id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2024-34415
|
WordPress Thim Elementor Kit plugin <= 1.1.8 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress Thim Elementor Kit allows Stored XSS.This issue affects Thim Elementor Kit: from n/a through 1.1.8.
|
[] |
CVE-2012-1740
|
Unspecified vulnerability in the Oracle Application Express Listener component in Oracle Application Express Listener 1.1-ea, 1.1.1, 1.1.2, and 1.1.3 allows remote attackers to affect confidentiality via unknown vectors.
|
[
"cpe:2.3:a:oracle:application_express_listener:1.1-ea:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_express_listener:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_express_listener:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_express_listener:1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-rrh3-gpv6-cmj6
|
qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root.
|
[] |
|
CVE-2023-0291
|
The Quiz And Survey Master for WordPress is vulnerable to authorization bypass due to a missing capability check on the function associated with the qsm_remove_file_fd_question AJAX action in versions up to, and including, 8.0.8. This makes it possible for unauthenticated attackers to delete arbitrary media files.
|
[
"cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8h7f-c83v-885w
|
Vulnerability in the Oracle Communications Interactive Session Recorder product of Oracle Communications Applications (component: FACE). Supported versions that are affected are 6.1-6.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Communications Interactive Session Recorder executes to compromise Oracle Communications Interactive Session Recorder. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Communications Interactive Session Recorder accessible data as well as unauthorized update, insert or delete access to some of Oracle Communications Interactive Session Recorder accessible data. CVSS 3.1 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N).
|
[] |
|
GHSA-9fmh-5x9m-5jjm
|
Multiple SQL injection vulnerabilities in the search function in pi1/class.tx_dmmjobcontrol_pi1.php in the JobControl (dmmjobcontrol) extension 2.14.0 and earlier for TYPO3 allow remote attackers to execute arbitrary SQL commands via the (1) education, (2) region, or (3) sector fields, as demonstrated by the tx_dmmjobcontrol_pi1[search][sector][] parameter to jobs/.
|
[] |
|
CVE-2023-49339
|
Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint.
|
[
"cpe:2.3:a:ellucian:banner:*:*:*:*:*:*:*:*"
] |
|
GHSA-572q-86rr-5vgq
|
Withdrawn Advisory: Umbraco Rich Text Display allows Cross-Site Scripting
|
Withdrawn AdvisoryThis advisory has been withdrawn because the issue is a [documented security](https://docs.umbraco.com/umbraco-cms/reference/security/serverside-sanitizing). This link is maintained to preserve external references. For more information, see https://github.com/github/advisory-database/pull/5270.Original AdvisoryA stored cross-site scripting (XSS) vulnerability in Umbraco CMS v14.3.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[] |
GHSA-mjqh-7v2m-9p6m
|
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 22935234.
|
[] |
|
GHSA-5fm9-jmv7-fcx5
|
Malicious Package in asynnc
|
All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
|
[] |
GHSA-fr6r-xw3f-g957
|
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
|
[] |
|
CVE-2020-0515
|
Uncontrolled search path element in the installer for Intel(R) Graphics Drivers before versions 26.20.100.7584, 15.45.30.5103, 15.40.44.5107, 15.36.38.5117, and 15.33.49.5100 may allow an authenticated user to potentially enable escalation of privilege via local access
|
[
"cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*"
] |
|
GHSA-r299-g8pg-6xf2
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Improve My City Improve My City allows Reflected XSS. This issue affects Improve My City: from n/a through 1.6.
|
[] |
|
CVE-2010-3696
|
The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:freeradius:freeradius:2.1.9:*:*:*:*:*:*:*"
] |
|
CVE-2003-1212
|
MaxWebPortal 1.30 allows remote attackers to perform unauthorized actions by modifying hidden form fields, such as the (1) news, (2) lock, or (3) allmem fields in the 'start new topic' HTML page.
