id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2012-5167 | Multiple SQL injection vulnerabilities in ATutor AContent before 1.2-1 allow remote attackers to execute arbitrary SQL commands via the (1) field parameter to course_category/index_inline_editor_submit.php or (2) user/index_inline_editor_submit.php; or (3) id parameter to user/user_password.php. | [
"cpe:2.3:a:atutor:acontent:*:*:*:*:*:*:*:*"
] |
|
GHSA-m9vv-m88f-3xj8 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The DL180pdfl.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14974) | [] |
|
CVE-2023-32375 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.6, macOS Ventura 13.4. Processing a 3D model may result in disclosure of process memory. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-vjrc-h2r6-qfj4 | IT Sourcecode Content Management System Project In PHP and MySQL With Source Code 1.0.0 is vulnerable to Cross Site Scripting (XSS) via /ecodesource/search_list.php. | [] |
|
GHSA-jprq-ffw9-m95p | A certain ActiveX control in Adobe Acrobat 9, when used with Microsoft Windows Vista and Internet Explorer 7, allows remote attackers to cause a denial of service (browser crash) via an src property value with an invalid acroie:// URL. | [] |
|
CVE-2014-3779 | Cross-site scripting (XSS) vulnerability in ZOHO ManageEngine ADSelfService Plus before 5.2 Build 5202 allows remote attackers to inject arbitrary web script or HTML via the name parameter to GroupSubscription.do. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:*:*:*:*:*:*:*:*"
] |
|
GHSA-h374-m7g3-c2ww | A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366. | [] |
|
CVE-2015-8800 | Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allow remote authenticated users to conduct argument-injection attacks by leveraging certain named-pipe access. | [
"cpe:2.3:a:broadcom:symantec_critical_system_protection:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_data_center_security_server:6.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:broadcom:symantec_data_center_security_server:6.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:broadcom:symantec_data_center_security_server_and_agents:6.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection_for_controllers_and_devices:6.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-99vg-whp9-cxq4 | A Site-wide directory listing vulnerability in /fm in actidata actiNAS SL 2U-8 RDX 3.2.03-SP1 allows remote attackers to list the files hosted by the web application. | [] |
|
GHSA-hhmh-4792-pf49 | In JetBrains TeamCity before 2025.03 base64 encoded password could be exposed in build log | [] |
|
CVE-2017-7245 | Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file. | [
"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*"
] |
|
CVE-2013-1549 | Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 2.8.0 through 5.3.3, 6.0.1, and 12.0.0 allows remote authenticated users to affect integrity via vectors related to BASE. | [
"cpe:2.3:a:oracle:financial_services_software:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:12.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-9rw5-3hr5-p73f | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Estatik Estatik allows PHP Local File Inclusion. This issue affects Estatik: from n/a through 4.1.9. | [] |
|
CVE-2024-9763 | Tungsten Automation Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Tungsten Automation Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24479. | [
"cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*"
] |
CVE-2024-56433 | shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid. | [] |
|
GHSA-g9rm-5r58-8rw8 | A Cross Site Scripting (XSS) vulnerability in GaatiTrack Courier Management System 1.0 allows a remote attacker to inject JavaScript via the page parameter to login.php or header.php. | [] |
|
GHSA-qjm2-h4v8-qrj8 | ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022. | [] |
|
CVE-2012-6077 | W3 Total Cache before 0.9.2.5 allows remote attackers to retrieve password hash information due to insecure storage of database cache files. | [
"cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-2460 | SQL injection vulnerability in faq.php in vBulletin 3.7.0 Gold allows remote attackers to execute arbitrary SQL commands via the q parameter in a search action. | [
"cpe:2.3:a:vbulletin:vbulletin:3.7.0:gold:*:*:*:*:*:*"
] |
|
CVE-2018-10634 | Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Cleartext Transmission of Sensitive Information | Communications between Medtronic MiniMed MMT pumps and wireless accessories are transmitted in cleartext. A sufficiently skilled attacker could capture these transmissions and extract sensitive information, such as device serial numbers. | [
