint_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-m57g-7h85-rchp | Information disclosure as NPU firmware can send invalid IPC message to NPU driver as the driver doesn`t validate the IPC message received from the firmware. | [] |
|
GHSA-7cxg-92qx-7whp | Multiple PHP remote file inclusion vulnerabilities in template.php in Phpmymanga 0.8.1 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the (1) actionsPage or (2) formPage parameter. | [] |
|
CVE-2020-1552 | Windows Work Folder Service Elevation of Privilege Vulnerability | An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnerability by correcting the way the Windows Work Folder Service handles file operations.
| [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] |
CVE-2021-46101 | In Git for windows through 2.34.1 when using git pull to update the local warehouse, git.cmd can be run directly. | [
"cpe:2.3:a:gitforwindows:git:*:*:*:*:*:windows:*:*"
] |
|
CVE-2024-32974 | Envoy affected by a crash in EnvoyQuicServerStream::OnInitialHeadersComplete() | Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have already be destroyed and any up calls from QUICHE could potentially cause use after free.
| [
"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*"
] |
GHSA-824g-h3q7-mx9v | Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF file. | [] |
|
GHSA-j5h9-x637-6rv2 | Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function formSetMacFilterCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the deviceList parameter. | [] |
|
CVE-2007-6189 | A certain ActiveX control in (1) OScan8.ocx and (2) Oscan81.ocx in BitDefender Online Anti-Virus Scanner 8.0 allows remote attackers to execute arbitrary code via a long argument to the InitX method that begins with a "%%" sequence, which is misinterpreted as a Unicode string and decoded twice, leading to improper memory allocation and a heap-based buffer overflow. | [
"cpe:2.3:a:bitdefender:online_anti-virus_scanner:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-9c8h-46w3-gr5h | An issue in the exp_bin component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] |
|
GHSA-m2v5-5h76-p8cv | Multiple untrusted search path vulnerabilities in Corel CAD 2014 allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) FxManagedCommands_3.08_9.tx or (2) TD_Mgd_3.08_9.dll file in the current working directory. | [] |
|
GHSA-8288-g25h-9cfr | Dell iDRAC 8 prior to version 2.82.82.82 contain a denial of service vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to deny access to the iDRAC webserver. | [] |
|
GHSA-pgrw-q27m-5995 | fitz/pixmap.c in Artifex MuPDF 1.17.0 has an overflow during pixmap size calculation. | [] |
|
GHSA-g536-463c-q7r3 | Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection. | [] |
|
CVE-2017-16348 | An exploitable denial of service vulnerability exists in Insteon Hub running firmware version 1012. Leftover demo functionality allows for arbitrarily rebooting the device without authentication. An attacker can send a UDP packet to trigger this vulnerability. | [
"cpe:2.3:o:insteon:insteon_hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:insteon_hub:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-26311 | Multiple memory leaks have been identified in the clip actions parsing functions (parseSWF_CLIPACTIONS and parseSWF_CLIPACTIONRECORD) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted SWF file. | [] |
|
CVE-2020-23697 | Cross Site Scripting vulnerabilty in Monstra CMS 3.0.4 via the page feature in admin/index.php. | [
"cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*"
] |
|
CVE-2023-21345 | In Game Manager Service, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-42286 | scsi: qla2xxx: validate nvme_local_port correctly | In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: validate nvme_local_port correctly
The driver load failed with error message,
qla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef
and with a kernel crash,
BUG: unable to handle kernel NULL pointer dereference at 0000000000000070
Workqueue: events_unbound qla_register_fcport_fn [qla2xxx]
RIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]
RSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000
RDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000
RBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030
R10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4
R13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8
FS: 0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0
Call Trace:
qla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]
? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]
qla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]