|
[
"cpe:2.3:a:maxwebportal:maxwebportal:1.30:*:*:*:*:*:*:*"
] |
|
GHSA-gqqx-2pfx-73vq
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
|
[] |
|
GHSA-fxmx-955j-w68g
|
The implementation of notification permissions in Google Chrome before 6.0.472.53 allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
|
[] |
|
GHSA-5q76-4wqj-g7q5
|
Improper authentication vulnerability in Cybozu Garoon 4.0.0 to 4.10.3 allows remote attackers to obtain data in the affected product via the API.
|
[] |
|
GHSA-563p-62v9-9x9p
|
htmlheadline before 21.8 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
|
[] |
|
CVE-2023-43344
|
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Meta description parameter in the Pages Menu component.
|
[
"cpe:2.3:a:opensolution:quick_cms:6.7:*:*:*:*:*:*:*"
] |
|
CVE-2024-6339
|
Phlox PRO <= 5.16.4 - Reflected Cross-Site Scripting via Search Parameters
|
The Phlox PRO theme for WordPress is vulnerable to Reflected Cross-Site Scripting via search parameters in all versions up to, and including, 5.16.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:averta:phlox:*:*:*:*:pro:wordpress:*:*"
] |
GHSA-r69v-8jrx-7387
|
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.
|
[] |
|
GHSA-qwf2-v6qh-2fq6
|
TheServer 1.74 web server stores server.ini under the web document root with insufficient access control, which allows remote attackers to obtain cleartext passwords and gain access to server log files.
|
[] |
|
GHSA-w65x-2cwr-hcvq
|
The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
|
[] |
|
GHSA-x4fw-v2f8-f3pj
|
A CWE-787: Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (Firmware version 4.3 and prior), which may cause a Denial of Service when specific TCP/IP crafted packets are sent to the Modicon M218 Logic Controller.
|
[] |
|
GHSA-2gv2-pxwx-gjc4
|
The portal client in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 through FP6 allows remote authenticated users to gain privileges via unspecified vectors.
|
[] |
|
CVE-2024-26810
|
vfio/pci: Lock external INTx masking ops
|
In the Linux kernel, the following vulnerability has been resolved:
vfio/pci: Lock external INTx masking ops
Mask operations through config space changes to DisINTx may race INTx
configuration changes via ioctl. Create wrappers that add locking for
paths outside of the core interrupt code.
In particular, irq_type is updated holding igate, therefore testing
is_intx() requires holding igate. For example clearing DisINTx from
config space can otherwise race changes of the interrupt configuration.
This aligns interfaces which may trigger the INTx eventfd into two
camps, one side serialized by igate and the other only enabled while
INTx is configured. A subsequent patch introduces synchronization for
the latter flows.
|
[] |
GHSA-xcjx-g6h3-96jc
|
Buffer overflow in WebService Authentication processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw/Satera MF551dw/Satera MF457dw firmware v05.07 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw/imageCLASS MF455dw/imageCLASS MF453dw/imageCLASS MF452dw/imageCLASS MF451dw/imageCLASS LBP237dw/imageCLASS LBP236dw/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II/imageCLASS X LBP1238 II firmware v05.07 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw/i-SENSYS MF553dw/i-SENSYS MF552dw/i-SENSYS MF455dw/i-SENSYS MF453dw/i-SENSYS LBP236dw/i-SENSYS LBP233dw/imageRUNNER 1643iF II/imageRUNNER 1643i II/i-SENSYS X 1238iF II/i-SENSYS X 1238i II/i-SENSYS X 1238P II/i-SENSYS X 1238Pr II firmware v05.07 and earlier sold in Europe.
|
[] |
|
GHSA-jx4p-m4wm-vvjg
|
Malicious directory junction can cause WiX RemoveFoldersEx to possibly delete elevated files
|
SummaryThe custom action behind WiX's `RemoveFolderEx` functionality could allow a standard user to delete protected directories.Details`RemoveFolderEx` deletes an entire directory tree during installation or uninstallation. It does so by recursing every subdirectory starting at a specified directory and adding each subdirectory to the list of directories Windows Installer should delete. If the setup author instructed `RemoveFolderEx` to delete a per-user folder from a per-machine installer, an attacker could create a directory junction in that per-user folder pointing to a per-machine, protected directory. Windows Installer, when executing the per-machine installer after approval by an administrator, would delete the target of the directory junction.
