id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-8h98-vm58-gmvr | Directory traversal vulnerability in Buffalo WNC01WH devices with firmware version 1.0.0.8 and earlier allows authenticated attackers to read arbitrary files via specially crafted commands. | [] |
|
GHSA-h6c2-xxv4-2462 | In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770. | [] |
|
CVE-2019-7102 | Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-27957 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-6p6f-fgwm-2pr9 | The WP Video Lightbox WordPress plugin before 1.9.3 does not escape the attributes of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks | [] |
|
CVE-2011-0981 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-wrc6-jvcr-2g5p | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master PDF Catalog Woocommerce allows DOM-Based XSS.This issue affects PDF Catalog Woocommerce: from n/a through 2.0. | [] |
|
CVE-2012-3123 | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality, related to Apache HTTP Server. | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] |
|
CVE-2024-10955 | ReDoS (Regular Expression Denial of Service) in gaizhenbiao/chuanhuchatgpt | A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server. | [] |
GHSA-28xh-wpgr-7fm8 | Command Injection in open | Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.The package does come with the following warning in the readme:Recommendation`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability. | [] |
GHSA-g5xx-f9cv-w25h | In A-GPS, there is a possible man in the middle attack due to improper certificate validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06461919; Issue ID: ALPS06461919. | [] |
|
CVE-2024-45735 | Improper Access Control for low-privileged user in Splunk Secure Gateway App | In Splunk Enterprise versions below 9.2.3 and 9.1.6, and Splunk Secure Gateway versions on Splunk Cloud Platform versions below 3.4.259, 3.6.17, and 3.7.0, a low-privileged user that does not hold the "admin" or "power" Splunk roles can see App Key Value Store (KV Store) deployment configuration and public/private keys in the Splunk Secure Gateway App. | [
"cpe:2.3:a:splunk:splunk_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk_secure_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
] |
CVE-2018-6178 | Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7458-pjfc-8v3c | IBM Maximo Asset Management 7.6.0.10 and 7.6.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 175121. | [] |
|
CVE-2010-2613 | Cross-site scripting (XSS) vulnerability in the JExtensions JE Awd Song (com_awd_song) component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the song review field, which is not properly handled in a view action to index.php. | [
"cpe:2.3:a:harmistechnology:com_awd_song:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
GHSA-82vp-jwg3-9975 | In keyinstall, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07588343. | [] |
|
CVE-2023-6163 | WP Crowdfunding < 2.1.10 - Admin+ Stored XSS | The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*"
] |
CVE-2009-3897 | Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself. | [
"cpe:2.3:a:dovecot:dovecot:*:*:*:*:*:*:*:*"
] |
|
GHSA-77vq-4j66-46m5 | Missing permission check in Jenkins ThreadFix Plugin | A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [] |
CVE-2024-3987 | WP Mobile Menu – The Mobile-Friendly Responsive Menu <= 2.8.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Image Alt | The WP Mobile Menu – The Mobile-Friendly Responsive Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.8.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:freshlightlab:wp_mobile_menu:*:*:*:*:*:wordpress:*:*"
] |
CVE-2012-0068 | The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell capture file containing a record that is too small. | [
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"
] |
|
GHSA-8c73-9gh8-7c8v | Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins. | [] |
|
CVE-2022-38062 | WordPress Download Theme Plugin <= 1.0.9 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Metagauss Download Theme plugin <= 1.0.9 versions. | [
"cpe:2.3:a:metagauss:download_theme:*:*:*:*:*:wordpress:*:*"
] |
GHSA-cghx-9gcr-r42x | Path Traversal in the Java Kubernetes Client | Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. | [] |
CVE-2024-2142 | The Ultimate Addons for Beaver Builder – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Info Table widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-4q2p-8m3f-h868 | , aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-17122, CVE-2020-17125, CVE-2020-17127, CVE-2020-17128, CVE-2020-17129. | [] |
|
CVE-2016-1585 | AppArmor mount rules grant excessive permissions | In all versions of AppArmor mount rules are accidentally widened when compiled. | [
"cpe:2.3:a:canonical:apparmor:*:*:*:*:*:*:*:*"
