id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-96vh-rc6m-vw24 | Command injection vulnerability in Asus RT-N15U 3.0.0.4.376_3754 allows a remote attacker to execute arbitrary code via the netstat function page. | [] |
|
CVE-2006-3478 | PHP remote file inclusion vulnerability in styles/default/global_header.php in MyPHP CMS 0.3 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the domain parameter. | [
"cpe:2.3:a:myphp_cms:myphp_cms:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:myphp_cms:myphp_cms:0.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-7c6j-gm9g-qhcj | An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address. | [] |
|
GHSA-fxmm-r6c6-cq2x | Integer overflow in the FreeBSD compatibility code (freebsd_misc.c) in NetBSD-current, NetBSD-3, NetBSD-2.0, and NetBSD-2 before 20050913; and NetBSD-1.6 before 20050914; allows local users to cause a denial of service (heap corruption or system crash) and possibly gain root privileges. | [] |
|
GHSA-fpj4-cwfc-v2c6 | Multiple SQL injection vulnerabilities in Valid tiny-erp 1.6 and earlier allow remote attackers to execute arbitrary SQL commands via the SearchField parameter in a search action to (1) _partner_list.php, (2) proioncategory_list.php, (3) _rantevou_list.php, (4) syncategory_list.php, (5) synallasomenos_list.php, (6) ypelaton_list.php, and (7) yproion_list.php. | [] |
|
CVE-2023-3686 | Bylancer QuickAI OpenAI GET Parameter blog sql injection | A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:bylancer:quickai_openai:3.8.1:*:*:*:*:*:*:*"
] |
CVE-2018-20954 | The "Security and Privacy" Encryption feature in Mailpile before 1.0.0rc4 does not exclude disabled, revoked, and expired keys. | [
"cpe:2.3:a:mailpile:mailpile:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:1.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mailpile:mailpile:1.0.0:rc3:*:*:*:*:*:*"
] |
|
GHSA-h6m7-j4h3-9rf5 | Remote Code Execution in SyliusResourceBundle | ImpactRequest parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.The vulnerable versions include: `<=1.3.13 || >=1.4.0 <=1.4.6 || >=1.5.0 <=1.5.1 || >=1.6.0 <=1.6.3`.ExampleIn this case, `$id` can be prepared in a way that calls other services.If you visit `/route?id="~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"`, it will result in a following expression `expr:service('repository').find(""~service('doctrine').getManager().getConnection().executeQuery("DELETE * FROM TABLE")~"")`, which will execute a query on the currently connected database.To find a vulnerability in your application, look for any routing definition that uses request parameters inside expression language.PatchesThis issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched.WorkaroundsThe fix requires adding `addslashes` in `OptionsParser::parseOptionExpression` to sanitize user input before evaluating it using the expression language.AcknowledgementsThis security issue has been reported by Craig Blanchette (@isometriks), thanks a lot!For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) | [] |
GHSA-98j8-c9q4-r38g | Memory exhaustion in Tensorflow | ImpactThe [implementation of `StringNGrams`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161) can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow:We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output.PatchesWe have patched the issue in GitHub commit [f68fdab93fb7f4ddb4eb438c8fe052753c9413e8](https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8).The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. | [] |
GHSA-6hq5-54cv-6j3x | A vulnerability in the local management CLI implementation for specific commands on the Cisco UCS B-Series Blade Servers could allow an authenticated, local attacker to overwrite an arbitrary file on disk. It is also possible the attacker could inject CLI command parameters that should not be allowed for a specific subset of local management CLI commands. The vulnerability is due to lack of proper input validation of user input for local management CLI commands. An attacker could exploit this vulnerability by authenticating to the device and issuing a crafted form of a limited subset of local management CLI commands. An exploit could allow the attacker to overwrite an arbitrary files on disk or inject CLI command parameters that should have been disabled. This vulnerability is fixed in software version 4.0(2a) and later. | [] |
|
CVE-2023-33328 | WordPress MailChimp Subscribe Forms Plugin <= 4.0.9.1 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PluginOps MailChimp Subscribe Form plugin <= 4.0.9.1 versions. | [
"cpe:2.3:a:pluginops:mailchimp_subscribe_form:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-27259 | Omron CX-One | The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. | [
"cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
"cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*"
] |
GHSA-7pjr-2rgh-fc5g | Anonymous PrestaShop customer can download other customers' invoices | ImpactSince PrestaShop 8.1.5, any invoice can be downloaded from front-office in anonymous mode, by supplying a random secure_key parameter in the url.PatchesPatched in 8.1.6WorkaroundsUpgrade to 8.1.6Thank you to Samuel Bodevin, who found this vulnerability and shared it with the PrestaShop team. | [] |
CVE-2017-2783 | An exploitable heap corruption vulnerability exists in the FillRowFormat functionality of Antenna House DMC HTMLFilter that is shipped with MarkLogic 8.0-6. A specially crafted xls file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide malicious xls file to trigger this vulnerability. | [
"cpe:2.3:a:marklogic:marklogic:8.0-6:*:*:*:*:*:*:*"
] |
|
CVE-2017-16329 | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event_alarm, at 0x9d01eb44, the value for the `s_event_delay` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*"
] |
|
CVE-2023-50737 | An input validation vulnerability in the SE Menu allows an attacker to execute arbitrary code. | The SE menu contains information used by Lexmark to diagnose device errors. A vulnerability in one of the SE menu routines can be leveraged by an attacker to execute arbitrary code.
