id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2025-6082
|
Birth Chart Compatibility <= 2.0 - Unauthenticated Full Path Exposure
|
The Birth Chart Compatibility plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0. This is due to insufficient protection against directly accessing the plugin's index.php file, which causes an error exposing the full path. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
|
[] | null | 5.3 | null | null |
GHSA-x48c-rrg8-735f
|
The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
|
[] | null | 9.8 | null | null |
|
CVE-2007-6353
|
Integer overflow in exif.cpp in exiv2 library allows context-dependent attackers to execute arbitrary code via a crafted EXIF file that triggers a heap-based buffer overflow.
|
[
"cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2008:0510
|
Red Hat Security Advisory: Red Hat Application Stack v1.3 security and enhancement update
|
mysql: privilege escalation via DATA/INDEX DIRECTORY directives
|
[
"cpe:/a:redhat:rhel_application_stack:1"
] | null | null | null | null |
GHSA-6q3f-wf4j-86jw
|
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to "/" (slash) characters.
|
[] | null | null | null | null |
|
GHSA-r4pg-4fjh-q6c6
|
csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory.
|
[] | null | null | null | null |
|
GHSA-h7wj-q4wv-chfq
|
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
|
[] | null | null | null | null |
|
CVE-2019-5792
|
Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-p8xc-w865-2hhr
|
BYD QIN PLUS DM-i Dilink OS v3.0_13.1.7.2204050.1 to v3.0_13.1.7.2312290.1_0 was discovered to cend broadcasts to the manufacturer's cloud server unencrypted, allowing attackers to execute a man-in-the-middle attack.
|
[] | null | 8.1 | null | null |
|
GHSA-qv5v-53gj-m57g
|
imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a crafted GIF file.
|
[] | null | null | 7.5 | null |
|
GHSA-rgcc-fhjc-9mj4
|
The bws-google-analytics plugin before 1.7.1 for WordPress has multiple XSS issues.
|
[] | null | null | null | null |
|
CVE-2010-2484
|
The strrchr function in PHP 5.2 before 5.2.14 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.
|
[
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-20865
|
An issue was discovered in Mattermost Server before 5.12.0, 5.11.1, 5.10.2, 5.9.2, and 4.10.10. The login page allows CSRF.
|
[
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost_server:5.12.0:rc6:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-pq9f-gcj3-hc3c
|
Remote code execution is possible in Cloudera Data Science Workbench version 1.3.0 and prior releases via unspecified attack vectors.
|
[] | null | null | null | null |
|
GHSA-p8pg-r36g-7vjr
|
In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.
|
[] | null | 6.5 | null | null |
|
GHSA-hx4m-5mj9-4q84
|
A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0004 and 0x0015, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014).
|
[] | null | 7.8 | null | null |
|
CVE-2024-13876
|
Meintopf <= 0.2.1 - Reflected XSS
|
The mEintopf WordPress plugin through 0.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] | null | 7.1 | null | null |
GHSA-rf84-hw64-3p3f
|
CRLF injection vulnerability in HP System Management Homepage (SMH) before 6.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
|
[] | null | null | null | null |
|
GHSA-22h9-2mpf-7588
|
An issue found in POWERAMP audioplayer build 925 bundle play and build 954 allows a remote attacker to gain privileges via the reverb and EQ preset parameters.
|
[] | null | 9.8 | null | null |
|
GHSA-27qg-f2r7-8953
|
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.
|
[] | null | 5.7 | null | null |
|
CVE-2018-3210
|
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:glassfish_server:3.1.2:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
ICSA-24-046-02
|
Siemens SIDIS Prime
|
In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network. Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.
|
[] | null | 7.5 | null | null |
CVE-2020-26068
|
Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability
|
A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users.
|
[
"cpe:2.3:a:cisco:roomos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
RHSA-2010:0501
|
Red Hat Security Advisory: firefox security, bug fix, and enhancement update
|
mozilla: in-session phishing attack Firefox: overlong UTF-8 seqence detection problem mozilla: XMLDocument:: load() doesn't check nsIContentPolicy (MFSA 2010-24) firefox: arbitrary code execution via memory corruption firefox: keystrokes sent to hidden frame rather than visible frame due to javascript flaw nsGenericDOMDataNode:: SetTextInternal Content-Disposition: attachment ignored if Content-Type: multipart also present Mozilla Freed object reuse across plugin instances Mozilla Integer Overflow in XSLT Node Sorting Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption Mozilla Crashes with evidence of memory corruption
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2002-0774
|
Hosting Controller creates a default user AdvWebadmin with a default password, which could allow remote attackers to gain privileges if the password is not changed.