] |
GHSA-g26m-8jhm-49c4 | The Conditional Fields for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.13. This is due to missing or incorrect nonce validation on the wpcf7cf_admin_init function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-h8x6-6x9h-gmgp | Insecure method vulnerability in the Web Scan Object ActiveX control (OL2005.dll) in Rising Antivirus Online Scanner allows remote attackers to force the download and execution of arbitrary code by setting the BaseURL property and invoking the UpdateEngine method. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2020-23793 | An issue was discovered in spice-server spice-server-0.14.0-6.el7_6.1.x86_64 of Redhat's VDI product. There is a security vulnerablility that can restart KVMvirtual machine without any authorization. It is not yet known if there will be other other effects. | [
"cpe:2.3:a:spice-space:spice-server:0.14.0-6el7_6.1:*:*:*:*:*:*:*"
] |
|
CVE-2025-0406 | liujianview gymxmjpa SubjectController.java SubjectDaoImpl sql injection | A vulnerability was found in liujianview gymxmjpa 1.0. It has been classified as critical. Affected is the function SubjectDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/SubjectController.java. The manipulation of the argument subname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-qpc6-5f38-pmpq | A buffer overflow vulnerability exists in the uhttpd login functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to remote code execution. An attacker can send a network request to trigger this vulnerability. | [] |
|
CVE-2021-47089 | kfence: fix memory leak when cat kfence objects | In the Linux kernel, the following vulnerability has been resolved:
kfence: fix memory leak when cat kfence objects
Hulk robot reported a kmemleak problem:
unreferenced object 0xffff93d1d8cc02e8 (size 248):
comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
hex dump (first 32 bytes):
00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00 .@..............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
seq_open+0x2a/0x80
full_proxy_open+0x167/0x1e0
do_dentry_open+0x1e1/0x3a0
path_openat+0x961/0xa20
do_filp_open+0xae/0x120
do_sys_openat2+0x216/0x2f0
do_sys_open+0x57/0x80
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xa9
unreferenced object 0xffff93d419854000 (size 4096):
comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
hex dump (first 32 bytes):
6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30 kfence-#250: 0x0
30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d 0000000754bda12-
backtrace:
seq_read_iter+0x313/0x440
seq_read+0x14b/0x1a0
full_proxy_read+0x56/0x80
vfs_read+0xa5/0x1b0
ksys_read+0xa0/0xf0
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xa9
I find that we can easily reproduce this problem with the following
commands:
cat /sys/kernel/debug/kfence/objects
echo scan > /sys/kernel/debug/kmemleak
cat /sys/kernel/debug/kmemleak
The leaked memory is allocated in the stack below:
do_syscall_64
do_sys_open
do_dentry_open
full_proxy_open
seq_open ---> alloc seq_file
vfs_read
full_proxy_read
seq_read
seq_read_iter
traverse ---> alloc seq_buf
And it should have been released in the following process:
do_syscall_64
syscall_exit_to_user_mode
exit_to_user_mode_prepare
task_work_run
____fput
__fput
full_proxy_release ---> free here
However, the release function corresponding to file_operations is not
implemented in kfence. As a result, a memory leak occurs. Therefore,
the solution to this problem is to implement the corresponding release
function. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
CVE-2022-49842 | ASoC: core: Fix use-after-free in snd_soc_exit() | In the Linux kernel, the following vulnerability has been resolved:
ASoC: core: Fix use-after-free in snd_soc_exit()
KASAN reports a use-after-free:
BUG: KASAN: use-after-free in device_del+0xb5b/0xc60
Read of size 8 at addr ffff888008655050 by task rmmod/387
CPU: 2 PID: 387 Comm: rmmod
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
<TASK>
dump_stack_lvl+0x79/0x9a
print_report+0x17f/0x47b
kasan_report+0xbb/0xf0
device_del+0xb5b/0xc60
platform_device_del.part.0+0x24/0x200
platform_device_unregister+0x2e/0x40
snd_soc_exit+0xa/0x22 [snd_soc_core]
__do_sys_delete_module.constprop.0+0x34f/0x5b0
do_syscall_64+0x3a/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
...
</TASK>
It's bacause in snd_soc_init(), snd_soc_util_init() is possble to fail,
but its ret is ignored, which makes soc_dummy_dev unregistered twice.
snd_soc_init()
snd_soc_util_init()
platform_device_register_simple(soc_dummy_dev)
platform_driver_register() # fail
platform_device_unregister(soc_dummy_dev)
platform_driver_register() # success
...
snd_soc_exit()
snd_soc_util_exit()
# soc_dummy_dev will be unregistered for second time
To fix it, handle error and stop snd_soc_init() when util_init() fail.
