id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2013-1995
X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
[ "cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-92pj-cjhq-xw9c
IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.10.and 7.1.0.000 through 7.1.11 could allow a remote attacker to obtain sensitive information, caused by improper authentication of a websocket endpoint. By using known tools to subscribe to the websocket event stream, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 188993.
[]
null
null
null
null
null
GHSA-7443-5962-wp4r
Directory Traversal in evershop
Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the mkdirSync function in the folderCreate/createFolder.js endpoint.
[]
null
5.4
null
null
null
GHSA-75wm-hfq9-qgpc
Linear eMerge 50P/5000P devices allow Cross-Site Request Forgery (CSRF).
[]
null
8.8
null
null
null
GHSA-7x7v-3hc4-2gpc
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
null
null
8.8
null
null
CVE-2020-5539
GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
[ "cpe:2.3:a:grandit:grandit:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:grandit:grandit:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:grandit:grandit:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:grandit:grandit:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:grandit:grandit:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:grandit:grandit:3.0:*:*:*:*:*:*:*" ]
null
6.5
null
6.4
null
GHSA-v89h-m477-8889
Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights via unspecified loopholes.
[]
null
8.8
null
null
null
GHSA-gv9g-pxv2-vq9v
Unprotected component vulnerability in StTheaterModeDurationAlarmReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to disable theater mode without a proper permission.
[]
null
null
null
null
null
ICSA-20-042-03
Siemens SIMATIC CP 1543-1
An arbitrary file copy vulnerability in mod_copy of the embedded FTP server allowes for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306. An arbitrary file copy vulnerability in mod_copy of the embedded FTP server allowes for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
[]
null
7.5
null
null
null
CVE-2020-0178
In getAllConfigFlags of SettingsProvider.cpp, there is a possible illegal read due to a missing permission check. This could lead to local information disclosure of config flags with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143299398
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2024-12401
Cert-manager: potential dos when parsing specially crafted pem inputs
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
[ "cpe:/a:redhat:cert_manager:1", "cpe:/a:redhat:cryostat:3", "cpe:/a:redhat:multicluster_engine", "cpe:/a:redhat:serverless:1", "cpe:/a:redhat:connectivity_link:1", "cpe:/a:redhat:openshift:4", "cpe:/a:redhat:openshift_data_foundation:4", "cpe:/a:redhat:openshift_gitops:1" ]
null
4.4
null
null
null
GHSA-rv77-8v7v-vhx8
In read_paint of ttcolr.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254803162
[]
null
7.1
null
null
null
CVE-2023-38406
bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."
[ "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-v93g-8xmc-xvqm
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
[]
null
8.8
null
null
null
GHSA-wqvj-9hcf-95cq
IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 148484.
[]
null
null
6.5
null
null
CVE-2022-0269
Cross-Site Request Forgery (CSRF) in yetiforcecompany/yetiforcecrm
Cross-Site Request Forgery (CSRF) in Packagist yetiforce/yetiforce-crm prior to 6.3.0.
[ "cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*" ]
null
null
8
null
null
RHSA-2018:3663
Red Hat Security Advisory: sos-collector security update
sos-collector: incorrect permissions set on newly created files
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.9
null
null
GHSA-r9c5-8jj7-vm4j
Multiple cross-site scripting (XSS) vulnerabilities in post.php in SkyeBox 1.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) message parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it was likely prompted by a vague announcement from a researcher who incorrectly referred to the product as "SkyeShoutbox."
[]
null
null
null
null
null
GHSA-rqp2-5j8f-59r3
An Escalation of Privilege security vulnerability was found in SecureAge Security Suite software 7.0.x before 7.0.38, 7.1.x before 7.1.11, 8.0.x before 8.0.18, and 8.1.x before 8.1.18 that allows arbitrary file creation, modification and deletion.
[]
null
9.8
null
null
null
GHSA-cppm-xp38-fh2x
The Sunshine Photo Cart WordPress plugin before 2.9.15 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
[]
null
6.1
null
null
null
CVE-2012-1149
Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.