|
[
"cpe:2.3:a:hosting_controller:hosting_controller:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hosting_controller:hosting_controller:1.4b:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2023-46646
|
Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub Enterprise Server version 3.7.0 and above and was fixed in version 3.17.19, 3.8.12, 3.9.7 3.10.4, and 3.11.0.
|
[
"cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-2q65-8x4g-wppr
|
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the rebootTime parameter in the sysScheduleRebootSet function.
|
[] | null | 9.8 | null | null |
|
GHSA-5qwx-3qhf-38g3
|
SQL injection vulnerability in index.php in YourFreeWorld Shopping Cart Script allows remote attackers to execute arbitrary SQL commands via the c parameter.
|
[] | null | null | null | null |
|
GHSA-66pv-97pv-f4qx
|
SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack.
|
[] | null | 9.8 | null | null |
|
GHSA-rjp4-3mpr-8c2v
|
Chamilo 1.11.x up to 1.11.20 allows users with admin privilege account to insert XSS in the extra fields management section.
|
[] | null | 4.8 | null | null |
|
RHSA-2025:1671
|
Red Hat Security Advisory: mysql security update
|
openssl: SSL_select_next_proto buffer overread curl: libcurl: ASN.1 date parser overread curl: curl netrc password leak mysql: PS unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: X Plugin unspecified vulnerability (CPU Oct 2024) mysql: Information Schema unspecified vulnerability (CPU Oct 2024) mysql: DDL unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: FTS unspecified vulnerability (CPU Oct 2024) mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: DML unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: Client programs unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) mysql: InnoDB unspecified vulnerability (CPU Oct 2024) mysql: Optimizer unspecified vulnerability (CPU Oct 2024) mysql: mysqldump unspecified vulnerability (CPU Oct 2024) krb5: GSS message token handling mysql: High Privilege Denial of Service Vulnerability in MySQL Server mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Components Services unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: MySQL Server Options Vulnerability mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) mysql: Parser unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: DDL unspecified vulnerability (CPU Jan 2025) mysql: Information Schema unspecified vulnerability (CPU Jan 2025) mysql: InnoDB unspecified vulnerability (CPU Jan 2025) mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) mysql: Optimizer unspecified vulnerability (CPU Jan 2025) mysql: Privileges unspecified vulnerability (CPU Jan 2025) mysql: Packaging unspecified vulnerability (CPU Jan 2025) mysql: Privilege Misuse in MySQL Server Security Component mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | 5.9 | null |
CVE-2021-41263
|
Secure/signed cookies share secrets between sites in rails_multisite
|
rails_multisite provides multi-db support for Rails applications. In affected versions this vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
|
[
"cpe:2.3:a:discourse:rails_multisite:*:*:*:*:*:ruby:*:*"
] | null | 8.3 | null | null |
GHSA-32vq-v62x-64mm
|
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanNonLogin function.
|
[] | null | 7.5 | null | null |
|
GHSA-c988-3h88-mrp5
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao Donations Made Easy – Smart Donations plugin <= 4.0.12 versions.
|
[] | null | 7.1 | null | null |
|
GHSA-fxr5-768h-qw68
|
A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
|
[] | null | 5.5 | null | null |
|
GHSA-m8x9-3w5p-964r
|
The byte-swapping implementation in copyfile in Apple OS X before 10.9.4 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted AppleDouble file in a ZIP archive.
|
[] | null | null | null | null |
|
CVE-2015-7016
|
The MCX Application Restrictions component in Apple OS X before 10.11.1, when Managed Configuration is enabled, mishandles provisioning profiles, which allows attackers to bypass intended entitlement restrictions and gain privileges via a crafted developer-signed app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
GHSA-983r-78qh-9frx
|
Deserialization of Untrusted Data vulnerability in ARI Soft ARI Stream Quiz – WordPress Quizzes Builder.This issue affects ARI Stream Quiz – WordPress Quizzes Builder: from n/a through 1.3.0.
