id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2014-8629 | Cross-site scripting (XSS) vulnerability in the Page visualization agents in Pandora FMS 5.1 SP1 and earlier allows remote attackers to inject arbitrary web script or HTML via the refr parameter to index.php. | [
"cpe:2.3:a:pandorafms:pandora_flexible_monitoring_system:*:sp1:*:*:*:*:*:*"
]
|
|
GHSA-qhx7-j395-3hwr | Multiple SQL injection vulnerabilities in index.php in Dreamlevels DreamPoll 3.1 allow remote attackers to execute arbitrary SQL commands via the (1) sortField, (2) sortDesc, or (3) pageNumber parameter in a login action. | []
|
|
CVE-2018-7687 | Client for OES Elevation of Privilege via Buffer Overflow | The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys. | [
"cpe:2.3:a:microfocus:client:*:*:*:*:*:open_enterprise_server:*:*",
"cpe:2.3:a:microfocus:client:2.0:sp3:*:*:*:open_enterprise_server:*:*"
]
|
GHSA-vjr3-38jv-f828 | The web interface on the Cisco Scientific Atlanta WebSTAR DPC2100R2 cable modem with firmware 2.0.2r1256-060303 has a default administrative password (aka SAPassword) of W2402, which makes it easier for remote attackers to obtain privileged access. | []
|
|
CVE-2020-20227 | Mikrotik RouterOs stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access. | [
"cpe:2.3:o:mikrotik:routeros:6.47:*:*:*:-:*:*:*"
]
|
|
CVE-2020-11536 | An issue was discovered in ONLYOFFICE Document Server 5.5.0. An attacker can craft a malicious .docx file, and exploit the unzip function to rewrite a binary and remotely execute code on a victim's server. | [
"cpe:2.3:a:onlyoffice:document_server:5.5.0:*:*:*:*:*:*:*"
]
|
|
GHSA-xq54-79cv-mcq9 | Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | []
|
|
CVE-2018-9274 | In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
]
|
|
CVE-2022-34473 | The HTML Sanitizer should have sanitized the <code>href</code> attribute of SVG <code><use></code> tags; however it incorrectly did not sanitize <code>xlink:href</code> attributes. This vulnerability affects Firefox < 102. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
]
|
|
GHSA-wx8m-rrw2-wqmw | WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | []
|
|
CVE-2016-10477 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 400, SD 430, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, and SD 820, while processing smart card requests, a buffer overflow can occur. | [
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*"
]
|
|
GHSA-hx3f-8w4f-f2mw | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.0), RUGGEDCOM ROX MX5000RE (All versions < V2.16.0), RUGGEDCOM ROX RX1400 (All versions < V2.16.0), RUGGEDCOM ROX RX1500 (All versions < V2.16.0), RUGGEDCOM ROX RX1501 (All versions < V2.16.0), RUGGEDCOM ROX RX1510 (All versions < V2.16.0), RUGGEDCOM ROX RX1511 (All versions < V2.16.0), RUGGEDCOM ROX RX1512 (All versions < V2.16.0), RUGGEDCOM ROX RX1524 (All versions < V2.16.0), RUGGEDCOM ROX RX1536 (All versions < V2.16.0), RUGGEDCOM ROX RX5000 (All versions < V2.16.0). A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. The value is reflected in the response without sanitization while throwing an
“invalid params element name” error on the get_elements parameters. | []
|
|
CVE-2023-39464 | Triangle MicroWorks SCADA Data Gateway GTWWebMonitorService Unquoted Search Path Remote Code Execution Vulnerability | Triangle MicroWorks SCADA Data Gateway GTWWebMonitorService Unquoted Search Path Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute code on affected installations of Triangle MicroWorks SCADA Data Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the configuration of the GTWWebMonitorService service. The path to the service executable contains spaces not surrounded by quotations. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-20538. | [
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:5.1.3.20324:*:*:*:*:*:*:*"
]
|
GHSA-2chv-fjr5-r6p4 | Cross-site scripting (XSS) vulnerability in index.php in Harold Bakker's NewsScript (HB-NS) 1.3 allows remote attackers to inject arbitrary web script or HTML via the topic parameter in a topic action, a different vector than CVE-2006-2146. | []
|
|
GHSA-9c2c-5v89-7hcj | An elevation of privilege vulnerability in SurfaceFlinger could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32628763. | []
|
|
GHSA-2qrg-x229-3v8q | Deserialization of Untrusted Data in Log4j | Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17.Users are advised to migrate to `org.apache.logging.log4j:log4j-core`. | []