[ "cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:openoffice.org:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:openoffice.org:3.4:beta:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-5pr8-59j7-9w95
A service DLL preloading vulnerability in Trend Micro Encryption for Email versions 5.6 and below could allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.
[]
null
null
7.8
null
null
CVE-2025-0695
An Allocation of Resources Without Limits or Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input.
[]
null
5.3
null
null
null
CVE-2021-34411
During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.
[ "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*" ]
null
7.8
null
4.6
null
CVE-2016-1519
The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandstream provisioning server via a crafted certificate.
[ "cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*" ]
null
null
5.9
4.3
null
GHSA-m499-qj3g-vhpx
Insecure deserialization of a specially crafted serialized object, in CA Release Automation 6.5 and earlier, allows attackers to potentially execute arbitrary code.
[]
null
null
9.8
null
null
CVE-2010-2577
Multiple SQL injection vulnerabilities in Pligg before 1.1.1 allow remote attackers to execute arbitrary SQL commands via the title parameter to (1) storyrss.php or (2) story.php.
[ "cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-1065
Mali GPU Kernel Driver allows improper GPU memory processing operations
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r45p0 through r48p0; Valhall GPU Kernel Driver: from r45p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r45p0 through r48p0.
[ "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r45p0:*:*:*:*:*:*:*", "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r45p0:*:*:*:*:*:*:*", "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r45p0:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
CVE-2006-3205
Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to gain access via modified user_env, pass_env, power_env, and id_env parameters in a cookie, which comprise a persistent logon that does not vary across sessions.
[ "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9.6:*:*:*:*:*:*:*" ]
null
null
null
5
null
PYSEC-2024-227
null
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of configuration files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-24322.
[]
null
8.8
null
null
null
CVE-2008-5998
Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x before 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, related to the (1) nid, (2) qid, and (3) state parameters.
[ "cpe:2.3:a:drupal:ajax_checklist:5.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2022-4401
pallidlight online-course-selection-system cross site scripting
A vulnerability was found in pallidlight online-course-selection-system. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-215268.
[ "cpe:2.3:a:pallidlight_online_course_selection_system_project:pallidlight_online_course_selection_system:-:*:*:*:*:*:*:*" ]
null
3.5
null
null
null
CVE-2017-5100
A use after free in Apps in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2024-0360
PHPGurukul Hospital Management System edit-doctor-specialization.php sql injection
A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/edit-doctor-specialization.php. The manipulation of the argument doctorspecilization leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250127.
[ "cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
null
CVE-2000-1162
ghostscript before 5.10-16 allows local users to overwrite files of other users via a symlink attack.
[ "cpe:2.3:a:aladdin_enterprises:ghostscript:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10:*:*:*:*:*:*:*", "cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.15:*:*:*:*:*:*:*", "cpe:2.3:a:aladdin_enterprises:ghostscript:5.50:*:*:*:*:*:*:*" ]
null
null
null
3.7
null
GHSA-g69r-p4mx-3r83
A stack buffer overflow exists in Mini-XML v3.2. When inputting an unformed XML string to the mxmlLoadString API, it will cause a stack-buffer-overflow in mxml_string_getc:2611.
[]
null
7.5
null
null
null
RHSA-2024:0554
Red Hat Security Advisory: kpatch-patch security update
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
null
CVE-2021-35570
Vulnerability in the Oracle Mobile Field Service product of Oracle E-Business Suite (component: Admin UI). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Mobile Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Mobile Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Mobile Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:mobile_field_service:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
null
PYSEC-2021-315
null
nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade.
[]
null
null
null
null
null
GHSA-jhw3-vp8x-97c7
Authorization Bypass Through User-Controlled Key vulnerability in ameliabooking Amelia allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Amelia: from n/a through 1.2.16.
[]
null
5.3
null
null
null
CVE-2021-42839
Grand Vice info Co. webopac7 - Arbitrary File Upload
Grand Vice info Co. webopac7 file upload function fails to filter special characters. While logging in with general user’s permission, remote attackers can upload malicious script and execute arbitrary code to control the system or interrupt services.