|
[] | null | 9.9 | null | null |
|
GHSA-c8j6-237j-q4qm
|
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] | null | 6.4 | null | null |
|
GHSA-q7g2-v5xx-cmxx
|
In updateInputChannel of WindowManagerService.java, there is a possible way to set a touchable region beyond its own SurfaceControl due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254681548
|
[] | null | 5.5 | null | null |
|
GHSA-gf29-gwj9-7xvj
|
An issue in bytecodealliance wasm-micro-runtime before v.b3f728c and fixed in commit 06df58f allows a remote attacker to escalate privileges via a crafted file to the check_was_abi_compatibility function.
|
[] | null | 8.8 | null | null |
|
GHSA-hq97-57gj-6388
|
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution.
|
[] | null | null | null | null |
|
GHSA-chwr-hm63-gqcq
|
PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 does not require authentication for access to log files, which allows remote attackers to obtain sensitive server information by using a predictable name in a request for a file.
|
[] | null | null | null | null |
|
GHSA-m2g8-2vhm-m4cx
|
A vulnerability in binary-husky/gpt_academic version git 310122f allows for remote code execution. The application supports the extraction of user-provided RAR files without proper validation. The Python rarfile module, which supports symlinks, can be exploited to perform arbitrary file writes. This can lead to remote code execution by writing to sensitive files such as SSH keys, crontab files, or the application's own code.
|
[] | null | null | 8.8 | null |
|
GHSA-g36w-5vm4-qjjc
|
Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4.
|
[] | null | 9.8 | null | null |
|
GHSA-29ch-f7xh-hrh2
|
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing.
|
[] | null | null | null | null |
|
GHSA-63h3-hrqg-7f66
|
The WCFM Marketplace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcfm_stores' shortcode in versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
CVE-2021-37178
|
A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by loading a specially crafted xml file.
|
[
"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2021-37982
|
Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2020-6758
|
A cross-site scripting (XSS) vulnerability in Option/optionsAll.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows remote attackers to inject arbitrary web script or HTML via the ContentFrame parameter.
|
[
"cpe:2.3:o:rasilient:pixelstor_5000_firmware:4.0.1580-20150629:*:*:*:*:*:*:*",
"cpe:2.3:h:rasilient:pixelstor_5000:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
|
CVE-2021-39222
|
XSS in Talk
|
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
|
[
"cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
cisco-sa-jabber-ttcgB9R3
|
Cisco Jabber for Windows Information Disclosure Vulnerability
|
A vulnerability in Cisco Jabber software could allow an authenticated, remote attacker to gain access to sensitive information.
The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted messages to a targeted system. A successful exploit could allow the attacker to cause the application to return sensitive authentication information to another system, possibly for use in further attacks.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 6.5 | null | null |
CVE-2011-4638
|
Multiple SQL injection vulnerabilities in SpamTitan WebTitan before 3.60 allow remote attackers to execute arbitrary SQL commands via (1) the username parameter to login-x.php, and allow remote authenticated users to execute arbitrary SQL commands via the (2) bldomain, (3) wldomain, or (4) temid parameter to urls-x.php.
|
[
"cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2vp5-6m5f-7859
|
An elevation of privilege vulnerability exists when the (Human Interface Device) HID Parser Library driver improperly handles objects in memory, aka "HIDParser Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
[] | null | null | 7 | null |
|
CVE-2025-21475
|
Buffer Over-read in Display
|
Memory corruption while processing escape code, when DisplayId is passed with large unsigned value.
|
[] | null | 7.8 | null | null |
GHSA-82hj-ghm7-6vpg
|
The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows authenticated users to abuse local resources to Privilege Escalation.
|
[] | null | 7.8 | null | null |
|
GHSA-6wgj-66m2-xxp2
|
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
|
[] | null | 9.8 | null | null |
|
GHSA-hmjj-fwv3-rhm2
|
VP9 Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24451.