| [
"cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mstgm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1140\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxnzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstat_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtat_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstmh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtmh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:msnsn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mstsn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtsn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:csngv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstgv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtgv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx511:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms711:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7263:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5263:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx812:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx717:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx711:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms911:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9165:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx911:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x746:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs798:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs795:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs955:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*"
] |
CVE-2021-23624 | Prototype Pollution | This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays. | [
"cpe:2.3:a:dotty_project:dotty:*:*:*:*:*:*:*:*"
] |
CVE-2022-21701 | Privileged Escalation in Istio | Istio is an open platform to connect, manage, and secure microservices. In versions 1.12.0 and 1.12.1 Istio is vulnerable to a privilege escalation attack. Users who have `CREATE` permission for `gateways.gateway.networking.k8s.io` objects can escalate this privilege to create other resources that they may not have access to, such as `Pod`. This vulnerability impacts only an Alpha level feature, the Kubernetes Gateway API. This is not the same as the Istio Gateway type (gateways.networking.istio.io), which is not vulnerable. Users are advised to upgrade to resolve this issue. Users unable to upgrade should implement any of the following which will prevent this vulnerability: Remove the gateways.gateway.networking.k8s.io CustomResourceDefinition, set PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER=true environment variable in Istiod, or remove CREATE permissions for gateways.gateway.networking.k8s.io objects from untrusted users. | [
"cpe:2.3:a:istio:istio:1.12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:istio:istio:1.12.1:*:*:*:*:*:*:*"
] |
CVE-2024-57984 | i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition | In the Linux kernel, the following vulnerability has been resolved:
i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition
In dw_i3c_common_probe, &master->hj_work is bound with
dw_i3c_hj_work. And dw_i3c_master_irq_handler can call
dw_i3c_master_irq_handle_ibis function to start the work.
If we remove the module which will call dw_i3c_common_remove to
make cleanup, it will free master->base through i3c_master_unregister
while the work mentioned above will be used. The sequence of operations
that may lead to a UAF bug is as follows:
CPU0 CPU1
| dw_i3c_hj_work
dw_i3c_common_remove |
i3c_master_unregister(&master->base) |
device_unregister(&master->dev) |
device_release |
//free master->base |
| i3c_master_do_daa(&master->base)
| //use master->base
Fix it by ensuring that the work is canceled before proceeding with
the cleanup in dw_i3c_common_remove. | [] |
GHSA-4x5q-q7wc-q22p | Arduino Create Agent Insufficient Verification of Data Authenticity vulnerability | ImpactThe vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request.
Further details are available in the references.Fixed Version`1.3.3`ReferencesThe issue was reported by Nozomi Networks Labs. Further details are available at the following URL:https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide | [] |
GHSA-ffgv-qjpf-62hv | Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24517, CVE-2022-24520. | [] |
|
CVE-2015-10081 | arnoldle submitByMailPlugin edit_list.php cross-site request forgery | A vulnerability was found in arnoldle submitByMailPlugin 1.0b2.9 and classified as problematic. This issue affects some unknown processing of the file edit_list.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.0b2.9a is able to address this issue. The patch is named a739f680a1623d22f52ff1371e86ca472e63756f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221495. | [
"cpe:2.3:a:submitbymailplugin_project:submitbymailplugin:1.0b2.9:*:*:*:*:*:*:*"
] |
GHSA-wc42-p9q7-h8fg | The mintToken function of a smart contract implementation for STCToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
CVE-2013-3839 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-42278 | Active Directory Domain Services Elevation of Privilege Vulnerability | Active Directory Domain Services Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1348:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25769:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20174:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] |
GHSA-4x6f-629h-vv8j | An issue was discovered in Independentsoft JSpreadsheet before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file. | [] |
|
CVE-2019-5878 | Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-21668 | pmdomain: imx8mp-blk-ctrl: add missing loop break condition | In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8mp-blk-ctrl: add missing loop break condition
Currently imx8mp_blk_ctrl_remove() will continue the for loop
until an out-of-bounds exception occurs.