[ "cpe:2.3:a:vice:webopac:1.8.20160701:*:*:*:*:*:*:*", "cpe:2.3:a:vice:webopac:7.1.20160701:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2019-15451
The Samsung J3 Android device with a build fingerprint of samsung/j3y17ltedx/j3y17lte:8.0.0/R16NW/J330GDXS3BSC1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=6010000, versionName=6.1.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
[ "cpe:2.3:o:samsung:galaxy_j3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_j3:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2025-38279
bpf: Do not include stack ptr register in precision backtracking bookkeeping
In the Linux kernel, the following vulnerability has been resolved: bpf: Do not include stack ptr register in precision backtracking bookkeeping Yi Lai reported an issue ([1]) where the following warning appears in kernel dmesg: [ 60.643604] verifier backtracking bug [ 60.643635] WARNING: CPU: 10 PID: 2315 at kernel/bpf/verifier.c:4302 __mark_chain_precision+0x3a6c/0x3e10 [ 60.648428] Modules linked in: bpf_testmod(OE) [ 60.650471] CPU: 10 UID: 0 PID: 2315 Comm: test_progs Tainted: G OE 6.15.0-rc4-gef11287f8289-dirty #327 PREEMPT(full) [ 60.654385] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE [ 60.656682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 60.660475] RIP: 0010:__mark_chain_precision+0x3a6c/0x3e10 [ 60.662814] Code: 5a 30 84 89 ea e8 c4 d9 01 00 80 3d 3e 7d d8 04 00 0f 85 60 fa ff ff c6 05 31 7d d8 04 01 48 c7 c7 00 58 30 84 e8 c4 06 a5 ff <0f> 0b e9 46 fa ff ff 48 ... [ 60.668720] RSP: 0018:ffff888116cc7298 EFLAGS: 00010246 [ 60.671075] RAX: 54d70e82dfd31900 RBX: ffff888115b65e20 RCX: 0000000000000000 [ 60.673659] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 00000000ffffffff [ 60.676241] RBP: 0000000000000400 R08: ffff8881f6f23bd3 R09: 1ffff1103ede477a [ 60.678787] R10: dffffc0000000000 R11: ffffed103ede477b R12: ffff888115b60ae8 [ 60.681420] R13: 1ffff11022b6cbc4 R14: 00000000fffffff2 R15: 0000000000000001 [ 60.684030] FS: 00007fc2aedd80c0(0000) GS:ffff88826fa8a000(0000) knlGS:0000000000000000 [ 60.686837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 60.689027] CR2: 000056325369e000 CR3: 000000011088b002 CR4: 0000000000370ef0 [ 60.691623] Call Trace: [ 60.692821] <TASK> [ 60.693960] ? __pfx_verbose+0x10/0x10 [ 60.695656] ? __pfx_disasm_kfunc_name+0x10/0x10 [ 60.697495] check_cond_jmp_op+0x16f7/0x39b0 [ 60.699237] do_check+0x58fa/0xab10 ... Further analysis shows the warning is at line 4302 as below: 4294 /* static subprog call instruction, which 4295 * means that we are exiting current subprog, 4296 * so only r1-r5 could be still requested as 4297 * precise, r0 and r6-r10 or any stack slot in 4298 * the current frame should be zero by now 4299 */ 4300 if (bt_reg_mask(bt) & ~BPF_REGMASK_ARGS) { 4301 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); 4302 WARN_ONCE(1, "verifier backtracking bug"); 4303 return -EFAULT; 4304 } With the below test (also in the next patch): __used __naked static void __bpf_jmp_r10(void) { asm volatile ( "r2 = 2314885393468386424 ll;" "goto +0;" "if r2 <= r10 goto +3;" "if r1 >= -1835016 goto +0;" "if r2 <= 8 goto +0;" "if r3 <= 0 goto +0;" "exit;" ::: __clobber_all); } SEC("?raw_tp") __naked void bpf_jmp_r10(void) { asm volatile ( "r3 = 0 ll;" "call __bpf_jmp_r10;" "r0 = 0;" "exit;" ::: __clobber_all); } The following is the verifier failure log: 0: (18) r3 = 0x0 ; R3_w=0 2: (85) call pc+2 caller: R10=fp0 callee: frame1: R1=ctx() R3_w=0 R10=fp0 5: frame1: R1=ctx() R3_w=0 R10=fp0 ; asm volatile (" \ @ verifier_precision.c:184 5: (18) r2 = 0x20202000256c6c78 ; frame1: R2_w=0x20202000256c6c78 7: (05) goto pc+0 8: (bd) if r2 <= r10 goto pc+3 ; frame1: R2_w=0x20202000256c6c78 R10=fp0 9: (35) if r1 >= 0xffe3fff8 goto pc+0 ; frame1: R1=ctx() 10: (b5) if r2 <= 0x8 goto pc+0 mark_precise: frame1: last_idx 10 first_idx 0 subseq_idx -1 mark_precise: frame1: regs=r2 stack= before 9: (35) if r1 >= 0xffe3fff8 goto pc+0 mark_precise: frame1: regs=r2 stack= before 8: (bd) if r2 <= r10 goto pc+3 mark_preci ---truncated---
[]
null
null
null
null
null
GHSA-2vw6-vp5j-cgp9
finger .@host on some systems may print information on some user accounts.