"cpe:2.3:o:medtronic:minimed_paradigm_revel_mmt-523k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_revel_mmt-523k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_revel_mmt-723k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_revel_mmt-723k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_revel_mmt-723_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_revel_mmt-723:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_530g_mmt-551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_530g_mmt-551:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_real-time_mmt-522_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_real-time_mmt-522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_real-time_mmt-722_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_real-time_mmt-722:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_530g_mmt-751_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_530g_mmt-751:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_revel_mmt-523_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_revel_mmt-523:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_508_insulin_pump_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_508_insulin_pump:-:*:*:*:*:*:*:*"
] |
GHSA-c7hv-342m-6j93 | Use after free issue when importing a DMA buffer by using the CPU address of the buffer due to attachment is not cleaned up properly in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | [] |
|
GHSA-x869-v47h-j67h | Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function. | [] |
|
GHSA-hp3w-grg4-233f | mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files outside of the restricted directory. This can lead to unauthorized reading or deletion of files by utilizing the `/api/system/upload-logo` and `/api/system/logo` endpoints. The issue stems from the lack of filtering or validation on the logo filename, allowing attackers to target sensitive files such as the application's database. | [] |
|
CVE-2023-24424 | Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login. | [
"cpe:2.3:a:jenkins:openid_connect_authentication:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2018-9519 | In easelcomm_hw_build_scatterlist, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-69808833. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-6c27-6r97-2xgw | URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack. | [] |
|
CVE-2015-1313 | JetBrains TeamCity 8 and 9 before 9.0.2 allows bypass of account-creation restrictions via a crafted request because the required request data can be deduced by reading HTML and JavaScript files that are returned to the web browser after an initial unauthenticated request. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
GHSA-xcjx-g6h3-96jc | Buffer overflow in WebService Authentication processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw/Satera MF551dw/Satera MF457dw firmware v05.07 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw/imageCLASS MF455dw/imageCLASS MF453dw/imageCLASS MF452dw/imageCLASS MF451dw/imageCLASS LBP237dw/imageCLASS LBP236dw/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II/imageCLASS X LBP1238 II firmware v05.07 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw/i-SENSYS MF553dw/i-SENSYS MF552dw/i-SENSYS MF455dw/i-SENSYS MF453dw/i-SENSYS LBP236dw/i-SENSYS LBP233dw/imageRUNNER 1643iF II/imageRUNNER 1643i II/i-SENSYS X 1238iF II/i-SENSYS X 1238i II/i-SENSYS X 1238P II/i-SENSYS X 1238Pr II firmware v05.07 and earlier sold in Europe. | [] |
|
CVE-2022-4281 | Facepay camera.php authorization | A vulnerability has been found in Facepay 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /face-recognition-php/facepay-master/camera.php. The manipulation of the argument userId leads to authorization bypass. The attack can be launched remotely. The identifier VDB-214789 was assigned to this vulnerability. | [
"cpe:2.3:a:facepay_project:facepay:1.0:*:*:*:*:*:*:*"
] |
CVE-2021-44090 | An SQL Injection vulnerability exists in Sourcecodester Online Reviewer System 1.0 via the password parameter. | [
"cpe:2.3:a:sourcecodester_online_reviewer_system_project:sourcecodester_online_reviewer_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-54gm-34p3-cx2g | Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6680. | [] |
|
GHSA-vrpv-26fm-7vf7 | EC-CUBE Cross-site scripting vulnerability | Cross-site scripting vulnerability in EC-CUBE EC-CUBE 3.0.0 to 3.0.18-p2 (EC-CUBE 3 series) and EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation. | [] |
CVE-2021-20669 | Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL. | [
"cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*"
] |
|