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : dev_pm_domain_detach+0x8/0x48
lr : imx8mp_blk_ctrl_shutdown+0x58/0x90
sp : ffffffc084f8bbf0
x29: ffffffc084f8bbf0 x28: ffffff80daf32ac0 x27: 0000000000000000
x26: ffffffc081658d78 x25: 0000000000000001 x24: ffffffc08201b028
x23: ffffff80d0db9490 x22: ffffffc082340a78 x21: 00000000000005b0
x20: ffffff80d19bc180 x19: 000000000000000a x18: ffffffffffffffff
x17: ffffffc080a39e08 x16: ffffffc080a39c98 x15: 4f435f464f006c72
x14: 0000000000000004 x13: ffffff80d0172110 x12: 0000000000000000
x11: ffffff80d0537740 x10: ffffff80d05376c0 x9 : ffffffc0808ed2d8
x8 : ffffffc084f8bab0 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffffff80d19b9420 x4 : fffffffe03466e60 x3 : 0000000080800077
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
Call trace:
dev_pm_domain_detach+0x8/0x48
platform_shutdown+0x2c/0x48
device_shutdown+0x158/0x268
kernel_restart_prepare+0x40/0x58
kernel_kexec+0x58/0xe8
__do_sys_reboot+0x198/0x258
__arm64_sys_reboot+0x2c/0x40
invoke_syscall+0x5c/0x138
el0_svc_common.constprop.0+0x48/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x38/0xc8
el0t_64_sync_handler+0x120/0x130
el0t_64_sync+0x190/0x198
Code: 8128c2d0 ffffffc0 aa1e03e9 d503201f | [] |
GHSA-8vwq-796w-c5f5 | Directory traversal vulnerability in the "Upload Groupkey" functionality in the Web Configuration Utility in Meinberg LANTIME devices with firmware before 6.24.004 allows remote authenticated users with Admin-User access to write to arbitrary files and consequently gain root privileges by uploading a file, as demonstrated by storing a file in the cron.d directory. | [] |
|
CVE-2022-49171 | ext4: don't BUG if someone dirty pages without asking ext4 first | In the Linux kernel, the following vulnerability has been resolved:
ext4: don't BUG if someone dirty pages without asking ext4 first
[un]pin_user_pages_remote is dirtying pages without properly warning
the file system in advance. A related race was noted by Jan Kara in
2018[1]; however, more recently instead of it being a very hard-to-hit
race, it could be reliably triggered by process_vm_writev(2) which was
discovered by Syzbot[2].
This is technically a bug in mm/gup.c, but arguably ext4 is fragile in
that if some other kernel subsystem dirty pages without properly
notifying the file system using page_mkwrite(), ext4 will BUG, while
other file systems will not BUG (although data will still be lost).
So instead of crashing with a BUG, issue a warning (since there may be
potential data loss) and just mark the page as clean to avoid
unprivileged denial of service attacks until the problem can be
properly fixed. More discussion and background can be found in the
thread starting at [2].