|
[] | null | 7.8 | null | null |
|
GHSA-3pp8-2wgj-2w4j
|
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Folders, Files & Attachments). Supported versions that are affected are 9.3.3, 9.3.4, 9.3.5 and 9.3.6. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Agile PLM. CVSS 3.0 Base Score 5.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L).
|
[] | null | null | null | null |
|
GHSA-jw67-q432-r4c9
|
The Single Sign-On (SSO) feature in F5 BIG-IP APM 11.x before 11.6.0 HF6 and BIG-IP Edge Gateway 11.0.0 through 11.3.0 might allow remote attackers to obtain sensitive SessionId information by leveraging access to the Location HTTP header in a redirect.
|
[] | null | null | 5.9 | null |
|
CVE-2007-6551
|
SQL injection vulnerability in showMsg.php in MailMachine Pro 2.2.4, and other versions before 2.2.6, allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:mailmachinepro:mailmachine_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmachinepro:mailmachine_pro:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmachinepro:mailmachine_pro:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmachinepro:mailmachine_pro:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmachinepro:mailmachine_pro:2.2.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-525w-x42w-vp45
|
Cross-site scripting (XSS) vulnerability in EditForm.aspx in Microsoft Office SharePoint Server 2010 and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via a post, aka "Editform Script Injection Vulnerability."
|
[] | null | null | null | null |
|
GHSA-7g2v-jj9q-g3rg
|
Possible Log Injection in Rack::CommonLogger
|
Summary`Rack::CommonLogger` can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs.DetailsWhen a user provides the authorization credentials via `Rack::Auth::Basic`, if success, the username will be put in `env['REMOTE_USER']` and later be used by `Rack::CommonLogger` for logging purposes.The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile.ImpactAttackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files.MitigationUpdate to the latest version of Rack.
|
[] | 5.7 | null | null | null |
GHSA-jx2w-33ww-4xjr
|
In the Linux kernel, the following vulnerability has been resolved:usb: acpi: Prevent null pointer dereference in usb_acpi_add_usb4_devlink()As demonstrated by the fix for update_port_device_state,
commit 12783c0b9e2c ("usb: core: Prevent null pointer dereference in update_port_device_state"),
usb_hub_to_struct_hub() can return NULL in certain scenarios,
such as during hub driver unbind or teardown race conditions,
even if the underlying usb_device structure exists.Plus, all other places that call usb_hub_to_struct_hub() in the same file
do check for NULL return values.If usb_hub_to_struct_hub() returns NULL, the subsequent access to
hub->ports[udev->portnum - 1] will cause a null pointer dereference.
|
[] | null | null | null | null |
|
GHSA-294c-c6r2-489h
|
IBM Lotus Notes Traveler before 8.5.1.3, when a multidomain environment is used, does not properly apply policy documents to mobile users from a different Domino domain than the Traveler server, which allows remote authenticated users to bypass intended access restrictions by using credentials from a different domain.
|
[] | null | null | null | null |
|
GHSA-56wh-pwxx-jq62
|
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution and Elevation of privileges.
|
[] | null | 7.8 | null | null |
|
GHSA-3xrr-7m6p-p7xh
|
HtmlUnit Code Injection vulnerability
|
Versions of the package `net.sourceforge.htmlunit:htmlunit` from 0 and before 3.0.0 are vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage.
|
[] | null | 9.8 | null | null |
GHSA-557g-4v8f-vprj
|
The default configuration of the America Online (AOL) client software allows all users to modify a certain registry value that specifies a DLL file name, which might allow local users to gain privileges via a Trojan horse program.
|
[] | null | null | null | null |
|
GHSA-xp9q-8p95-j7cm
|
Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
|
[] | null | 4.3 | null | null |
|
RHSA-2023:5094
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of service
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
GHSA-cgp2-rccm-9rjc
|
A vulnerability has been identified in CoreShield One-Way Gateway (OWG) Software (All versions < V2.2). The default installation sets insecure file permissions that could allow a local attacker to escalate privileges to local administrator.
|
[] | null | 7.8 | null | null |
|
RHSA-2011:1307
|
Red Hat Security Advisory: jbossws security update
|
JBossWS remote Denial of Service
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:4.3"
] | null | null | null | null |
GHSA-c78g-42vj-2xq3
|
Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile parameter.