|
[] |
GHSA-8r57-h742-hc9g
|
Missing Authorization vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice.This issue affects PeproDev Ultimate Invoice: from n/a through 2.0.0.
|
[] |
|
CVE-2025-3607
|
Frontend Login and Registration Blocks <= 1.0.7 - Authenticated (Subscriber+) Privilege Escalation via Password Reset
|
The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user's identity prior to updating a password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
|
[] |
GHSA-8hmh-2f4f-8hr6
|
Rock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4.
|
[] |
|
CVE-2007-3108
|
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
] |
|
GHSA-5p64-g2j6-m9w7
|
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.
|
[] |
|
CVE-2006-4023
|
The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.
|
[
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*"
] |
|
GHSA-5whg-6vqr-5wxf
|
Windows Telephony Service Remote Code Execution Vulnerability
|
[] |
|
CVE-2025-32506
|
WordPress AT Internet SmartTag plugin <= 0.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BenDlz AT Internet SmartTag allows Reflected XSS. This issue affects AT Internet SmartTag: from n/a through 0.2.
|
[] |
GHSA-vvcx-j7jq-9x76
|
Unrestricted file upload vulnerability in upload.php in dreamLog (aka dreamblog) 0.5 allows remote attackers to upload and execute arbitrary PHP code in uploads/images/ via the uploadedFile[] parameter.
|
[] |
|
GHSA-xrj6-cww5-qm75
|
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.
|
[] |
|
CVE-2020-13892
|
The SportsPress plugin before 2.7.2 for WordPress allows XSS.
|
[
"cpe:2.3:a:themeboy:sportspress:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2012-2898
|
Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:21.0.1180.80:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipad2:-:*:*:*:*:*:*:*"
] |
|
GHSA-r75c-w926-gc25
|
In libDRCdec, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137282770
|
[] |
|
CVE-2008-3317
|
admin/index.php in Maian Search 1.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary search_cookie cookie.
|
[
"cpe:2.3:a:maian_script_world:maian_search:*:*:*:*:*:*:*:*",
"cpe:2.3:a:maian_script_world:maian_search:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-48q4-2p6c-rxg9
|
Missing Authorization vulnerability in Automattic Sensei LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sensei LMS: from n/a through 4.24.4.
|
[] |
|
CVE-2023-23132
|
Selfwealth iOS mobile App 3.3.1 is vulnerable to Sensitive key disclosure. The application reveals hardcoded API keys.
|
[
"cpe:2.3:a:selfwealth:selfwealth:3.3.1:*:*:*:*:iphone_os:*:*"
] |
|
CVE-2009-2135
|
Multiple race conditions in the Solaris Event Port API in Sun Solaris 10 and OpenSolaris before snv_107 allow local users to cause a denial of service (panic) via unspecified vectors related to a race between the port_dissociate and close functions.
|
[
"cpe:2.3:o:sun:opensolaris:*:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:*:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
] |
|
GHSA-wv3q-vh98-3c66
|
The kernel in IBM AIX 6.1 allows local users with ProbeVue privileges to read arbitrary kernel memory and obtain sensitive information via unspecified vectors.
|
[] |
|
GHSA-3wr8-w2fq-6q7v
|
In the Linux kernel, the following vulnerability has been resolved:md/raid1,raid10: don't ignore IO flagsIf blk-wbt is enabled by default, it's found that raid write performance
is quite bad because all IO are throttled by wbt of underlying disks,
due to flag REQ_IDLE is ignored. And turns out this behaviour exist since
blk-wbt is introduced.Other than REQ_IDLE, other flags should not be ignored as well, for
example REQ_META can be set for filesystems, clearing it can cause priority
reverse problems; And REQ_NOWAIT should not be cleared as well, because
io will wait instead of failing directly in underlying disks.Fix those problems by keep IO flags from master bio.Fises: f51d46d0e7cb ("md: add support for REQ_NOWAIT")
|
[] |
|
GHSA-9gpg-63cp-jr3x
|
Microsoft Exchange Remote Code Execution Vulnerability
|
[] |
|
CVE-2017-8834
|
The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
|
[
"cpe:2.3:a:gnome:libcroco:0.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-30995
|
Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.