Also clean debugfs when util_init() or driver_register() fail. | [] |
CVE-2025-4660 | Remote Code Execution in Windows Secure Connector/ HPS Inspection Engine via Insecure Named Pipe Access | A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.
This does not impact Linux or OSX Secure Connector. | [] |
CVE-2023-3390 | Use-after-free in Linux kernel's netfilter subsystem | A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*"
] |
GHSA-vpjf-pg9h-vm9f | IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 could allow a user to bypass authentication under certain configurations due to a partial string comparison vulnerability. IBM X-Force ID: 297169. | [] |
|
CVE-2008-0040 | Unspecified vulnerability in NFS in Apple Mac OS X 10.5 through 10.5.1 allows remote attackers to cause a denial of service (system shutdown) or execute arbitrary code via unknown vectors related to mbuf chains that trigger memory corruption. | [
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-h574-6646-vfxx | Apache Airflow: Ignored Airflow Permission | Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access resources such as variables, connections, etc from the UI which they do not have permission to access.Users of Apache Airflow are recommended to upgrade to version 2.8.3 or newer to mitigate the risk associated with this vulnerability | [] |
GHSA-xrrw-7rr2-829v | A logic issue was addressed with improved validation. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. | [] |
|
GHSA-gv6r-7r72-684h | IBM Campaign 9.1.0, 9.1.2, 10.0, and 10.1 could allow an authenticated user with access to the local network to bypass security due to lack of input validation. IBM X-Force ID: 120206. | [] |
|
GHSA-29jr-vwj5-q6gc | Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally. | [] |
|
GHSA-3937-3989-hjv5 | Zoho ManageEngine ADManager Plus version 7110 and prior has a Post-Auth OS command injection vulnerability. | [] |
|
CVE-2013-5331 | Adobe Flash Player before 11.7.700.257 and 11.8.x and 11.9.x before 11.9.900.170 on Windows and Mac OS X and before 11.2.202.332 on Linux, Adobe AIR before 3.9.0.1380, Adobe AIR SDK before 3.9.0.1380, and Adobe AIR SDK & Compiler before 3.9.0.1380 allow remote attackers to execute arbitrary code via crafted .swf content that leverages an unspecified "type confusion," as exploited in the wild in December 2013. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-7193 | MTab Bookmark Installation install.php access control | A vulnerability was found in MTab Bookmark up to 1.2.6 and classified as critical. This issue affects some unknown processing of the file public/install.php of the component Installation. The manipulation leads to improper access controls. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249395. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:mtab:bookmark:*:*:*:*:*:*:*:*"
] |
CVE-2014-3423 | lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file. | [
"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:24.2:*:*:*:*:*:*:*"
] |
|
GHSA-w796-x29v-gcg9 | Inter7 SqWebMail 3.4.1 through 3.6.1 generates different error messages for incorrect passwords versus correct passwords on non-mail-enabled accounts (such as root), which allows remote attackers to guess the root password via brute force attacks. | [] |
|
GHSA-jr3g-w92f-g6x4 | GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c | [] |
|
GHSA-vr2x-32cg-pm8g | FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3. | [] |
|
CVE-2023-52724 | Open Networking Foundation SD-RAN onos-kpimon 0.4.7 allows out-of-bounds array access in the processIndicationFormat1 function. | [] |
|
CVE-2022-45963 | h3c firewall <= 3.10 ESS6703 has a privilege bypass vulnerability. | [
"cpe:2.3:o:h3c:secpath_f5030_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5030-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5030-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5060-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5060-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5080-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5080-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f500-6gw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f500-6gw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f5040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f5040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:h3c:secpath_f100-c-g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:secpath_f100-c-g3:-:*:*:*:*:*:*:*"
] |
|
GHSA-grq7-vwg7-hvp3 | Use-after-free vulnerability in the Cascading Style Sheets (CSS) DOM implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document. | [] |