GHSA-v2h3-gjcc-2xpg | The Asus ZenFone Max 4 Android device with a build fingerprint of asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1712.367-20171225:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [] |
|
GHSA-7rr6-h953-f687 | CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Staff Info module via the searvalu parameter. | [] |
|
GHSA-c9hr-fvm9-7c49 | Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. | [] |
|
GHSA-qm26-rxpv-rhxh | Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. The program does not properly parse FNC files that may allow for information disclosure. | [] |
|
CVE-2023-28737 | Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.03.0003:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:aptio_v_uefi_firmware_integrator_tools:5.27.06.0017:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-c3w6-2r47-82x8 | In wifilogd, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113655028 | [] |
|
CVE-2020-24630 | A remote operatoronlinelist_content privilege escalation vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] |
|
CVE-2024-26885 | bpf: Fix DEVMAP_HASH overflow check on 32-bit arches | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix DEVMAP_HASH overflow check on 32-bit arches
The devmap code allocates a number hash buckets equal to the next power
of two of the max_entries value provided when creating the map. When
rounding up to the next power of two, the 32-bit variable storing the
number of buckets can overflow, and the code checks for overflow by
checking if the truncated 32-bit value is equal to 0. However, on 32-bit
arches the rounding up itself can overflow mid-way through, because it
ends up doing a left-shift of 32 bits on an unsigned long value. If the
size of an unsigned long is four bytes, this is undefined behaviour, so
there is no guarantee that we'll end up with a nice and tidy 0-value at
the end.
Syzbot managed to turn this into a crash on arm32 by creating a
DEVMAP_HASH with max_entries > 0x80000000 and then trying to update it.
Fix this by moving the overflow check to before the rounding up
operation. | [
"cpe:2.3:o:linux:linux_kernel:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-rmr7-mhgx-r5f9 | Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin <= 2.3.4 versions. | [] |
|
CVE-2024-3384 | PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets | A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. | [] |
GHSA-gfgx-m82f-4x3g | In the Linux kernel, the following vulnerability has been resolved:block/ioctl: prefer different overflow checkRunning syzkaller with the newly reintroduced signed integer overflow
sanitizer shows this report:[ 62.982337] ------------[ cut here ]------------
[ 62.985692] cgroup: Invalid name
[ 62.986211] UBSAN: signed-integer-overflow in ../block/ioctl.c:36:46
[ 62.989370] 9pnet_fd: p9_fd_create_tcp (7343): problem connecting socket to 127.0.0.1
[ 62.992992] 9223372036854775807 + 4095 cannot be represented in type 'long long'
[ 62.997827] 9pnet_fd: p9_fd_create_tcp (7345): problem connecting socket to 127.0.0.1
[ 62.999369] random: crng reseeded on system resumption
[ 63.000634] GUP no longer grows the stack in syz-executor.2 (7353): 20002000-20003000 (20001000)
[ 63.000668] CPU: 0 PID: 7353 Comm: syz-executor.2 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1
[ 63.000677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 63.000682] Call Trace:
[ 63.000686] <TASK>
[ 63.000731] dump_stack_lvl+0x93/0xd0
[ 63.000919] __get_user_pages+0x903/0xd30
[ 63.001030] __gup_longterm_locked+0x153e/0x1ba0
[ 63.001041] ? _raw_read_unlock_irqrestore+0x17/0x50
[ 63.001072] ? try_get_folio+0x29c/0x2d0
[ 63.001083] internal_get_user_pages_fast+0x1119/0x1530
[ 63.001109] iov_iter_extract_pages+0x23b/0x580
[ 63.001206] bio_iov_iter_get_pages+0x4de/0x1220
[ 63.001235] iomap_dio_bio_iter+0x9b6/0x1410
[ 63.001297] __iomap_dio_rw+0xab4/0x1810
[ 63.001316] iomap_dio_rw+0x45/0xa0
[ 63.001328] ext4_file_write_iter+0xdde/0x1390
[ 63.001372] vfs_write+0x599/0xbd0
[ 63.001394] ksys_write+0xc8/0x190
[ 63.001403] do_syscall_64+0xd4/0x1b0
[ 63.001421] ? arch_exit_to_user_mode_prepare+0x3a/0x60
[ 63.001479] entry_SYSCALL_64_after_hwframe+0x6f/0x77
[ 63.001535] RIP: 0033:0x7f7fd3ebf539
[ 63.001551] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 63.001562] RSP: 002b:00007f7fd32570c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 63.001584] RAX: ffffffffffffffda RBX: 00007f7fd3ff3f80 RCX: 00007f7fd3ebf539
[ 63.001590] RDX: 4db6d1e4f7e43360 RSI: 0000000020000000 RDI: 0000000000000004
[ 63.001595] RBP: 00007f7fd3f1e496 R08: 0000000000000000 R09: 0000000000000000
[ 63.001599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 63.001604] R13: 0000000000000006 R14: 00007f7fd3ff3f80 R15: 00007ffd415ad2b8
...