qla_register_fcport_fn+0x54/0xc0 [qla2xxx]
Exit the qla_nvme_register_remote() function when qla_nvme_register_hba()
fails and correctly validate nvme_local_port. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2020-28984 | prive/formulaires/configurer_preferences.php in SPIP before 3.2.8 does not properly validate the couleur, display, display_navigation, display_outils, imessage, and spip_ecran parameters. | [
"cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-1439 | NSSecureTextField in AppKit in Apple Mac OS X 10.4.6 does not re-enable secure event input under certain circumstances, which could allow other applications in the window session to monitor input characters and keyboard events. | [
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*"
] |
|
CVE-2021-24037 | A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. | [
"cpe:2.3:a:facebook:hermes:*:*:*:*:*:*:*:*"
] |
|
GHSA-m6jx-4j6j-qjq9 | Deserialization of Untrusted Data vulnerability in themeton Spare allows Object Injection. This issue affects Spare: from n/a through 1.7. | [] |
|
CVE-2011-3062 | Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-15920 | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-rf7h-w3mq-vjqq | The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request. | [] |
|
CVE-2020-10867 | An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled. | [
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-8rqw-rwvr-r288 | Unknown vulnerability in phpGroupWare before 0.9.14.002 has unknown attack vectors and impact, related to a "security hole" in the Setup/Config functionality. | [] |
|
GHSA-f4vh-w8qv-cvrw | Dell BIOS contains a Stack based buffer overflow vulnerability. A local authenticated attacker could potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter to gain arbitrary code execution in SMRAM. | [] |
|
CVE-2016-3717 | The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:7.0.0-0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:7.0.1-0:*:*:*:*:*:*:*"
] |
|
GHSA-mxcm-6447-457q | Epic Games Launcher Incorrect Default Permissions Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Epic Games Launcher. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the product installer. The product applies incorrect default permissions to a sensitive folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-24329. | [] |
|
GHSA-c7ww-xrv2-6x29 | Sun Ray Server Software 4.1 on Solaris 10, when Automatic Multi-Group Hotdesking (AMGH) is enabled, responds to a logout action by immediately logging the user in again, which makes it easier for physically proximate attackers to obtain access to a session by going to an unattended DTU device. | [] |
|
GHSA-gvhr-jggc-mfgx | Eval injection vulnerability in CHXO Feedsplitter 2006-01-21 allows remote attackers to execute arbitrary PHP code via (1) the file specified as the value of the format parameter, and possibly (2) the RSS feed. | [] |
|
CVE-2024-11479 | Authenticated HTML Injection in Issuetrak Ticket Comment Function | A HTML Injection vulnerability was identified in Issuetrak version 17.1 that could be triggered by an authenticated user. HTML markup could be added to comments of tickets, which when submitted will render in the
emails sent to all users on that ticket. | [] |
CVE-2012-3374 | Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message. | [
"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-1609 | Junos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafted IPv6 packets and arbitrarily execute commands on the target device. | When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device. This issue affects IPv6 JDHCPD services. This issue affects: Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D592; 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R2-S7, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D60; 18.3 versions prior to 18.3R1-S6, 18.3R2-S2, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S3, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2*. and All versions prior to 19.3R1 on Junos OS Evolved. This issue do not affect versions of Junos OS prior to 15.1, or JDHCPD operating as a local server in non-relay mode. | [
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d190:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d31:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d470:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d495:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d56:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d591:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1x53:d70:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2x75:d40:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*"