|
[
"cpe:2.3:a:acronis:cyber_backup:12.5:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:10130:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:10330:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:11010:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:13160:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:13400:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:14280:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:14330:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16180:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16318:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:16327:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:7641:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:7970:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:8850:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_backup:12.5:9010:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-48147
|
WordPress CryptoCloud - Crypto Payment Gateway <= 2.1.2 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Crypto Cloud CryptoCloud - Crypto Payment Gateway allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CryptoCloud - Crypto Payment Gateway: from n/a through 2.1.2.
|
[] |
CVE-2016-8018
|
Cross-site request forgery (CSRF) vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows authenticated remote attackers to execute unauthorized commands via a crafted user input.
|
[
"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:linux:*:*"
] |
|
CVE-2022-50211
|
md-raid10: fix KASAN warning
|
In the Linux kernel, the following vulnerability has been resolved:
md-raid10: fix KASAN warning
There's a KASAN warning in raid10_remove_disk when running the lvm
test lvconvert-raid-reshape.sh. We fix this warning by verifying that the
value "number" is valid.
BUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]
Read of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682
CPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl+0x34/0x44
print_report.cold+0x45/0x57a
? __lock_text_start+0x18/0x18
? raid10_remove_disk+0x61/0x2a0 [raid10]
kasan_report+0xa8/0xe0
? raid10_remove_disk+0x61/0x2a0 [raid10]
raid10_remove_disk+0x61/0x2a0 [raid10]
Buffer I/O error on dev dm-76, logical block 15344, async page read
? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0
remove_and_add_spares+0x367/0x8a0 [md_mod]
? super_written+0x1c0/0x1c0 [md_mod]
? mutex_trylock+0xac/0x120
? _raw_spin_lock+0x72/0xc0
? _raw_spin_lock_bh+0xc0/0xc0
md_check_recovery+0x848/0x960 [md_mod]
raid10d+0xcf/0x3360 [raid10]
? sched_clock_cpu+0x185/0x1a0
? rb_erase+0x4d4/0x620
? var_wake_function+0xe0/0xe0
? psi_group_change+0x411/0x500
? preempt_count_sub+0xf/0xc0
? _raw_spin_lock_irqsave+0x78/0xc0
? __lock_text_start+0x18/0x18
? raid10_sync_request+0x36c0/0x36c0 [raid10]
? preempt_count_sub+0xf/0xc0
? _raw_spin_unlock_irqrestore+0x19/0x40
? del_timer_sync+0xa9/0x100
? try_to_del_timer_sync+0xc0/0xc0
? _raw_spin_lock_irqsave+0x78/0xc0
? __lock_text_start+0x18/0x18
? _raw_spin_unlock_irq+0x11/0x24
? __list_del_entry_valid+0x68/0xa0
? finish_wait+0xa3/0x100
md_thread+0x161/0x260 [md_mod]
? unregister_md_personality+0xa0/0xa0 [md_mod]
? _raw_spin_lock_irqsave+0x78/0xc0
? prepare_to_wait_event+0x2c0/0x2c0
? unregister_md_personality+0xa0/0xa0 [md_mod]
kthread+0x148/0x180
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x1f/0x30
</TASK>
Allocated by task 124495:
kasan_save_stack+0x1e/0x40
__kasan_kmalloc+0x80/0xa0
setup_conf+0x140/0x5c0 [raid10]
raid10_run+0x4cd/0x740 [raid10]
md_run+0x6f9/0x1300 [md_mod]
raid_ctr+0x2531/0x4ac0 [dm_raid]
dm_table_add_target+0x2b0/0x620 [dm_mod]
table_load+0x1c8/0x400 [dm_mod]
ctl_ioctl+0x29e/0x560 [dm_mod]
dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]
__do_compat_sys_ioctl+0xfa/0x160
do_syscall_64+0x90/0xc0
entry_SYSCALL_64_after_hwframe+0x46/0xb0
Last potentially related work creation:
kasan_save_stack+0x1e/0x40
__kasan_record_aux_stack+0x9e/0xc0
kvfree_call_rcu+0x84/0x480