|
GHSA-q89v-65jp-xc8g | Unspecified vulnerability in Oracle HTTP Server 9.0.1.5, Application Server 9.0.4.3, 10.1.2.0.0, 10.1.2.0.2, and 10.1.2.2; and Collaboration Suite 9.0.4.2 and 10.1.2; has unknown impact and attack vectors related to the Oracle Process Mgmt & Notification component, aka OPMN01. NOTE: as of 20070123, Oracle has not disputed claims by a reliable researcher that OPMN01 is for a buffer overflow in Oracle Notification Service (ONS). | []
|
|
GHSA-2g72-c9c4-mr3v | Cisco IOS 12.2, 12.4, 15.0, 15.2, and 15.3, when a VRF interface is configured, allows remote attackers to cause a denial of service (interface queue wedge) via crafted ICMPv4 packets, aka Bug ID CSCsi02145. | []
|
|
CVE-2023-35173 | End-to-End encrypted file-drops can be made inaccessible | Nextcloud End-to-end encryption app provides all the necessary APIs to implement End-to-End encryption on the client side. By providing an invalid meta data file, an attacker can make previously dropped files inaccessible. It is recommended that the Nextcloud End-to-end encryption app is upgraded to version 1.12.4 that contains the fix.
| [
"cpe:2.3:a:nextcloud:end-to-end_encryption:*:*:*:*:*:*:*:*"
]
|
CVE-2002-0164 | Vulnerability in the MIT-SHM extension of the X server on Linux (XFree86) 4.2.1 and earlier allows local users to read and write arbitrary shared memory, possibly to cause a denial of service or gain privileges. | [
"cpe:2.3:a:caldera:openlinux_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:caldera:openlinux_server:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:caldera:openlinux_workstation:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:caldera:openlinux_workstation:3.1.1:*:*:*:*:*:*:*"
]
|
|
GHSA-v42h-j35f-r8x9 | CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time. | []
|
|
CVE-2022-4150 | Contest Gallery < 19.1.5 - Author+ SQL Injection | The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the option_id POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. | [
"cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:pro:wordpress:*:*"
]
|
GHSA-m593-g9cm-c9fm | Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server. | []
|
|
CVE-2020-8014 | kopano-python-services: Local privilege escalation from kopano to root in kopano-spamd subpackage | A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of kopano-spamd of openSUSE Leap 15.1, openSUSE Tumbleweed allowed local attackers with the privileges of the kopano user to escalate to root. This issue affects: openSUSE Leap 15.1 kopano-spamd versions prior to 10.0.5-lp151.4.1. openSUSE Tumbleweed kopano-spamd versions prior to 10.0.5-1.1. | [
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:tumbleweed_kopano-spamd:*:*:*:*:*:*:*:*"
]
|
CVE-2024-12969 | code-projects Hospital Management System Login index.php sql injection | A vulnerability, which was classified as critical, has been found in code-projects Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | []
|
CVE-2022-36910 | Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them. | [
"cpe:2.3:a:jenkins:lucene-search:*:*:*:*:*:jenkins:*:*"
]
|
|
GHSA-7m59-rj87-rmgp | A valid, authenticated LXCA user may be able to gain unauthorized access to events and other data stored in LXCA due to a SQL injection vulnerability in a specific web API. | []
|
|
GHSA-9vf3-vw7m-x4rr | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in 10Web Form Builder Team Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin <= 1.15.18 versions. | []
|
|
GHSA-vq4m-75qf-c48w | A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this issue is the function save_designation of the file /classes/Master.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271058 is the identifier assigned to this vulnerability. | []
|
|
GHSA-p89h-86gx-x9fw | An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6. Processing a maliciously crafted USD file may disclose memory contents. | []
|
|
CVE-2025-26163 | CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the CPF parameter. | []
|
|
CVE-2013-0427 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted. | [
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*"
]
|
|
GHSA-4rfh-v443-hvgh | A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests. | []
|
|
GHSA-95j5-rfpg-w4rp | The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document. | []
|
|
GHSA-grv5-w5vr-8h98 | Path Traversal in droppy | This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server. | []