|
CVE-2019-5925 | Cross-site scripting vulnerability in Dradis Community Edition Dradis Community Edition v3.11 and earlier and Dradis Professional Edition v3.1.1 and earlier allow remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:dradisframework:dradis:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:dradisframework:dradis:*:*:*:*:community:*:*:*"
] |
|
CVE-2021-3714 | A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*"
] |
|
GHSA-pprq-4488-wgqx | Insecure transport protocol in Gradle | Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site. | [] |
CVE-2023-43644 | Improper authentication in the SOCKS5 inbound in sing-box | Sing-box is an open source proxy system. Affected versions are subject to an authentication bypass when specially crafted requests are sent to sing-box. This affects all SOCKS5 inbounds with user authentication and an attacker may be able to bypass authentication. Users are advised to update to sing-box 1.4.4 or to 1.5.0-rc.4. Users unable to update should not expose the SOCKS5 inbound to insecure environments. | [
"cpe:2.3:a:sagernet:sing-box:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:sagernet:sing-box:1.5.0:rc3:*:*:*:*:*:*"
] |
GHSA-5g25-2vp3-jgg2 | The TM Software Tempo plugin before 6.4.3.1, 6.5.x before 6.5.0.2, and 7.x before 7.0.3 for Atlassian JIRA does not properly restrict the capabilities of third-party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors. | [] |
|
GHSA-w4mr-vhgh-2fq7 | A security feature bypass vulnerability exists when a Windows Projected Filesystem improperly handles file redirections, aka 'Projected Filesystem Security Feature Bypass Vulnerability'. | [] |
|
GHSA-66xw-cm7f-gxw3 | Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite,
versions before 4.6, contain an Observable Timing Discrepancy Vulnerability. | [] |
|
GHSA-jqw8-h668-76c9 | The Traffic Jam Free (aka com.jiuzhangtech.rushhour) application 1.7.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2025-48961 | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39938. | [] |
|
GHSA-xf5w-5cjx-254f | cookiedecode function in PHP-Nuke 4.4 allows users to bypass authentication and gain access to other user accounts by extracting the authentication information from a cookie. | [] |
|
GHSA-rpf8-h3x8-r929 | Missing encryption in the NFC tags of the Flient Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original tags, which results in an attacker gaining access to the perimeter. | [] |
|
CVE-2014-8025 | The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801. | [
"cpe:2.3:a:cisco:jabber_guest:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-0548 | Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x through 8.x, Symantec Brightmail and Messaging Gateway before 9.5.1, and Symantec Data Loss Prevention (DLP) before 10.5.3 and 11.x before 11.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .prz file. NOTE: this may overlap CVE-2011-1217. | [
"cpe:2.3:a:symantec:mail_security:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:brightmail_and_messaging_gateway:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:data_loss_prevention:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-qrqr-3x5j-2xw9 | Docker Authentication Bypass | An issue was discovered in Docker Moby before 17.06.0. The Docker engine validated a client TLS certificate using both the configured client CA root certificate and all system roots on non-Windows systems. This allowed a client with any domain validated certificate signed by a system-trusted root CA (as opposed to one signed by the configured CA root certificate) to authenticate. | [] |
CVE-2020-21487 | Cross Site Scripting vulnerability found in Netgate pfSense 2.4.4 and ACME package v.0.6.3 allows attackers to execute arbitrary code via the RootFolder field of acme_certificates.php. | [
"cpe:2.3:a:netgate:pfsense:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:netgate:pfsense_acme_package:0.6.3:*:*:*:*:*:*:*"
] |
|
GHSA-m85p-c5xr-7h82 | Race condition issues were found in Calibre at devices/linux_mount_helper.c allowing unprivileged users the ability to mount any device to anywhere. | [] |
|
GHSA-cc2w-qv4r-r525 | An issue was found in Zfaka <= 1.4.5. The verification of the background file upload function check is not strict, resulting in remote command execution. | [] |
|
GHSA-cxrr-h279-673f | A logic issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Location data may be shared via iCloud links even if Location metadata is disabled via the Share Sheet. | [] |
|