timerfd_release+0x82/0x140
L __fput+0xfa/0x400
task_work_run+0x80/0xc0
exit_to_user_mode_prepare+0x155/0x160
syscall_exit_to_user_mode+0x12/0x40
do_syscall_64+0x42/0xc0
entry_SYSCALL_64_after_hwframe+0x46/0xb0
Second to last potentially related work creation:
kasan_save_stack+0x1e/0x40
__kasan_record_aux_stack+0x9e/0xc0
kvfree_call_rcu+0x84/0x480
timerfd_release+0x82/0x140
__fput+0xfa/0x400
task_work_run+0x80/0xc0
exit_to_user_mode_prepare+0x155/0x160
syscall_exit_to_user_mode+0x12/0x40
do_syscall_64+0x42/0xc0
entry_SYSCALL_64_after_hwframe+0x46/0xb0
The buggy address belongs to the object at ffff889108f3d200
which belongs to the cache kmalloc-256 of size 256
The buggy address is located 0 bytes to the right of
256-byte region [ffff889108f3d200, ffff889108f3d300)
The buggy address belongs to the physical page:
page:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c
head:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0
flags: 0x4000000000010200(slab|head|zone=2)
raw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40
raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff889108f3d280: 00 00
---truncated---
|
[] |
CVE-2024-31122
|
WordPress User Rights Access Manager plugin <= 1.1.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Prism IT Systems User Rights Access Manager allows Reflected XSS.This issue affects User Rights Access Manager: from n/a through 1.1.2.
|
[] |
CVE-2002-1547
|
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144.
|
[
"cpe:2.3:o:juniper:netscreen_screenos:*:*:*:*:*:*:*:*"
] |
|
GHSA-mf7h-4qw9-wc8m
|
Buffer overflow can occur while parsing RSN IE containing list of PMK ID`s which are more than the buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096, APQ8096AU, APQ8098, IPQ6018, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS405, QCS605, SA6155P, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] |
|
CVE-2023-21791
|
3D Builder Remote Code Execution Vulnerability
|
3D Builder Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*"
] |
CVE-2014-6491
|
Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-54560
|
A logic issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18, watchOS 11, tvOS 18, macOS Sequoia 15. A malicious app may be able to modify other apps without having App Management permission.
|
[] |
|
CVE-2017-15324
|
Huawei S5700 and S6700 with software of V200R005C00 have a DoS vulnerability due to insufficient validation of the Network Quality Analysis (NQA) packets. A remote attacker could exploit this vulnerability by sending malformed NQA packets to the target device. Successful exploitation could make the device restart.
|
[
"cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*"
] |
|
GHSA-rx47-c6vv-q4gw
|
EMC Documentum D2 before 4.6 lacks intended ACLs for configuration objects, which allows remote authenticated users to modify objects via unspecified vectors.
|
[] |
|
GHSA-hcxg-6ffh-5mqj
|
An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
|
[] |
|
GHSA-p84q-2g4j-5xjv
|
The Lava Iris 88 Go Android device with a build fingerprint of LAVA/iris88_go/iris88_go:8.1.0/O11019/1538188945:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.
|
[] |
|
CVE-2011-3944
|
The smacker_decode_header_tree function in libavcodec/smacker.c in FFmpeg before 0.10 allows remote attackers to have an unspecified impact via crafted Smacker data.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*"
] |
|
CVE-2018-3983
|
An exploitable uninitialized pointer vulnerability exists in the Word document parser of the the Atlantis Word Processor. A specially crafted document can cause an array fetch to return an uninitialized pointer and then performs some arithmetic before writing a value to the result. Usage of this uninitialized pointer can allow an attacker to corrupt heap memory resulting in code execution under the context of the application. An attacker must convince a victim to open a document in order to trigger this vulnerability.