|
GHSA-jcfm-9hmq-23cj | An elevation of privilege vulnerability in System Server in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Android ID: A-31350622. | []
|
|
GHSA-7f4v-m7h4-f2c2 | Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the widgetId parameter to service-monitoring/src/index.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget. | []
|
|
CVE-2009-4870 | Multiple SQL injection vulnerabilities in login.php in PHPCityPortal allow remote attackers to execute arbitrary SQL commands via the (1) req_username (aka Username) and (2) req_password (aka Password) parameters. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:phpcityportal:phpcityportal:*:*:*:*:*:*:*:*"
]
|
|
GHSA-48xj-hg7f-hx8w | A remote denial of service vulnerability in libavc in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33933140. | []
|
|
CVE-2022-0304 | Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
|
|
CVE-2020-12483 | AppStore Remote Download and Installation Vulnerability | The appstore before 8.12.0.0 exposes some of its components, and the attacker can cause remote download and install apps through carefully constructed parameters. | [
"cpe:2.3:a:vivo:appstore:*:*:*:*:*:*:*:*"
]
|
CVE-2017-6042 | A Cross-Site Request Forgery issue was discovered in Sierra Wireless AirLink Raven XE, all versions prior to 4.0.14, and AirLink Raven XT, all versions prior to 4.0.11. Affected devices do not verify if a request was intentionally sent by the logged-in user, which may allow an attacker to trick a client into making an unintentional request to the web server that will be treated as an authentic request. | [
"cpe:2.3:o:sierra_wireless:airlink_raven_xe_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierra_wireless:airlink_raven_xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sierra_wireless:airlink_raven_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sierra_wireless:airlink_raven_xt:-:*:*:*:*:*:*:*"
]
|
|
CVE-2011-5004 | Unrestricted file upload vulnerability in models/importcsv.php in the Fabrik (com_fabrik) component before 2.1.1 for Joomla! allows remote authenticated users with Manager privileges to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. | [
"cpe:2.3:a:fabrikar:com_fabrikar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fabrikar:com_fabrikar:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fabrikar:com_fabrikar:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fabrikar:com_fabrikar:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fabrikar:com_fabrikar:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fabrikar:com_fabrikar:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
|
|
GHSA-86w3-pw2m-73fq | IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 228587. | []
|
|
GHSA-cgpv-8243-q33x | Incorrect access control in the administrative functionalities of BES--6024PB-I50H1 VideoPlayTool v2.0.1.0 allow attackers to execute arbitrary administrative commands via a crafted payload sent to the desired endpoints. | []
|
|
CVE-2019-16249 | OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp. | [
"cpe:2.3:a:opencv:opencv:4.1.1:*:*:*:*:*:*:*"
]
|
|
CVE-2020-10760 | A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
|
|
CVE-2018-7219 | application/admin/controller/Admin.php in NoneCms 1.3.0 has CSRF, as demonstrated by changing an admin password or adding an account via a public/index.php/admin/admin/edit.html request. | [
"cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*"
]
|
|
GHSA-4qp3-jrq9-p7cj | Use of potentially dangerous function issue exists in Ricoh Streamline NX PC Client. If this vulnerability is exploited, files in the PC where the product is installed may be altered. | []
|
|
CVE-2024-1284 | Use after free in Mojo in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
]
|
|
CVE-2019-14200 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply. | [
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*"
]
|
|
CVE-2018-6444 | A Vulnerability in Brocade Network Advisor versions before 14.1.0 could allow a remote unauthenticated attacker to execute arbitray code. The vulnerability could also be exploited to execute arbitrary OS Commands. | [
"cpe:2.3:a:brocade:network_advisor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:brocade_network_advisor:-:*:*:*:*:*:*:*"
]
|
|
CVE-2024-3917 | Pet Manager <= 1.4 - Reflected XSS | The Pet Manager WordPress plugin through 1.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [
"cpe:2.3:a:diana_k_cury:pet_manager:*:*:*:*:*:*:*:*"
]
|
GHSA-gvwx-pmvm-v23g | Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory. | []
|
|
CVE-2022-33660 | Azure Site Recovery Elevation of Privilege Vulnerability | Azure Site Recovery Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*"
]
|
GHSA-g39c-mccf-rxjv | Moodle Insecure direct object reference (IDOR) in a calendar web service | A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. Insufficient capability checks made it possible to fetch other users' calendar action events. | []
|
CVE-2022-33747 | Arm: unbounded memory consumption for 2nd-level page tables Certain actions require e.g. removing pages from a guest's P2M (Physical-to-Machine) mapping. When large pages are in use to map guest pages in the 2nd-stage page tables, such a removal operation may incur a memory allocation (to replace a large mapping with individual smaller ones). These memory allocations are taken from the global memory pool. A malicious guest might be able to cause the global memory pool to be exhausted by manipulating its own P2M mappings. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:arm:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
|
|
GHSA-628h-r6p2-r4vv | A vulnerability was found in SourceCodester Food Ordering Management System up to 1.0. It has been classified as critical. This affects an unknown part of the file login.php of the component Login Panel. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269277 was assigned to this vulnerability. | []
|
|
CVE-2010-2555 | The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the length of strings in the registry, which allows local users to gain privileges or cause a denial of service (memory corruption) via vectors involving a long string, aka "Tracing Memory Corruption Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
]
|
|
CVE-2014-125089 | cention-chatserver InternalChatProtocol.fe _formatBody cross site scripting | A vulnerability was found in cention-chatserver 3.8.0-rc1. It has been declared as problematic. Affected by this vulnerability is the function _formatBody of the file lib/InternalChatProtocol.fe. The manipulation of the argument body leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.9 is able to address this issue. The identifier of the patch is c4c0258bbd18f6915f97f91d5fee625384096a26. It is recommended to upgrade the affected component. The identifier VDB-221497 was assigned to this vulnerability. | [
"cpe:2.3:a:cention-chatserver_project:cention-chatserver:3.8.0:rc1:*:*:*:*:*:*"
]
|
GHSA-j956-ppv6-qqfq | Adobe Acrobat 5 does not properly validate JavaScript in PDF files, which allows remote attackers to write arbitrary files into the Plug-ins folder that spread to other PDF documents, as demonstrated by the W32.Yourde virus. | []
|
|
GHSA-hmq4-c2r4-5q8h | Artifact Hub arbitrary file read vulnerability | ImpactDuring a security audit of Artifact Hub's code base, a security researcher at [OffSec](https://www.offsec.com/) identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, it was possible to read internal files.Artifact Hub indexes content from a variety of sources, including git repositories. When processing git based repositories, Artifact Hub clones the repository and, depending on the artifact kind, reads some files from it. During this process, in some cases, no validation was done to check if the file was a symbolic link. This made possible to read arbitrary files in the system, potentially leaking sensitive information.PatchesThis issue has been resolved in version [1.16.0](https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0). | []
|
GHSA-qf8c-jp5x-ph4f | Cross-site scripting (XSS) vulnerability in the frontend interface in LicensePal ArcticDesk before 1.2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
|
|
GHSA-qwch-fhfg-fr39 | BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty. | []
|
|
CVE-2024-56607 | wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask() | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()
When I try to manually set bitrates:
iw wlan0 set bitrates legacy-2.4 1
I get sleeping from invalid context error, see below. Fix that by switching to
use recently introduced ieee80211_iterate_stations_mtx().
Do note that WCN6855 firmware is still crashing, I'm not sure if that firmware
even supports bitrate WMI commands and should we consider disabling
ath12k_mac_op_set_bitrate_mask() for WCN6855? But that's for another patch.