[1] https://lore.kernel.org/linux-mm/[email protected]
[2] https://lore.kernel.org/r/[email protected] | [] |
CVE-2019-7230 | The ABB IDAL FTP server mishandles format strings in a username during the authentication process. Attempting to authenticate with the username %s%p%x%d will crash the server. Sending %08x.AAAA.%08x.%08x will log memory content from the stack. | [
"cpe:2.3:o:abb:pb610_panel_builder_600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:pb610_panel_builder_600:-:*:*:*:*:*:*:*"
] |
|
GHSA-65xw-v37r-whx2 | Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6. | [] |
|
GHSA-hvpv-4g86-vvp8 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin/abc.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219597 was assigned to this vulnerability. | [] |
|
GHSA-22gp-7w9x-c2xx | In the Linux kernel, the following vulnerability has been resolved:drm/ast: Fix soft lockupThere is a while-loop in ast_dp_set_on_off() that could lead to
infinite-loop. This is because the register, VGACRI-Dx, checked in
this API is a scratch register actually controlled by a MCU, named
DPMCU, in BMC.These scratch registers are protected by scu-lock. If suc-lock is not
off, DPMCU can not update these registers and then host will have soft
lockup due to never updated status.DPMCU is used to control DP and relative registers to handshake with
host's VGA driver. Even the most time-consuming task, DP's link
training, is less than 100ms. 200ms should be enough. | [] |
|
CVE-2021-2270 | Vulnerability in the Oracle Site Hub product of Oracle E-Business Suite (component: Sites). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Site Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Site Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Site Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:site_hub:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-3665 | TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows XSS on the Extension Manager. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
GHSA-pcw9-mfw8-j232 | Cybozu Office 9.9.0 through 10.3.0 allows remote authenticated users to bypass intended access restrictions, and read or write to plan data, via unspecified vectors, a different vulnerability than CVE-2015-8484, CVE-2015-8485, and CVE-2015-8486. | [] |
|
GHSA-whm8-6443-gw5v | Directory traversal vulnerability in Lil' HTTP server 2.1 and 2.2 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request. | [] |
|
GHSA-52qc-vfpc-9q7h | The Website Toolbox Community plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘websitetoolbox_username’ parameter in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2017-6502 | An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS). | [
"cpe:2.3:a:imagemagick:imagemagick:6.9.7:*:*:*:*:*:*:*"
] |
|
CVE-2023-47520 | WordPress Responsive Column Widgets Plugin <= 1.2.7 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Uno (miunosoft) Responsive Column Widgets plugin <= 1.2.7 versions. | [
"cpe:2.3:a:michaeluno:responsive_column_widgets:*:*:*:*:*:wordpress:*:*"
] |
CVE-2018-11218 | Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows. | [
"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redislabs:redis:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*"
] |
|
CVE-2017-1439 | IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128058. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.9:a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.3:a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:9.7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:10.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_connect:11.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-5gwf-rpm9-v6f8 | A vulnerability has been found in wfh45678 Radar up to 1.0.8 and classified as critical. This vulnerability affects unknown code of the file /services/v1/common/upload. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-737h-r3q7-c58r | GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file | [] |
|
CVE-2018-12408 | TIBCO ActiveMatrix BusinessWorks 5.X XML eXternal Entity Vulnerability | The BusinessWorks engine component of TIBCO Software Inc.'s TIBCO ActiveMatrix BusinessWorks, TIBCO ActiveMatrix BusinessWorks for z/Linux, and TIBCO ActiveMatrix BusinessWorks Distribution for TIBCO Silver Fabric contains a vulnerability that may allow XML eXternal Entity (XXE) attacks via incoming network messages, and may disclose the contents of files accessible to a running BusinessWorks engine Affected releases are TIBCO Software Inc. TIBCO ActiveMatrix BusinessWorks: versions up to and including 5.13.0, TIBCO ActiveMatrix BusinessWorks for z/Linux: versions up to and including 5.13.0, TIBCO ActiveMatrix BusinessWorks Distribution for TIBCO Silver Fabric: versions up to and including 5.13.0. | [
"cpe:2.3:a:tibco:activematrix_businessworks:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_businessworks:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:tibco:activematrix_businessworks_distribution_for_tibco_silver_fabric:*:*:*:*:*:*:*:*"
] |
GHSA-mpf8-2m2f-qxj6 | Improper check before assigning value can lead to integer overflow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA4020, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9531, QCA9558, QCA9563, QCA9880, QCA9886, QCA9980, QCN5502, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150, Snapdragon_High_Med_2016, SXR1130 | [] |
|
CVE-2007-0252 | Unspecified vulnerability in easy-content filemanager allows remote attackers to upload or modify arbitrary files via unspecified vectors. | [
"cpe:2.3:a:easy-content_filemanager:easy-content_filemanager:*:*:*:*:*:*:*:*"