] |
CVE-2020-25204 | The God Kings application 0.60.1 for Android exposes a broadcast receiver to other apps called com.innogames.core.frontend.notifications.receivers.LocalNotificationBroadcastReceiver. The purpose of this broadcast receiver is to show an in-game push notification to the player. However, the application does not enforce any authorization schema on the broadcast receiver, allowing any application to send fully customizable in-game push notifications. | [
"cpe:2.3:a:innogames:god_kings:0.60.1:*:*:*:*:android:*:*"
] |
|
CVE-2015-8010 | Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*"
] |
|
GHSA-249j-v9cr-p779 | Format string vulnerability in the monitor "memory dump" command in VICE 1.6 to 1.14 allows local users to cause a denial of service (emulator crash) and possibly execute arbitrary code via format string specifiers in an output string. | [] |
|
CVE-2009-2419 | Use-after-free vulnerability in the servePendingRequests function in WebCore in WebKit in Apple Safari 4.0 and 4.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted HTML document that references a zero-length .js file and the JavaScript reload function. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-3f8r-8g29-hh32 | Multiple cross-site scripting (XSS) vulnerabilities in PostNuke 0.760-RC4b allows remote attackers to inject arbitrary web script or HTML via (1) the moderate parameter to the Comments module or (2) htmltext parameter to html/user.php. | [] |
|
GHSA-cw78-q654-793w | In the Linux kernel, the following vulnerability has been resolved:octeontx2-pf: Avoid use of GFP_KERNEL in atomic contextUsing GFP_KERNEL in preemption disable context, causing below warning
when CONFIG_DEBUG_ATOMIC_SLEEP is enabled.[ 32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[ 32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
[ 32.558707] preempt_count: 1, expected: 0
[ 32.562710] RCU nest depth: 0, expected: 0
[ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc2-00269-gae9dcb91c606 #7
[ 32.576188] Hardware name: Marvell CN106XX board (DT)
[ 32.581232] Call trace:
[ 32.583670] dump_backtrace.part.0+0xe0/0xf0
[ 32.587937] show_stack+0x18/0x30
[ 32.591245] dump_stack_lvl+0x68/0x84
[ 32.594900] dump_stack+0x18/0x34
[ 32.598206] __might_resched+0x12c/0x160
[ 32.602122] __might_sleep+0x48/0xa0
[ 32.605689] __kmem_cache_alloc_node+0x2b8/0x2e0
[ 32.610301] __kmalloc+0x58/0x190
[ 32.613610] otx2_sq_aura_pool_init+0x1a8/0x314
[ 32.618134] otx2_open+0x1d4/0x9d0To avoid use of GFP_ATOMIC for memory allocation, disable preemption
after all memory allocation is done. | [] |
|
CVE-2024-56545 | HID: hyperv: streamline driver probe to avoid devres issues | In the Linux kernel, the following vulnerability has been resolved:
HID: hyperv: streamline driver probe to avoid devres issues
It was found that unloading 'hid_hyperv' module results in a devres
complaint:
...
hv_vmbus: unregistering driver hid_hyperv
------------[ cut here ]------------
WARNING: CPU: 2 PID: 3983 at drivers/base/devres.c:691 devres_release_group+0x1f2/0x2c0
...
Call Trace:
<TASK>
? devres_release_group+0x1f2/0x2c0
? __warn+0xd1/0x1c0
? devres_release_group+0x1f2/0x2c0
? report_bug+0x32a/0x3c0
? handle_bug+0x53/0xa0
? exc_invalid_op+0x18/0x50
? asm_exc_invalid_op+0x1a/0x20
? devres_release_group+0x1f2/0x2c0
? devres_release_group+0x90/0x2c0
? rcu_is_watching+0x15/0xb0
? __pfx_devres_release_group+0x10/0x10
hid_device_remove+0xf5/0x220
device_release_driver_internal+0x371/0x540
? klist_put+0xf3/0x170
bus_remove_device+0x1f1/0x3f0
device_del+0x33f/0x8c0
? __pfx_device_del+0x10/0x10
? cleanup_srcu_struct+0x337/0x500
hid_destroy_device+0xc8/0x130
mousevsc_remove+0xd2/0x1d0 [hid_hyperv]
device_release_driver_internal+0x371/0x540
driver_detach+0xc5/0x180
bus_remove_driver+0x11e/0x2a0
? __mutex_unlock_slowpath+0x160/0x5e0
vmbus_driver_unregister+0x62/0x2b0 [hv_vmbus]
...
And the issue seems to be that the corresponding devres group is not
allocated. Normally, devres_open_group() is called from
__hid_device_probe() but Hyper-V HID driver overrides 'hid_dev->driver'
with 'mousevsc_hid_driver' stub and basically re-implements
__hid_device_probe() by calling hid_parse() and hid_hw_start() but not
devres_open_group(). hid_device_probe() does not call __hid_device_probe()
for it. Later, when the driver is removed, hid_device_remove() calls
devres_release_group() as it doesn't check whether hdev->driver was
initially overridden or not.
The issue seems to be related to the commit 62c68e7cee33 ("HID: ensure
timely release of driver-allocated resources") but the commit itself seems
to be correct.