BUG: sleeping function called from invalid context at drivers/net/wireless/ath/ath12k/wmi.c:420
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2236, name: iw
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
3 locks held by iw/2236:
#0: ffffffffabc6f1d8 (cb_lock){++++}-{3:3}, at: genl_rcv+0x14/0x40
#1: ffff888138410810 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: nl80211_pre_doit+0x54d/0x800 [cfg80211]
#2: ffffffffab2cfaa0 (rcu_read_lock){....}-{1:2}, at: ieee80211_iterate_stations_atomic+0x2f/0x200 [mac80211]
CPU: 3 UID: 0 PID: 2236 Comm: iw Not tainted 6.11.0-rc7-wt-ath+ #1772
Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
Call Trace:
<TASK>
dump_stack_lvl+0xa4/0xe0
dump_stack+0x10/0x20
__might_resched+0x363/0x5a0
? __alloc_skb+0x165/0x340
__might_sleep+0xad/0x160
ath12k_wmi_cmd_send+0xb1/0x3d0 [ath12k]
? ath12k_wmi_init_wcn7850+0xa40/0xa40 [ath12k]
? __netdev_alloc_skb+0x45/0x7b0
? __asan_memset+0x39/0x40
? ath12k_wmi_alloc_skb+0xf0/0x150 [ath12k]
? reacquire_held_locks+0x4d0/0x4d0
ath12k_wmi_set_peer_param+0x340/0x5b0 [ath12k]
ath12k_mac_disable_peer_fixed_rate+0xa3/0x110 [ath12k]
? ath12k_mac_vdev_stop+0x4f0/0x4f0 [ath12k]
ieee80211_iterate_stations_atomic+0xd4/0x200 [mac80211]
ath12k_mac_op_set_bitrate_mask+0x5d2/0x1080 [ath12k]
? ath12k_mac_vif_chan+0x320/0x320 [ath12k]
drv_set_bitrate_mask+0x267/0x470 [mac80211]
ieee80211_set_bitrate_mask+0x4cc/0x8a0 [mac80211]
? __this_cpu_preempt_check+0x13/0x20
nl80211_set_tx_bitrate_mask+0x2bc/0x530 [cfg80211]
? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]
? trace_contention_end+0xef/0x140
? rtnl_unlock+0x9/0x10
? nl80211_pre_doit+0x557/0x800 [cfg80211]
genl_family_rcv_msg_doit+0x1f0/0x2e0
? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250
? ns_capable+0x57/0xd0
genl_family_rcv_msg+0x34c/0x600
? genl_family_rcv_msg_dumpit+0x310/0x310
? __lock_acquire+0xc62/0x1de0
? he_set_mcs_mask.isra.0+0x8d0/0x8d0 [cfg80211]
? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]
? cfg80211_external_auth_request+0x690/0x690 [cfg80211]
genl_rcv_msg+0xa0/0x130
netlink_rcv_skb+0x14c/0x400
? genl_family_rcv_msg+0x600/0x600
? netlink_ack+0xd70/0xd70
? rwsem_optimistic_spin+0x4f0/0x4f0
? genl_rcv+0x14/0x40
? down_read_killable+0x580/0x580
? netlink_deliver_tap+0x13e/0x350
? __this_cpu_preempt_check+0x13/0x20
genl_rcv+0x23/0x40
netlink_unicast+0x45e/0x790
? netlink_attachskb+0x7f0/0x7f0
netlink_sendmsg+0x7eb/0xdb0
? netlink_unicast+0x790/0x790
? __this_cpu_preempt_check+0x13/0x20
? selinux_socket_sendmsg+0x31/0x40
? netlink_unicast+0x790/0x790
__sock_sendmsg+0xc9/0x160
____sys_sendmsg+0x620/0x990
? kernel_sendmsg+0x30/0x30
? __copy_msghdr+0x410/0x410
? __kasan_check_read+0x11/0x20
? mark_lock+0xe6/0x1470
___sys_sendmsg+0xe9/0x170
? copy_msghdr_from_user+0x120/0x120
? __lock_acquire+0xc62/0x1de0
? do_fault_around+0x2c6/0x4e0
? do_user_addr_fault+0x8c1/0xde0
? reacquire_held_locks+0x220/0x4d0
? do_user_addr_fault+0x8c1/0xde0
? __kasan_check_read+0x11/0x20
? __fdget+0x4e/0x1d0
? sockfd_lookup_light+0x1a/0x170
__sys_sendmsg+0xd2/0x180
? __sys_sendmsg_sock+0x20/0x20
? reacquire_held_locks+0x4d0/0x4d0
? debug_smp_processor_id+0x17/0x20
__x64_sys_sendmsg+0x72/0xb0
? lockdep_hardirqs_on+0x7d/0x100
x64_sys_call+0x894/0x9f0
do_syscall_64+0x64/0x130
entry_SYSCALL_64_after_
---truncated--- | []
|
GHSA-rcwh-vc7h-rwx8 | The Thai food (aka com.foods.thaifood) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
GHSA-6xrh-w9h2-9wj3 | KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote attackers to read communications via a man-in-the-middle attack. | []
|
|
CVE-2005-4864 | Stack-based buffer overflow in libdb2.so in IBM DB2 7.x and 8.1 allows local users to execute arbitrary code via a long DB2LPORT environment variable. | [
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:solaris:*:*:*:*:*"
]
|
|
GHSA-7xc5-xh63-676w | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | []
|
|
GHSA-3qxw-7f8c-wvj7 | The com.android.phone process in Android 1.5 CRBxx allows remote attackers to cause a denial of service (application restart and network disconnection) via an SMS message containing a malformed WAP Push message that triggers an ArrayIndexOutOfBoundsException exception, possibly a related issue to CVE-2009-2656. | []
|
|
CVE-2023-26300 | A potential security vulnerability has been identified in the system BIOS for certain HP PC products which might allow escalation of privilege. HP is releasing firmware updates to mitigate the potential vulnerability. | [
"cpe:2.3:o:hp:desktop_pro_a_300_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_a_300_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_a_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_a_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_a_g3_microtower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_a_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_g1_r_microtower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_g1_r_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t638_thin_client_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t638_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:stream_11_pro_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:stream_11_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:245_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:245_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:245_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:245_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:245_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:245_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:245_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:245_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:245_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:247_