[ 63.018142] ---[ end trace ]---Historically, the signed integer overflow sanitizer did not work in the
kernel due to its interaction with `-fwrapv` but this has since been
changed [1] in the newest version of Clang; It was re-enabled in the
kernel with Commit 557f8c582a9ba8ab ("ubsan: Reintroduce signed overflow
sanitizer").Let's rework this overflow checking logic to not actually perform an
overflow during the check itself, thus avoiding the UBSAN splat. | [] |
|
CVE-2024-3874 | Tenda W20E SetRemoteWebManage formSetRemoteWebManage stack-based overflow | A vulnerability was found in Tenda W20E 15.11.0.6. It has been declared as critical. This vulnerability affects the function formSetRemoteWebManage of the file /goform/SetRemoteWebManage. The manipulation of the argument remoteIP leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260908. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:w20e_firmware:15.11.0.6:*:*:*:*:*:*:*"
] |
GHSA-5mpj-2x3p-rv6q | SQL Injection vulnerability in AST Agent Time Sheet interface ((/vicidial/AST_agent_time_sheet.php) of VICIdial via the agent parameter allows attacker to spoof identity, tamper with existing data, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. This issue affects: VICIdial 2.14b0.5 versions prior to 3555. | [] |
|
CVE-2025-21337 | Windows NTFS Elevation of Privilege Vulnerability | Windows NTFS Elevation of Privilege Vulnerability | [] |
GHSA-j6qh-hxp9-rr4j | The Client Filter Admin portal in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and subsequently create arbitrary profiles via a showdeny action to the default URL. | [] |
|
CVE-2022-1868 | Inappropriate implementation in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-51783 | WordPress Forms: 3rd-Party Post Again plugin <= 0.3 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in zaus Forms: 3rd-Party Post Again allows Reflected XSS.This issue affects Forms: 3rd-Party Post Again: from n/a through 0.3. | [] |
CVE-2023-29180 | A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.3, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to denial of service via specially crafted HTTP requests. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*"
] |
|
GHSA-xh58-v5pj-37jw | Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Installation). Supported versions that are affected are Prior to 6.2.4.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Agile Product Lifecycle Management for Process accessible data as well as unauthorized read access to a subset of Oracle Agile Product Lifecycle Management for Process accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Agile Product Lifecycle Management for Process. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] |
|
CVE-2010-2279 | The Top Updates implementation in the Homepage component in IBM Lotus Connections 2.5.x before 2.5.0.2, when "forced SSL" is enabled, uses http for links, which has unspecified impact and remote attack vectors. | [
"cpe:2.3:a:ibm:lotus_connections:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_connections:2.5.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-c72m-36q5-4cfc | Multiple SQL injection vulnerabilities in Plogger 3.0 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the checked array parameter to plog-download.php in an album action and (2) unspecified parameters to plog-remote.php, and (3) allow remote authenticated administrators to execute arbitrary SQL commands via the activate parameter to admin/plog-themes.php, related to theme_dir settings. | [] |
|
GHSA-46g4-87q8-h7hc | An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_buf_new in rec-buf.c when called from rec_parse_rset in rec-parser.c in librec.a. | [] |
|
CVE-2023-46115 | Updater Private Keys Possibly Leaked via Vite Environment Variables in tauri-cli | Tauri is a framework for building binaries for all major desktop platforms. This advisory is not describing a vulnerability in the Tauri code base itself but a commonly used misconfiguration which could lead to leaking of the private key and updater key password into bundled Tauri applications using the Vite frontend in a specific configuration. The Tauri documentation used an insecure example configuration in the `Vite guide` to showcase how to use Tauri together with Vite. Copying the following snippet `envPrefix: ['VITE_', 'TAURI_'],` from this guide into the `vite.config.ts` of