Fix the issue by dropping the 'hid_dev->driver' override and using
hid_register_driver()/hid_unregister_driver() instead. Alternatively, it
would have been possible to rely on the default handling but
HID_CONNECT_DEFAULT implies HID_CONNECT_HIDRAW and it doesn't seem to work
for mousevsc as-is. | [] |
GHSA-88hh-8fwc-jjch | The Syncee WordPress plugin before 1.0.10 leaks the administrator token that can be used to take over the administrator's account. | [] |
|
GHSA-rxr5-9xmw-h4rj | SQL injection vulnerability in include/img_view.class.php in LinPHA 1.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the order parameter to new_images.php. | [] |
|
CVE-2018-1000813 | Backdrop CMS version 1.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Sanitization of custom class names used on blocks and layouts. that can result in Execution of JavaScript from an unexpected source.. This attack appear to be exploitable via A user must be directed to an affected page while logged in.. This vulnerability appears to have been fixed in 1.11.1 and later. | [
"cpe:2.3:a:backdropcms:backdrop_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-vrgf-6qrc-hmmg | A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. | [] |
|
GHSA-r62c-gw4m-r5qj | Insecure direct object reference (IDOR) vulnerability in ICREM H8 SSRMS allows attackers to disclose sensitive information via the Print Invoice Functionality. | [] |
|
GHSA-wxpr-w6c6-j9hv | Huawei smart phones Emily-L29C with Versions earlier than 9.1.0.311(C10E2R1P13T8), Versions earlier than 9.1.0.311(C461E2R1P11T8), Versions earlier than 9.1.0.316(C635E2R1P11T8), Versions earlier than 9.1.0.311(C185E2R1P12T8), Versions earlier than 9.1.0.311(C605E2R1P12T8), Versions earlier than 9.1.0.311(C636E7R1P13T8) have an information leakage vulnerability. An attacker tricks the user into installing a malicious application, which can copy specific files to the sdcard, resulting in information leakage. | [] |
|
CVE-2018-8807 | In libming 0.4.8, these is a use-after-free in the function decompileCALLFUNCTION of decompile.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted swf file. | [
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*"
] |
|
CVE-2020-7259 | Unsigned executable vulnerability in ENS can be used to bypass intended self-protection rules | Exploitation of Privilege/Trust vulnerability in file in McAfee Endpoint Security (ENS) Prior to 10.7.0 February 2020 Update allows local users to bypass local security protection via a carefully crafted input file | [
"cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*"
] |
CVE-2020-0541 | Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:converged_security_management_engine_firmware:14.5.11:*:*:*:*:*:*:*"
] |
|
CVE-2014-2460 | Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 5.5.06, 6.0, 6.1, 6.2, 6.3, 6.3.1, 6.3.2, and 6.3.3 allows remote authenticated users to affect confidentiality via vectors related to CSV Management. | [
"cpe:2.3:a:oracle:supply_chain_products_suite:5.5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite:6.3.3:*:*:*:*:*:*:*"
] |
|
CVE-2006-3408 | Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors. | [
"cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*"
] |
|
GHSA-8p56-q7gm-rvhr | The Admin Server in Sun Java Active Server Pages (ASP) Server before 4.0.3 allows remote attackers to append to arbitrary new or existing files via the first argument to a certain file that is included by multiple unspecified ASP applications. | [] |
|
GHSA-2jrf-mm4v-jgmc | A vulnerability was found in Pear Admin Boot up to 2.0.2 and classified as critical. This issue affects the function getDictItems of the file /system/dictData/getDictItems/. The manipulation with the input ,user(),1,1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269375. | [] |
|
CVE-2018-21253 | An issue was discovered in Mattermost Server before 5.1, 5.0.2, and 4.10.2. An attacker could use the invite_people slash command to invite a non-permitted user. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.1.0:rc4:*:*:*:*:*:*"
] |
|
CVE-2023-53110 | net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler() | In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
When performing a stress test on SMC-R by rmmod mlx5_ib driver
during the wrk/nginx test, we found that there is a probability
of triggering a panic while terminating all link groups.
This issue dues to the race between smc_smcr_terminate_all()
and smc_buf_create().
smc_smcr_terminate_all
smc_buf_create
/* init */
conn->sndbuf_desc = NULL;
...
__smc_lgr_terminate
smc_conn_kill
smc_close_abort
smc_cdc_get_slot_and_msg_send
__softirqentry_text_start
smc_wr_tx_process_cqe
smc_cdc_tx_handler
READ(conn->sndbuf_desc->len);
/* panic dues to NULL sndbuf_desc */
conn->sndbuf_desc = xxx;
This patch tries to fix the issue by always to check the sndbuf_desc
before send any cdc msg, to make sure that no null pointer is
seen during cqe processing. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.