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:247_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:258_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:258_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:258_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:258_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:340_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:348_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:348_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:470_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:470_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:470_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:470_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:470_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:470_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:stream_11_pro_g4_firmware:*:*:*:*:education:*:*:*",
"cpe:2.3:h:hp:stream_11_pro_g4:-:*:*:*:education:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_mobile_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5_mobile_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_99_g3_mobile_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_99_g3_mobile_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_99_g4_mobile_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_99_g4_mobile_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g8_24_all-in-one_pc_\\(rom_family_ssid_8923\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g8_24_all-in-one_pc_\\(rom_family_ssid_8923\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g8_24_all-in-one_pc_\\(rom_family_ssid_8924\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g8_24_all-in-one_pc_\\(rom_family_ssid_8924\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g8_24_all-in-one_pc_\\(rom_family_ssid_8923\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g8_24_all-in-one_pc_\\(rom_family_ssid_8923\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g8_24_all-in-one_pc_\\(rom_family_ssid_8924\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g8_24_all-in-one_pc_\\(rom_family_ssid_8924\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:285_g6_microtower_\\(rom_family_ssid_871e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:285_g6_microtower_\\(rom_family_ssid_871e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:285_g8_microtower_\\(rom_family_ssid_870e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:285_g8_microtower_\\(rom_family_ssid_870e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:285_pro_g6_microtower_\\(rom_family_ssid_871e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:285_pro_g6_microtower_\\(rom_family_ssid_871e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:285_pro_g8_microtower_\\(rom_family_ssid_870e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:285_pro_g8_microtower_\\(rom_family_ssid_870e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:295_g8_microtower_\\(rom_family_ssid_870e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:295_g8_microtower_\\(rom_family_ssid_870e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_280_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_280_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_280_g9_desktop_\\(rom_family_ssid_8bc3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_280_g9_desktop_\\(rom_family_ssid_8bc3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_290_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_290_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_290_g9_desktop_\\(rom_family_ssid_8bc3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_290_g9_desktop_\\(rom_family_ssid_8bc3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_zhan_66_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_zhan_66_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_zhan_66_g9_desktop_\\(rom_family_ssid_8bc3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_zhan_66_g9_desktop_\\(rom_family_ssid_8bc3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_89b3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_89b3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_8bc3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_200_g9_desktop_\\(rom_family_ssid_8bc3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_280_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_280_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_280_g9_desktop_\\(rom_family_ssid_89b3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_280_g9_desktop_\\(rom_family_ssid_89b3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_89b3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_89b3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_8bc3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_290_g9_desktop_\\(rom_family_ssid_8bc3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_89b4\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_89b4\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_89b3\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_89b3\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_8b3c\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_zhan_99_g9_desktop_\\(rom_family_ssid_8b3c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_240_g10_\\(rom_family_ssid_8b4d\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_240_g10_\\(rom_family_ssid_8b4d\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_240_g10_\\(rom_family_ssid_8b4c\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_240_g10_\\(rom_family_ssid_8b4c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_240_g9_\\(rom_family_ssid_89eb\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_240_g9_\\(rom_family_ssid_89eb\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:vr_backpack_g2_