|
[] | null | 4.8 | null | null |
|
GHSA-46pj-m82h-8px5
|
This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An attacker may be able to cause unexpected app termination.
|
[] | null | 7.5 | null | null |
|
GHSA-3mpj-h64q-x7gf
|
In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system.
|
[] | null | null | null | null |
|
GHSA-446v-mrg6-7hw8
|
The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null |
|
GHSA-mg66-3x8x-r8g2
|
TYPO3 Backend vulnerable to Frame Hijacking
|
The Backend subcomponent in TYPO3 4.0.13 and earlier, 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2 allows remote authenticated users to place arbitrary web sites in TYPO3 backend framesets via crafted parameters, related to a "frame hijacking" issue.
|
[] | null | null | null | null |
GHSA-9jv6-r6gp-f652
|
The Airlines International (aka org.iata.IAMagazine) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null |
|
CVE-2024-20749
|
TALOS-2023-1910 - Adobe Acrobat Reader Font CharStrings CharStringsOffset out-of-bounds read vulnerability
|
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null |
GHSA-798f-8qgx-h85f
|
A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system.
|
[] | null | 5.1 | null | null |
|
GHSA-g5f9-q7v3-ff2h
|
The Call Now Accessibility Button WordPress plugin before 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null |
|
CVE-2014-9398
|
Cross-site request forgery (CSRF) vulnerability in the Twitter LiveBlog plugin 1.1.2 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the mashtlb_twitter_username parameter in the twitter-liveblog.php page to wp-admin/options-general.php.
|
[
"cpe:2.3:a:twitter_liveblog_project:twitter_liveblog:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-5750
|
Data Detectors Engine in Apple OS X before 10.10.5 allows attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted series of Unicode characters.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-5807
|
The Authorize.Net eCheck module in Zen Cart does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[
"cpe:2.3:a:lincolnloop:authorize.net_echeck_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:zen-cart:zen_cart:-:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-83mx-7rq3-8xwj
|
In the Linux kernel, the following vulnerability has been resolved:ceph: pass cred pointer to ceph_mds_auth_match()This eliminates a redundant get_current_cred() call, because
ceph_mds_check_access() has already obtained this pointer.As a side effect, this also fixes a reference leak in
ceph_mds_auth_match(): by omitting the get_current_cred() call, no
additional cred reference is taken.
|
[] | null | null | null | null |
|
GHSA-c9cr-fjpc-6g3v
|
IBM Rational Requirements Composer 3.0 through 3.0.1.6 and 4.0 through 4.0.7 and Rational DOORS Next Generation (RDNG) 4.0 through 4.0.7 and 5.0 through 5.0.2, when LTPA single sign on is used with WebSphere Application Server, do not terminate a Requirements Management (RM) session upon LTPA token expiration, which allows remote attackers to obtain access by leveraging an unattended workstation.
|
[] | null | null | null | null |
|
CVE-2021-27072
|
Win32k Elevation of Privilege Vulnerability
|
Win32k Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7 | null | null |
CVE-2024-43796
|
express vulnerable to XSS via response.redirect()
|
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
|
[
"cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:*",
"cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:*"
] | null | 5 | null | null |
GHSA-hw6f-3h4f-j29q
|
In ccd, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341261; Issue ID: ALPS07341261.
|
[] | null | 6.4 | null | null |
|
GHSA-hj5j-mwv8-vhfp
|
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
|
[] | null | 5.4 | null | null |
|
GHSA-6r8g-h8h9-fx3q
|
Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure.
|
[] | null | 7.8 | null | null |
|
CVE-2013-4713
|
Cross-site scripting (XSS) vulnerability in I-O DATA DEVICE RockDisk with firmware before 1.05e1-2.0.5 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:o:iodata:rockdisk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.03v3-1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.03w-1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.03y-1.16:beta:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04a-1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04b-1.21:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04d-2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04m-2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04n-2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04r3-2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:iodata:rockdisk_firmware:1.04t-2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:iodata:rockdisk:-:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2009-4953
|
Cross-site scripting (XSS) vulnerability in the Userdata Create/Edit (sg_userdata) extension before 0.91.0 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:stefan_geith:sg_userdata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.100:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.101:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.109:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.111:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.202:*:*:*:*:*:*:*",
"cpe:2.3:a:stefan_geith:sg_userdata:0.90.210:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-49236
|
bpf: Fix UAF due to race between btf_try_get_module and load_module
|
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix UAF due to race between btf_try_get_module and load_module
While working on code to populate kfunc BTF ID sets for module BTF from
its initcall, I noticed that by the time the initcall is invoked, the
module BTF can already be seen by userspace (and the BPF verifier). The
existing btf_try_get_module calls try_module_get which only fails if
mod->state == MODULE_STATE_GOING, i.e. it can increment module reference
when module initcall is happening in parallel.