GHSA-99wg-44xm-q386 | IBM Domino is susceptible to a stack based buffer overflow vulnerability in wp6sr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted WordPerfect file. | [] |
|
GHSA-jxqh-fx46-p9v3 | Multiple cross-site scripting (XSS) vulnerabilities in RadScripts RadBids Gold 2 allow remote attackers to inject arbitrary web script or HTML via (1) the farea parameter to faq.php or the (2) cat, (3) order, or (4) area parameters to index.php. | [] |
|
GHSA-q9c7-h9h2-ghv8 | A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0634, CVE-2019-0650. | [] |
|
GHSA-6qgj-q2w2-qgcp | Stack-based buffer overflow in DecodeBase16 function, as used in the (1) IRC module and (2) web server in eMule 0.42d, allows remote attackers to execute arbitrary code via a long string. | [] |
|
GHSA-q6xv-w357-rx39 | Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. | [] |
|
GHSA-mq5w-2wf5-2jf4 | Directory traversal vulnerability in PHPList 2.10.2 and earlier allows remote attackers to include arbitrary local files via the (1) GLOBALS[database_module] or (2) GLOBALS[language_module] parameters, which overwrite the underlying $GLOBALS variable. | [] |
|
GHSA-54vm-9r8q-f6f9 | An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFIG_XEN_UNPOPULATED_ALLOC but not CONFIG_XEN_BALLOON_MEMORY_HOTPLUG. | [] |
|
CVE-2017-15878 | A cross-site scripting (XSS) vulnerability exists in fields/types/markdown/MarkdownType.js in KeystoneJS before 4.0.0-beta.7 via the Contact Us feature. | [
"cpe:2.3:a:keystonejs:keystone:*:beta7:*:*:*:*:*:*"
] |
|
CVE-2017-15782 | XnView Classic for Windows Version 2.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV starting at CADImage+0x00000000000032eb." | [
"cpe:2.3:a:xnview:xnview:2.43:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-wv74-wvpx-jwpr | Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. | [] |
|
CVE-2010-1182 | Multiple unspecified vulnerabilities in the administrative console in IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.9 on z/OS have unknown impact and attack vectors. | [
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:zos:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-0470 | PHPNetToolpack 0.1 relies on its environment's PATH to find and execute the traceroute program, which could allow local users to gain privileges by inserting a Trojan horse program into the search path. | [
"cpe:2.3:a:phpnettoolpack:phpnettoolpack:0.1:*:*:*:*:*:*:*"
] |
|
GHSA-g5vj-wj9x-4jg9 | symbiote/silverstripe-multivaluefield Possible PHP Object Injection via Multi-Value Field Extension | A potential deserialisation vulnerability has been identified in the symbiote/silverstripe-multivaluefield which could allow an attacker to exploit implementations of this module via object injection.Support for handling PHP objects as values in this module has been deprecated, and the serialisation technique has been switched to using JSON for handling arrays.As well as this, a potential XSS (cross-site scripting) vulnerability has been identified and remediated. | [] |
CVE-2017-1002004 | Vulnerability in wordpress plugin DTracker v1.5, In file ./dtracker/download.php user input isn't sanitized via the id variable before adding it to the end of an SQL query. | [
"cpe:2.3:a:dtracker_project:dtracker:1.5:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-48378 | Softnext Mail SQR Expert - Path Traversal | Softnext Mail SQR Expert has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files. | [
"cpe:2.3:a:softnext:mail_sqr_expert:*:*:*:*:*:*:*:*"
] |
CVE-2020-36787 | media: aspeed: fix clock handling logic | In the Linux kernel, the following vulnerability has been resolved:
media: aspeed: fix clock handling logic
Video engine uses eclk and vclk for its clock sources and its reset
control is coupled with eclk so the current clock enabling sequence works
like below.
Enable eclk
De-assert Video Engine reset
10ms delay
Enable vclk
It introduces improper reset on the Video Engine hardware and eventually
the hardware generates unexpected DMA memory transfers that can corrupt
memory region in random and sporadic patterns. This issue is observed
very rarely on some specific AST2500 SoCs but it causes a critical
kernel panic with making a various shape of signature so it's extremely
hard to debug. Moreover, the issue is observed even when the video
engine is not actively used because udevd turns on the video engine
hardware for a short time to make a query in every boot.
To fix this issue, this commit changes the clock handling logic to make
the reset de-assertion triggered after enabling both eclk and vclk. Also,
it adds clk_unprepare call for a case when probe fails.