|
[
"cpe:2.3:a:atlantiswordprocessor:atlantis_word_processor:3.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlantiswordprocessor:atlantis_word_processor:3.0.2.5:*:*:*:*:*:*:*"
] |
|
GHSA-53cx-fgg8-7vq6
|
Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'subject' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] |
|
GHSA-69p9-7943-9qhx
|
A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-5hmm-wjg3-4m2m
|
Out of bound memory access while playing music playbacks with crafted vorbis content due to improper checks in header extraction in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
|
[] |
|
CVE-2020-2206
|
Jenkins VncRecorder Plugin 1.25 and earlier does not escape a parameter value in the checkVncServ form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:jenkins:vncrecorder:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-j68x-f2hj-294c
|
Multiple buffer overflows in LISTSERV 14.3 and 14.4, including LISTSERV Lite and HPO, with the web archive interface enabled, allow remote attackers to execute arbitrary code via unknown attack vectors related to the WA CGI. NOTE: technical details will be released after the grace period has ended on 20060603.
|
[] |
|
CVE-2021-21396
|
Bulk list client endpoint exposes too much metadata about a client
|
wire-server is an open-source back end for Wire, a secure collaboration platform. In wire-server from version 2021-02-16 and before version 2021-03-02, the client metadata of all users was exposed in the `GET /users/list-clients` endpoint. The endpoint could be used by any logged in user who could request client details of any other user (no connection required) as far as they can find their User ID. The exposed metadata included id, class, type, location, time, and cookie. A user on a Wire backend could use this endpoint to find registration time and location for each device for a given list of users. As a workaround, remove `/list-clients` from nginx config. This has been fixed in version 2021-03-02.
|
[
"cpe:2.3:a:wire:wire_server:*:*:*:*:*:*:*:*"
] |
CVE-2019-1000002
|
Gitea version 1.6.2 and earlier contains a Incorrect Access Control vulnerability in Delete/Edit file functionallity that can result in the attacker deleting files outside the repository he/she has access to. This attack appears to be exploitable via the attacker must get write access to "any" repository including self-created ones.. This vulnerability appears to have been fixed in 1.6.3, 1.7.0-rc2.
|
[
"cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-2052
|
Stack-based buffer overflow in the U3D.8BI library plugin in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a long Collada asset element in a DAE file, as demonstrated by the cameraYFov value in the contributor comments element.
|
[
"cpe:2.3:a:adobe:photoshop_cs5:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cs5:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cs5:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cs5:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cs5:12.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:photoshop_cs5.1:12.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-38412
|
Use After Free in Computer Vision
|
Memory corruption while invoking IOCTL calls from user-space to kernel-space to handle session errors.
|
[] |
CVE-2018-20864
|
cPanel before 76.0.8 allows a persistent Virtual FTP accounts after removal of its associated domain (SEC-454).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-5133
|
Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
|
[
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*"
] |
|
CVE-2019-25140
|
The WordPress Coming Soon Page & Maintenance Mode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the logo_width, logo_height, rcsp_logo_url, home_sec_link_txt, rcsp_headline and rcsp_description parameters in versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:wpshopmart:coming_soon_page_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-5pjj-7m4p-wfh2
|
ocrodjvu is vulnerable to Arbitrary File Modification via symlink attack
|
ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine.
|
[] |
CVE-2025-23678
|
WordPress LocalGrid plugin <= 1.0.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LocalGrid allows Reflected XSS. This issue affects LocalGrid: from n/a through 1.0.1.
|
[] |
GHSA-pqrv-8r2f-7278
|
Crash due to erroneous `StatusOr` in TensorFlow
|
ImpactA `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L560-L567):If `ctor_type` is an error status, `ValueOrDie` results in a crash.PatchesWe have patched the issue in GitHub commit [955059813cc325dc1db5e2daa6221271406d4439](https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439).We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
[] |
CVE-2022-24305
|
Zoho ManageEngine SharePoint Manager Plus before 4329 is vulnerable to a sensitive data leak that leads to privilege escalation.