Currently, BTF parsing happens from MODULE_STATE_COMING notifier
callback. At this point, the module initcalls have not been invoked.
The notifier callback parses and prepares the module BTF, allocates an
ID, which publishes it to userspace, and then adds it to the btf_modules
list allowing the kernel to invoke btf_try_get_module for the BTF.
However, at this point, the module has not been fully initialized (i.e.
its initcalls have not finished). The code in module.c can still fail
and free the module, without caring for other users. However, nothing
stops btf_try_get_module from succeeding between the state transition
from MODULE_STATE_COMING to MODULE_STATE_LIVE.
This leads to a use-after-free issue when BPF program loads
successfully in the state transition, load_module's do_init_module call
fails and frees the module, and BPF program fd on close calls module_put
for the freed module. Future patch has test case to verify we don't
regress in this area in future.
There are multiple points after prepare_coming_module (in load_module)
where failure can occur and module loading can return error. We
illustrate and test for the race using the last point where it can
practically occur (in module __init function).
An illustration of the race:
CPU 0 CPU 1
load_module
notifier_call(MODULE_STATE_COMING)
btf_parse_module
btf_alloc_id // Published to userspace
list_add(&btf_mod->list, btf_modules)
mod->init(...)
... ^
bpf_check |
check_pseudo_btf_id |
btf_try_get_module |
returns true | ...
... | module __init in progress
return prog_fd | ...
... V
if (ret < 0)
free_module(mod)
...
close(prog_fd)
...
bpf_prog_free_deferred
module_put(used_btf.mod) // use-after-free
We fix this issue by setting a flag BTF_MODULE_F_LIVE, from the notifier
callback when MODULE_STATE_LIVE state is reached for the module, so that
we return NULL from btf_try_get_module for modules that are not fully
formed. Since try_module_get already checks that module is not in
MODULE_STATE_GOING state, and that is the only transition a live module
can make before being removed from btf_modules list, this is enough to
close the race and prevent the bug.
A later selftest patch crafts the race condition artifically to verify
that it has been fixed, and that verifier fails to load program (with
ENXIO).
Lastly, a couple of comments:
1. Even if this race didn't exist, it seems more appropriate to only
access resources (ksyms and kfuncs) of a fully formed module which
has been initialized completely.
2. This patch was born out of need for synchronization against module
initcall for the next patch, so it is needed for correctness even
without the aforementioned race condition. The BTF resources
initialized by module initcall are set up once and then only looked
up, so just waiting until the initcall has finished ensures correct
behavior.
|
[] | null | 7.8 | null | null |
GHSA-gch9-p5m3-r2vf
|
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets, a different vulnerability than CVE-2014-2257.
|
[] | null | null | null | null |
|
GHSA-chwr-hf3w-c984
|
Regular Expression Denial of Service in dat.gui
|
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
|
[] | null | 7.5 | null | null |
GHSA-8284-h6g2-x964
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin LLC WP Tabs – Responsive Tabs Plugin for WordPress allows Stored XSS.This issue affects WP Tabs – Responsive Tabs Plugin for WordPress: from n/a through 2.2.0.
|
[] | null | 6.5 | null | null |
|
CVE-2021-42737
|
Adobe Prelude WAV File Parsing Memory Corruption Arbitrary Code Execution
|
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
|
[
"cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
PYSEC-2022-43066
| null |
The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[] | null | 9.8 | null | null |
ICSA-23-285-11
|
Siemens Mendix Forgot Password Module
|
Applications using the affected module are vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users.
|
[] | null | 5.3 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.