] |
|
GHSA-rrj3-qmh8-72pf | grunt-gh-pages before 0.10.0 may allow unencrypted GitHub credentials to be written to a log file | Versions of `grunt-gh-pages` prior to 0.10.0 are affected by a vulnerability which may cause unencrypted GitHub credentials to be written to a log file in certain circumstances.In the `grunt-gh-pages` deployment scenario where authentication is performed by injecting a GitHub token directly into the auth portion of the URL, `grunt-gh-pages` will write the token to a log file, unencrypted.RecommendationUpdate to version 0.10.0 or later. | [] |
GHSA-wh3j-23pf-373r | Foxit PDF Editor Line Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14368. | [] |
|
CVE-2023-37706 | Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the entrys parameter in the fromAddressNat function. | [
"cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-7982 | Registrations for The Events Calendar < 2.12.4 - Unauthenticated Stored XSS | The Registrations for the Events Calendar WordPress plugin before 2.12.4 does not sanitise and escape some parameters when accepting event registrations, which could allow unauthenticated users to perform Cross-Site Scripting attacks. | [
"cpe:2.3:a:roundupwp:registrations_for_the_events_calendar:*:*:*:*:*:wordpress:*:*"
] |
GHSA-vm3f-p9xp-8hvv | Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp. | [] |
|
GHSA-5fwm-qx75-j28q | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1472. | [] |
|
CVE-2020-14781 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update261:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
CVE-2023-40359 | xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature. | [
"cpe:2.3:a:invisible-island:xterm:*:*:*:*:*:*:*:*"
] |
|
GHSA-cmmj-6wj4-h8f4 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 808, and SD 810, in a PlayReady API function, a buffer over-read can occur. | [] |
|
GHSA-c7q8-63qc-28xc | In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161 | [] |
|
GHSA-245h-2vpj-f5xp | Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU. | [] |
|
CVE-2016-9394 | The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file. | [
"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*"
] |
|
GHSA-jj7h-7pwq-mjvc | Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, (3) Call-ID, (4) User-Agent, and unspecified other SIP protocol fields, which are stored in /var/log/asterisk/full and displayed by admin/modules/logfiles/asterisk-full-log.php. | [] |
|
CVE-2021-37172 | A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device. | [
"cpe:2.3:o:siemens:simatic_s7-1200_cpu_firmware:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1211c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1212c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1212fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1214c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1214fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1215c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1215fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:cpu_1217c:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):*:*:*:*:*:*:*:*"
] |
|
CVE-2020-25610 | The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes. | [
"cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*"
] |
|
CVE-2005-1130 | Cross-site scripting (XSS) vulnerability in index.php in Pinnacle Cart allows remote attackers to inject arbitrary web script or HTML via the pg parameter. | [
"cpe:2.3:a:desert_dog_software:pinnacle_cart:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-22438 | There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. | [
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-7241 | Panda Security Dome Link Following Local Privilege Escalation Vulnerability | Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the PSANHost service. By creating a junction, an attacker can abuse the service to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23375. | [
"cpe:2.3:a:pandasecurity:panda_dome:22.02.01:*:*:*:*:*:*:*"
] |
CVE-2020-4283 | IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 176206. | [
"cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-jjx9-x9mv-mj56 | Buffer overflows in Tiny FTPd 0.52 beta3 FTP server allows users to execute commands via the STOR, RNTO, MKD, XMKD, RMD, XRMD, APPE, SIZE, and RNFR commands. | [] |
|
GHSA-jx75-hx64-35mh | Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code. | [] |
|
CVE-2017-9063 | In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability related to the Customizer exists, involving an invalid customization session. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-4m44-5j2g-xf64 | Improper Neutralization of Input During Web Page Generation in CKEditor4 | A cross-site scripting (XSS) vulnerability in the Color Dialog plugin for CKEditor 4.15.0 allows remote attackers to run arbitrary web script after persuading a user to copy and paste crafted HTML code into one of editor inputs. | [] |
GHSA-74vx-fmx2-pjq3 | An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] |
|
GHSA-vfc6-3mw5-mv5q | A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent. | [] |
|
CVE-2023-42261 | Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy server. | [
"cpe:2.3:a:opensecurity:mobile_security_framework:3.7.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*"
] |
|
GHSA-xc84-x7qm-x975 | The Flexible Wishlist for WooCommerce – Ecommerce Wishlist & Save for later plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wishlist_name’ parameter in all versions up to, and including, 1.2.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-hpph-rx2x-hxc5 | Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. | [] |