a Tauri project leads to bundling the `TAURI_PRIVATE_KEY` and `TAURI_KEY_PASSWORD` into the Vite frontend code and therefore leaking this value to the released Tauri application. Using the `envPrefix: ['VITE_'],` or any other framework than Vite means you are not impacted by this advisory. Users are advised to rotate their updater private key if they are affected by this (requires Tauri CLI >=1.5.5). After updating the envPrefix configuration, generate a new private key with `tauri signer generate`, saving the new private key and updating the updater's `pubkey` value on `tauri.conf.json` with the new public key. To update your existing application, the next application build must be signed with the older private key in order to be accepted by the existing application. | [
"cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha10:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha11:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha12:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha13:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha14:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha15:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha7:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:tauri:tauri:2.0.0:alpha9:*:*:*:*:*:*"
] |
CVE-2013-0592 | Cross-site scripting (XSS) vulnerability in IBM iNotes before 8.5.3 Fix Pack 6 and 9.x before 9.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. IBM X-Force ID: 83815. | [
"cpe:2.3:a:ibm:inotes:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-jf9q-xch5-mcwx | An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188. | [] |
|
GHSA-96f5-h2ww-jqjm | Multiple cross-site scripting (XSS) vulnerabilities in PHPepperShop 1.4 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) index.php or (2) shop/kontakt.php, or (3) shop_kunden_mgmt.php or (4) SHOP_KONFIGURATION.php in shop/Admin/. | [] |
|
GHSA-pm95-5cg4-7h69 | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0882, CVE-2019-0961. | [] |
|
GHSA-4g3x-jprw-h46m | The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI. | [] |
|
CVE-2024-48862 | QuLog Center | A link following vulnerability has been reported to affect QuLog Center. If exploited, the vulnerability could allow remote attackers to traverse the file system to unintended locations and read or overwrite the contents of unexpected files.
We have already fixed the vulnerability in the following versions:
QuLog Center 1.7.0.831 ( 2024/10/15 ) and later
QuLog Center 1.8.0.888 ( 2024/10/15 ) and later | [
"cpe:2.3:a:qnap:qulog_center:-:*:*:*:*:*:*:*"
] |
GHSA-66p7-ccx8-35cx | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H). | [] |
|
GHSA-v435-c8wm-qmjm | Manage Bank Statement ReProcessing Rules does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can enable/disable the sharing rule of other users affecting the integrity of the application. Confidentiality and Availability are not affected. | [] |
|
CVE-2011-1582 | Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088, CVE-2011-1183, and CVE-2011-1419. | [
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*"
] |
|
CVE-2023-7166 | Novel-Plus HTTP POST Request updateUserInfo cross site scripting | A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB-249201 was assigned to this vulnerability. | [
"cpe:2.3:a:xxyopen:novel-plus:*:*:*:*:*:*:*:*"
] |
GHSA-mq34-7hj6-qj3h | There is an invalid free in Mapping::DoubleHash::clear in mapping.cpp that leads to a Segmentation fault in sam2p 0.49.4. A crafted input will lead to a denial of service or possibly unspecified other impact. | [] |
|
GHSA-959m-9q6r-xp5x | Cross-Site Request Forgery (CSRF) vulnerability in Rémi Leclercq Hide admin notices – Admin Notification Center plugin <= 2.3.2 versions. | [] |
|
GHSA-g43v-7v2j-h897 | Rejected reason: This is unused. | [] |
|
GHSA-36hj-f8vr-vxrj | Cross-site scripting vulnerability in WP-OliveCart versions prior to 3.1.3 and WP-OliveCartPro versions prior to 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-c4wm-h8mm-vr45 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up. | [] |
|
CVE-2023-6402 | PHPGurukul Nipah Virus Testing Management System add-phlebotomist.php sql injection | A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file add-phlebotomist.php. The manipulation of the argument empid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246423. | [