\\(rom_family_ssid_8590\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:vr_backpack_g2_\\(rom_family_ssid_8590\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_g10_\\(rom_family_ssid_8b4e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_g10_\\(rom_family_ssid_8b4e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_g4_all-in-one_pc_\\(rom_family_ssid_8923\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_g4_all-in-one_pc_\\(rom_family_ssid_8923\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_g4_all-in-one_pc_\\(rom_family_ssid_8924\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_g4_all-in-one_pc_\\(rom_family_ssid_8924\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_99_pro_a_g2_microtower_\\(rom_family_ssid_871e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_99_pro_a_g2_microtower_\\(rom_family_ssid_871e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g8_\\(rom_family_ssid_87d1\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g8_\\(rom_family_ssid_87d1\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g8_\\(rom_family_ssid_8905\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g8_\\(rom_family_ssid_8905\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:255_g8_\\(rom_family_ssid_890e\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:255_g8_\\(rom_family_ssid_890e\\):-:*:*:*:*:*:*:*"
]
|
|
CVE-2015-2346 | XML external entity (XXE) vulnerability in Huawei SEQ Analyst before V200R002C03LG0001CP0022 allows remote authenticated users to read arbitrary files via the req parameter. | [
"cpe:2.3:a:huawei:seq_analyst:*:*:*:*:*:*:*:*"
]
|
|
CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
]
|
|
CVE-2019-6819 | A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists which could cause a possible Denial of Service when specific Modbus frames are sent to the controller in the products: Modicon M340 - firmware versions prior to V3.01, Modicon M580 - firmware versions prior to V2.80, All firmware versions of Modicon Quantum and Modicon Premium. | [
"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp341000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp341000h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420102:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420102cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh582040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh582040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh584040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh584040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh586040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmeh586040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep581020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep581020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584040s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep585040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep585040c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep586040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep586040c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*"
]
|
|
GHSA-wwcf-wg7h-mgxf | There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. | []
|
|
CVE-2024-31064 | Cross Site Scripting vulnerability in Insurance Mangement System v.1.0.0 and before allows a remote attacker to execute arbitrary code via the First Name input field. | []
|
|
CVE-2016-1517 | OpenCV 3.0.0 allows remote attackers to cause a denial of service (segfault) via vectors involving corrupt chunks. | [
"cpe:2.3:a:opencv:opencv:3.0.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-21810 | Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:ethernet_complete_driver_pack:*:*:*:*:*:*:*:*"
]
|
|
CVE-2008-1953 | Cross-site scripting (XSS) vulnerability in the Sitedesigner before 1.1.5 search template in Magnolia Enterprise Edition allows remote attackers to inject arbitrary web script or HTML via the query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:magnolia:site_designer:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-33304 | A use of hard-coded credentials vulnerability in Fortinet FortiClient Windows 7.0.0 - 7.0.9 and 7.2.0 - 7.2.1 allows an attacker to bypass system protections via the use of static credentials. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:forticlient:7.2.1:*:*:*:*:windows:*:*"
]
|
|
CVE-2006-4224 | Cross-site scripting (XSS) vulnerability in calendar.php in Virtual War (VWar) 1.5.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the year parameter. NOTE: The page parameter vector is covered by CVE-2006-4009. | [
"cpe:2.3:a:vwar:virtual_war:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vwar:virtual_war:1.4:*:*:*:*:*:*:*"
]
|
|
CVE-2023-52925 | netfilter: nf_tables: don't fail inserts if duplicate has expired | In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: don't fail inserts if duplicate has expired
nftables selftests fail:
run-tests.sh testcases/sets/0044interval_overlap_0
Expected: 0-2 . 0-3, got:
W: [FAILED] ./testcases/sets/0044interval_overlap_0: got 1
Insertion must ignore duplicate but expired entries.
Moreover, there is a strange asymmetry in nft_pipapo_activate:
It refetches the current element, whereas the other ->activate callbacks
(bitmap, hash, rhash, rbtree) use elem->priv.
Same for .remove: other set implementations take elem->priv,
nft_pipapo_remove fetches elem->priv, then does a relookup,
remove this.
I suspect this was the reason for the change that prompted the
removal of the expired check in pipapo_get() in the first place,
but skipping exired elements there makes no sense to me, this helper
is used for normal get requests, insertions (duplicate check)
and deactivate callback.
In first two cases expired elements must be skipped.