clk: ast2600: fix reset settings for eclk and vclk
Video engine reset setting should be coupled with eclk to match it
with the setting for previous Aspeed SoCs which is defined in
clk-aspeed.c since all Aspeed SoCs are sharing a single video engine
driver. Also, reset bit 6 is defined as 'Video Engine' reset in
datasheet so it should be de-asserted when eclk is enabled. This
commit fixes the setting. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-68cw-6674-r526 | A Stored Cross-site Scripting (XSS) vulnerability in the Management Console (User Management and Alerts) of BlackBerry AtHoc version 7.15 could allow an attacker to execute script commands in the context of the affected user account. | [] |
|
CVE-2006-4591 | Multiple PHP remote file inclusion vulnerabilities in AlstraSoft Template Seller, and possibly AltraSoft Template Seller Pro 3.25, allow remote attackers to execute arbitrary PHP code via a URL in the config[template_path] parameter to (1) payment/payment_result.php or (2) /payment/spuser_result.php. | [
"cpe:2.3:a:alstrasoft:template_seller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alstrasoft:template_seller:*:*:pro:*:*:*:*:*",
"cpe:2.3:a:alstrasoft:template_seller:3.25:*:pro:*:*:*:*:*"
] |
|
GHSA-ggqj-3529-g8x3 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] |
|
CVE-2013-6306 | Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors. | [
"cpe:2.3:o:ibm:power_760_firmware:760.00_ax760_034_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.10_am760_044_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.10_ax760_043_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.10_ax760_043_043:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.11_ax760_051_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.20_ah760_062_043:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.20_am760_062_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.30_ah760_068_043:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.30_am760_068_034:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.31_ah760_069_043:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_760_firmware:760.31_am760_069_034:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_770:9117-mmd:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_780:9179-mhd:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_795:9119-fhb:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_ese:8412-ead:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.00_01ax740_042_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.10_01ax740_043_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.15_01ax740_045_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.16_01ax740_046_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.20_01ax740_075_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.21_01ax740_077_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.40_01ax740_088_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.50_01ax740_095_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.51_01ax740_098_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.52_01ax740_100_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.60_01ax740_110_042:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_740_firmware:740.61_01ax740_112_042:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_710:8231-e1c:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_720:8202-e4c:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_730:8231-e2c:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_740:8205-e6c:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_770:9117-mmc:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_780:9179-mhc:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_770_firmware:770.00_01al770_032_032:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_770_firmware:770.10_01ax770_038_032:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_770_firmware:770.20_01ax770_048_032:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_770_firmware:770.21_01ax770_052_032:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:power_770_firmware:770.22_01ax770_055_032:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_710:8231-e1d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_710:8268-e1d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_720:8202-e4d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_730:8231-e2d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_740:8205-e6d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_750:8408-e8d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:power_760:9109-rmd:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:powerlinux_7r1:8246-l1d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:powerlinux_7r1:8246-l1t:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:powerlinux_7r2:8246-l2d:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:powerlinux_7r2:8246-l2t:*:*:*:*:*:*:*"
] |
|
CVE-2025-47676 | WordPress User Login History <= 2.1.6 - Cross Site Scripting (XSS) Vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Faiyaz Alam User Login History allows Stored XSS. This issue affects User Login History: from n/a through 2.1.6. | [] |
GHSA-mpmq-qcvp-f36q | connection.c in Cherokee web server before 0.4.6 allows remote attackers to cause a denial of service via an HTTP POST request without a Content-Length header field. | [] |
|
GHSA-pf3c-qwr7-fjcj | The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2024-43907 | drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules | In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
Check the pointer value to fix potential null pointer
dereference | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-5j7p-qf86-r89c | Multiple buffer overflows in Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 allow remote attackers to cause a denial of service (service termination) via (1) malformed RealAudio (rad) packets that are not properly handled by the RealAudio Proxy, or (2) crafted packets to the statistics service (statsd). | [] |
|
GHSA-w2v3-9mr3-7vff | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Noah's Classifieds 1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) inf parameter; or, when register_globals is enabled, the (2) upperTemplate and (3) lowerTemplate parameters. | [] |
|
CVE-2017-9053 | An issue, also known as DW201703-005, was discovered in libdwarf 2017-03-21. A heap-based buffer over-read in _dwarf_read_loc_expr_op() is due to a failure to check a pointer for being in bounds (in a few places in this function). | [
"cpe:2.3:a:libdwarf_project:libdwarf:2017-03-21:*:*:*:*:*:*:*"
] |
|
CVE-2006-5950 | Unspecified vulnerability in ALTools ALFTP FTP Server 4.1 beta 1, and possibly earlier, allows remote authenticated users to obtain the installation path via unknown vectors related to the REN command, probably due to response messages. NOTE: the provenance of this information is unknown; details are obtained from third party sources. | [
"cpe:2.3:a:altools:alftp_ftp_server:4.1_beta1:*:*:*:*:*:*:*"
] |
|
GHSA-x49q-rxg2-p934 | Buffer overflow in ETWS processing module Intel XMM71xx, XMM72xx, XMM73xx, XMM74xx and Sofia 3G/R allows remote attacker to potentially execute arbitrary code via an adjacent network. | [] |
|
CVE-2013-2850 | Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.