"cpe:2.3:a:phpgurukul:nipah_virus_testing_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-chgw-p6qg-r67f | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iStore accessible data as well as unauthorized read access to a subset of Oracle iStore accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
CVE-2017-3237 | Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in takeover of Automatic Service Request (ASR). CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:automatic_service_request:*:*:*:*:*:*:*:*"
] |
|
GHSA-9xvv-g7xh-f2qr | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e. | [] |
|
CVE-2006-2569 | SQL injection vulnerability in links.php in 4R Linklist 1.0 RC2 and earlier, a module for Woltlab Burning Board, allows remote attackers to execute arbitrary SQL commands via the cat parameter. | [
"cpe:2.3:a:4r_linklist:4r_linklist:*:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.0_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.0_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:woltlab:burning_board:2.3.4:*:*:*:*:*:*:*"
] |
|
GHSA-pvm3-5fcm-8qhq | BugPort before 1.099 stores its configuration file (conf/config.conf) under the web document root with a file extension that is not normally parsed by web servers, which allows remote attackers to obtain sensitive information. | [] |
|
GHSA-gww8-x289-8wq4 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier; 2019.010.20099 and earlier versions; 2017.011.30140 and earlier version; 2017.011.30138 and earlier version; 2015.006.30495 and earlier versions; 2015.006.30493 and earlier versions have a Path Traversal vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user. | [] |
|
GHSA-c753-3w82-9fgg | The Software Development Kit in Mitel MiContact Center Business from 8.0.0.0 through 8.1.4.1 and 9.0.0.0 through 9.3.1.0 could allow an unauthenticated attacker to access (view and modify) user data without authorization due to improper handling of tokens. | [] |
|
GHSA-fg4r-gvrc-v26g | Cross-site request forgery (CSRF) vulnerability in Igreks MilkyStep Light 0.94 and earlier and Professional 1.82 and earlier allows remote attackers to hijack the authentication of arbitrary users. | [] |
|
CVE-2017-18567 | The wp-all-import plugin before 3.4.6 for WordPress has XSS. | [
"cpe:2.3:a:soflyy:wp_all_import:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-6vr7-7257-wg3j | WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. | [] |
|
GHSA-mq3w-5326-vcvq | Cross-site scripting (XSS) vulnerability in Menalto Gallery before 2.2.5 allows remote attackers to inject arbitrary web script or HTML via the (1) host and (2) path components of a URL. | [] |
|
GHSA-68h5-5c5f-f24c | Portus 2.2.0 has XSS via the Team field, related to typeahead. | [] |
|
GHSA-gw26-cchc-8f2f | Cross-Site Request Forgery in JFinalCMS via /admin/form/save | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/form/save. | [] |
CVE-2016-0048 | The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
GHSA-5f5v-5c3v-gw5v | Silverstripe IE requests not properly behaving with rewritehashlinks | Non IE browsers don’t appear to be affected, but I haven’t tested a wide range of browsers to be sureRequests that come through from IE do NOT appear to encode all entities in the URL string, meaning they are inserted into output content directly by SSViewer::process() when rewriting hashlinks, as it directly outputs $_SERVER[‘REQUEST_URI’]**Example IE8 request**
127.0.0.1 - - [18/Jun/2014:14:13:42 +1000] “GET /site/cars/brands/toyota?one=1\”onmouseover=\”alert(‘things’);\” HTTP/1.1” 200**Example FF request**
127.0.0.1 - - [18/Jun/2014:14:14:22 +1000] “GET /site/cars/brands/toyota?one=1\%22onmouseover=\%22alert(%27things%27);\%22 HTTP/1.1” 200This causes any hash anchor to have the JS code inserted into the page as-is. | [] |
GHSA-f3wp-gx52-q6g2 | A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the AgentD process of Juniper Networks Junos OS allows an attacker who is already causing impact to established sessions which generates counter changes picked up by the AgentD process during telemetry polling, to move the AgentD process into a state where AgentD attempts to reap an already destroyed sensor. This reaping attempt then leads to memory corruption causing the FPC to crash which is a Denial of Service (DoS).The FPC will recover automatically without user intervention after the crash.