For ->deactivate(), this gets called for DELSETELEM, so it
seems to me that expired elements should be skipped as well, i.e.
delete request should fail with -ENOENT error. | []
|
GHSA-vghj-22mx-4xm6 | Buffer overflow in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted AAC file that is not properly handled during stream-data unpacking. | []
|
|
CVE-2019-9084 | In Hoteldruid before 2.3.1, a division by zero was discovered in $num_tabelle in tab_tariffe.php (aka the numtariffa1 parameter) due to the mishandling of non-numeric values, as demonstrated by the /tab_tariffe.php?anno=[YEAR]&numtariffa1=1a URI. It could allow an administrator to conduct remote denial of service (disrupting certain business functions of the product). | [
"cpe:2.3:a:digitaldruid:hoteldruid:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-7511 | Trimble SketchUp Pro SKP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Trimble SketchUp Pro SKP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trimble SketchUp Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PSD files embedded in SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-23000. | [
"cpe:2.3:a:trimble:sketchup:23.1.340:*:*:*:pro:*:*:*"
]
|
CVE-2003-0946 | Format string vulnerability in clamav-milter for Clam AntiVirus 0.60 through 0.60p, and other versions before 0.65, allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the email address argument of a "MAIL FROM" command. | [
"cpe:2.3:a:clam_anti-virus:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamav:0.60p:*:*:*:*:*:*:*"
]
|
|
CVE-2022-38672 | In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
]
|
|
GHSA-hj32-9mcw-5cwh | Missing permission check in Jenkins Project Inheritance Plugin | Jenkins limits access to job configuration XML data (`config.xml`) to users with Job/ExtendedRead permission, typically implied by Job/Configure permission. Project Inheritance Plugin has several job inspection features, including the API URL `/job/…/getConfigAsXML` for its Inheritance Project job type that does something similar.Project Inheritance Plugin 21.04.03 and earlier does not check permissions for this new endpoint, granting access to job configuration XML data to every user with Job/Read permission.Additionally, the encrypted values of secrets stored in the job configuration are not redacted, as they would be by the `config.xml` API for users without Job/Configure permission. | []
|
GHSA-wpmg-rx8c-q5g8 | Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c. | []
|
|
CVE-2013-7184 | Gretech GOM Media Player 2.2.56.5158 and earlier allows remote attackers to cause a denial of service (memory corruption) via a crafted AVI file. | [
"cpe:2.3:a:gomlab:gom_player:*:*:*:*:*:*:*:*"
]
|
|
GHSA-hc32-26fg-wr69 | Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. | []
|
|
GHSA-cg5h-q983-4rww | Apache Storm remote code execution vulnerability | The UI daemon in Apache Storm 0.10.0-beta allows remote users to run arbitrary code as the user running the web server. With kerberos authentication this could allow impersonation of arbitrary users on other systems, including HDFS and HBase. | []
|
GHSA-5rvg-rpvg-3vmc | CiscoSecure ACS Server 2.4(2) and earlier allows remote attackers to bypass LDAP authentication on the server if the LDAP server allows null passwords. | []
|
|
CVE-2023-45009 | WordPress Captcha for Contact Form 7 plugin <= 1.11.3 - Capcha Bypass vulnerability | Improper Restriction of Excessive Authentication Attempts vulnerability in Forge12 Interactive GmbH Captcha/Honeypot for Contact Form 7 allows Functionality Bypass.This issue affects Captcha/Honeypot for Contact Form 7: from n/a through 1.11.3. | []
|
GHSA-rp4v-qgmw-9r9w | Cross-site scripting (XSS) vulnerability in assets/js/vm2admin.js in the VirtueMart component before 3.0.8 for Joomla! allows remote attackers to inject arbitrary web script or HTML via vectors involving a "double encode combination of first_name, last_name and company." | []
|
|
CVE-2019-5815 | Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data. | [
"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
|
|
GHSA-2986-9f3x-j93c | Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page. | []
|
|
GHSA-pm59-739h-g5cv | Azure Network Watcher VM Agent Elevation of Privilege Vulnerability | []
|
|
CVE-2015-3326 | Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack. | [
"cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*",
"cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*"
]
|
|
GHSA-jrrj-28wq-8v79 | Cross-Site Request Forgery (CSRF) vulnerability in Clearbit Clearbit Reveal allows Cross Site Request Forgery. This issue affects Clearbit Reveal: from n/a through 1.0.6. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.