|
CVE-2024-1751 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the question_id parameter in all versions up to, and including, 2.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber/student access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2018-18875 | In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a stored Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script via changestationname.php. | [
"cpe:2.3:o:columbiaweather:weather_microserver_firmware:ms_2.6.9900:*:*:*:*:*:*:*",
"cpe:2.3:h:columbiaweather:weather_microserver:-:*:*:*:*:*:*:*"
] |
|
GHSA-jjvf-4cxj-rqv4 | Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Drupal Security Kit allows HTTP DoS.This issue affects Security Kit: from 0.0.0 before 2.0.3. | [] |
|
CVE-2020-16247 | Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. | [
"cpe:2.3:a:philips:clinical_collaboration_platform:*:*:*:*:*:*:*:*"
] |
|
GHSA-qgf5-w7jw-p449 | Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | [] |
|
CVE-2021-43083 | Apache PLC4X 0.9.0 Buffer overflow in PLC4C via crafted server response | Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together. | [
"cpe:2.3:a:apache:plc4x:*:*:*:*:*:*:*:*"
] |
GHSA-6ggq-69xw-3g87 | The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager through V10 R1.54.1 and V11 through R0.22.1 could allow an authenticated attacker to conduct a privilege escalation attack due to the execution of a resource with unnecessary privileges. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges. | [] |
|
CVE-2020-12083 | An elevated privileges issue related to Spring MVC calls impacts Code Insight v7.x releases up to and including 2020 R1 (7.11.0-64). | [
"cpe:2.3:a:flexera:flexnet_code_insight:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-2285 | boyiddha Automated-Mess-Management-System member_edit.php cross site scripting | A vulnerability, which was classified as problematic, has been found in boyiddha Automated-Mess-Management-System 1.0. Affected by this issue is some unknown functionality of the file /member/member_edit.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-256052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:boyiddha:automated-mess-management-system:1.0:*:*:*:*:*:*:*"
] |
GHSA-wwvc-98fq-c42m | Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. | [] |
|
GHSA-gmfw-pf7r-rv62 | Buffer overflow in Apple iTunes before 9.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted itpc: URL. | [] |
|
CVE-2024-45919 | A security flaw has been discovered in Solvait version 24.4.2 that allows an attacker to elevate their privileges. By manipulating the Request ID and Action Type parameters in /AssignToMe/SetAction, an attacker can bypass approval workflows leading to unauthorized access to sensitive information or approval of fraudulent requests. | [
"cpe:2.3:a:solvait:solvait:24.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-35628 | A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability. | [
"cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-gw3m-hx6j-h3r6 | The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.89.6 due to insufficient input sanitization and output escaping on user supplied attributes like 'title_tag'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-frm9-8j39-j893 | The Avaya 4602 SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware allows remote attackers to cause a denial of service (device reboot) via a flood of packets to the BOOTP port (68/udp). | [] |
|
GHSA-vhcg-jff3-96w6 | An access issue was addressed with improvements to the sandbox. This issue is fixed in Safari 16, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13. A sandboxed process may be able to circumvent sandbox restrictions. | [] |
|
CVE-2007-0366 | Untrusted search path vulnerability in Rumpus 5.1 and earlier allows local users to gain privileges via a modified PATH that points to a malicious ipfw program. | [
"cpe:2.3:a:maxum_development_corporation:rumpus_ftp_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-9cx3-wq6r-qvm7 | Novell Netware 5.0 through 5.1 may allow local users to gain "Domain Admin" rights by logging into a Novell Directory Services (NDS) account, and executing "net use" on an NDS_ADM account that is not in the NT domain but has domain access rights, which allows the user to enter a null password. | [] |
|
CVE-2017-5709 | Multiple privilege escalations in kernel in Intel Server Platform Services Firmware 4.0 allows unauthorized process to access privileged content via unspecified vector. | [
"cpe:2.3:o:intel:server_platform_services_firmware:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-cc52-c5qx-vgg7 | The ArtPlacer Widget WordPress plugin before 2.21.2 does not have authorisation check in place when deleting widgets, allowing ay authenticated users, such as subscriber, to delete arbitrary widgets | [] |
|
CVE-2020-8351 | A privilege escalation vulnerability was reported in Lenovo PCManager prior to version 3.0.50.9162 that could allow an authenticated user to execute code with elevated privileges. | [
"cpe:2.3:a:lenovo:pcmanager:*:*:*:*:*:*:*:*"
] |
|
GHSA-p744-68mc-9w5j | The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | [] |
|
GHSA-8w4p-7hgw-33qp | TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the startTime and endTime parameters in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [] |
|
GHSA-xc49-m3g9-p285 | Microsoft Internet Explorer 6.0 through 8.0 beta2 allows remote attackers to cause a denial of service (application crash) via an onload=screen[""] attribute value in a BODY element. | [] |
Subsets and Splits