This issue affects Junos OS:All versions before 21.4R3-S9From 22.2 before 22.2R3-S5,From 22.3 before 22.3R3-S4,From 22.4 before 22.4R3-S3,From 23.2 before 23.2R2-S2,From 23.4 before 23.4R2.This issue does not affect Junos OS Evolved. | [] |
|
GHSA-vrv9-ccj3-g284 | Jenkins IRC Plugin stores credentials in plain text | Jenkins IRC Plugin stores credentials unencrypted in its global configuration file `hudson.plugins.ircbot.IrcPublisher.xml` on the Jenkins controller. These credentials can be viewed by users with access to the Jenkins controller file system. | [] |
CVE-2014-9790 | drivers/mmc/core/debugfs.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate pointers used in read and write operations, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28769136 and Qualcomm internal bug CR545716. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-0717 | The default configuration of cfg.packagepages_actions_excluded in MoinMoin before 1.8.7 does not prevent unsafe package actions, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:moinmo:moinmoin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moinmo:moinmoin:1.8.4:*:*:*:*:*:*:*"
] |
|
GHSA-65mr-xqpw-r9xg | IBM Cloud Pak for Automation 20.0.3, 20.0.2-IF002 - Business Automation Application Designer Component stores potentially sensitive information in log files that could be obtained by an unauthorized user. IBM X-Force ID: 194966. | [] |
|
CVE-2025-32458 | ON Semiconductor Quantenna router_command.sh (in the get_syslog_from_qtn argument) Argument Injection | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset. | [] |
GHSA-49x7-6q87-679m | MySQLDumper 1.24.4 allows remote attackers to obtain sensitive information via a direct request to learn/cubemail/refresh_dblist.php, which reveals the installation path in an error message. | [] |
|
GHSA-5vww-3gh7-86vf | F-Secure Software Updater 2.20, as distributed in several F-Secure products, downloads installation packages over plain http and does not perform file integrity validation after download. Man-in-the-middle attackers can replace the file with their own executable which will be executed under the SYSTEM account. Note that when Software Updater is configured to install updates automatically, it checks if the downloaded file is digitally signed by default, but does not check the author of the signature. When running in manual mode (default), no signature check is performed. | [] |
|
CVE-2023-30581 | The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.
Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"
] |
|
GHSA-xfxh-47fx-qrxv | PHP remote file inclusion vulnerability in athena.php in Oliver May Athena PHP Website Administration 0.1a allows remote attackers to execute arbitrary PHP code via a URL in the athena_dir parameter. | [] |
|
GHSA-cp8j-9c47-62cg | A vulnerability was found in SourceCodester Resort Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231937 was assigned to this vulnerability. | [] |
|
GHSA-f624-83vj-56hf | A vulnerability in the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and subsequently access a specific web interface page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. | [] |
|
GHSA-49wp-8p26-hh26 | The SaveBarCode function in the Taltech Tal Bar Code ActiveX control allows remote attackers to cause a denial of service (disk consumption) by uploading multiple bar codes, as demonstrated by a WSF package. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.