|
[
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4009:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4012:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4013:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4014:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4015:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4016:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4017:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4018:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4020:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4021:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4023:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4024:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4025:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4026:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4027:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4028:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4029:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4031:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4032:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4033:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4301:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4302:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4303:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4304:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4305:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4306:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4307:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4308:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4309:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4310:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4311:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4313:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4314:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4315:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4316:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4317:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4318:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4319:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4320:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4321:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4322:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4325:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_sharepoint_manager_plus:-:build_4328:*:*:*:*:*:*"
] |
|
GHSA-93vf-fhrw-pvpj
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16343.
|
[] |
|
GHSA-8cmj-8vj9-mq97
|
An elevation of privilege vulnerability exists when the Windows Wireless Network Manager improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Wireless Network Manager Elevation of Privilege Vulnerability'.
|
[] |
|
CVE-2019-14965
|
An issue was discovered in Frappe Framework 10 through 12 before 12.0.4. A server side template injection (SSTI) issue exists.
|
[
"cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-26307
|
A memory leak has been identified in the parseSWF_IMPORTASSETS2 function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file.
|
[] |
|
GHSA-x7v6-r6c2-98v3
|
Under certain conditions SAP Gateway of ABAP Application Server (fixed in SAP_GWFND 7.5, 7.51, 7.52, 7.53; SAP_BASIS 7.5) allows an attacker to access information which would otherwise be restricted.
|
[] |
|
CVE-2017-15573
|
In Redmine before 3.2.6 and 3.3.x before 3.3.3, XSS exists because markup is mishandled in wiki content.
|
[
"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-47841
|
Path traversal when loading stylesheets
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The Wikimedia Foundation Mediawiki - CSS Extension allows Path Traversal.This issue affects Mediawiki - CSS Extension: from 1.42.X before 1.42.2, from 1.41.X before 1.41.3, from 1.39.X before 1.39.9.
|
[
"cpe:2.3:a:wikimedia:mediawiki-extensions-css:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wikimedia:wikimedia-extensions-css:*:*:*:*:*:*:*:*"
] |
GHSA-r9j5-x78r-349r
|
H3C GR2200 MiniGR1A0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.
|
[] |
|
GHSA-mp6r-fgw2-rxfx
|
Arbitrary return types in xcb
|
The function xcb::xproto::GetPropertyReply::value() returns a slice of type T where T is an unconstrained type parameter. The raw bytes received from the X11 server are interpreted as the requested type. The users of the xcb crate are advised to only call this function with the intended types. These are u8, u16, and u32.This issue is tracked here: https://github.com/rust-x-bindings/rust-xcb/issues/95
|
[] |
GHSA-8j3v-gq95-c8m8
|
The Steam Group Viewer WordPress plugin through 2.1 does not sanitise or escape its "Steam Group Address" settings before outputting it in the page, leading to an authenticated Stored Cross-Site Scripting issue
|
[] |
|
CVE-2020-20296
|
An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands.
|
[
"cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*"
] |
|
GHSA-8g4f-q9c8-h6pv
|
An issue was discovered in Adobe Digital Editions 4.5.6 and earlier versions. Adobe Digital Editions parses crafted XML files in an unsafe manner, which could lead to sensitive information disclosure.
|
[] |
|
GHSA-pjqf-p7cw-pv8c
|
The “Sina Extension for Elementor� WordPress Plugin before 3.3.12 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
|
[] |
|
GHSA-9g7f-qqq7-j65j
|
Axway SecureTransport 5.x through 5.3 (or 5.x through 5.5 with certain API configuration) is vulnerable to unauthenticated blind XML injection (and XXE) in the resetPassword functionality via the REST API. This vulnerability can lead to local file disclosure, DoS, or URI invocation attacks (i.e., SSRF with resultant remote code execution).
|
[] |
|
GHSA-6758-4v7r-9j9v
|
A elevation of privilege vulnerability in the Upstream kernel audio driver. Product: Android. Versions: Android kernel. ID: A-64315347.
|
[] |
|
GHSA-jj32-8cmg-q469
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] |
|
GHSA-x9g5-mhfw-m5p8
|
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but admin privileges are required
|
[] |
|
CVE-2020-16120
|
Unprivileged overlay + shiftfs read access
|
Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.