[]
null
null
null
null
null
CVE-2017-17560
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.
[ "cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:2.30.172:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-vwh6-r56v-wq74
The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges.
[]
null
6.5
null
null
null
GHSA-m53q-66x7-v5m2
D-Link DAP-2622 DDP Configuration Backup Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20065.
[]
null
null
8.8
null
null
GHSA-2xw8-j43j-5vxp
elgg is vulnerable to Cross-site Scripting
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[]
null
5.4
null
null
null
GHSA-p972-7w88-335j
A vulnerability has been found in PHPGurukul Online Library Management System 3.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/student-history.php. The manipulation of the argument stdid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
2
3.5
null
null
null
GHSA-p57h-3968-wf74
Unspecified vulnerability in Futomi's CGI Cafe MP Form Mail CGI eCommerce 1.3.0 and earlier, and CGI Professional 3.2.2 and earlier, allows remote attackers to gain administrative privileges via unknown attack vectors.
[]
null
null
null
null
null
GHSA-r2x9-77mc-c6x6
NVIDIA DGX A100 SBIOS contains a vulnerability where a local attacker can cause input validation checks to be bypassed by causing an integer overflow. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
[]
null
6.6
null
null
null
CVE-2019-16263
The Twitter Kit framework through 3.4.2 for iOS does not properly validate the api.twitter.com SSL certificate. Although the certificate chain must contain one of a set of pinned certificates, there are certain implementation errors such as a lack of hostname verification. NOTE: this is an end-of-life product.
[ "cpe:2.3:a:twitter:twitter_kit:*:*:*:*:*:iphone_os:*:*" ]
null
7.4
null
5.8
null
CVE-2006-0466
Cross-site scripting (XSS) vulnerability in search.asp in Goldstag Content Management System allows remote attackers to inject arbitrary web script or HTML via the text parameter.
[ "cpe:2.3:a:goldstag:goldstag_content_management_system:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-4mgj-f599-w3j8
In the Linux kernel, the following vulnerability has been resolved:ublk: don't allow user copy for unprivileged deviceUBLK_F_USER_COPY requires userspace to call write() on ublk char device for filling request buffer, and unprivileged device can't be trusted.So don't allow user copy for unprivileged device.
[]
null
5.5
null
null
null
CVE-2008-4644
hits.php in myWebland myStats allows remote attackers to bypass IP address restrictions via a modified X-Forwarded-For HTTP header.
[ "cpe:2.3:a:mywebland:mystats:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2014-0930
The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.
[ "cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*" ]
null
null
null
4.7
null
GHSA-4v38-964c-xjmw
Code injection via unescaped translations in xwiki-platform
ImpactIn XWiki, every user can add translations that are only applied to the current user. This also allows overriding existing translations. Such translations are often included in privileged contexts without any escaping which allows remote code execution for any user who has edit access on at least one document which could be the user's own profile where edit access is enabled by default.The following describes a proof of concept exploit to demonstrate this vulnerability:Edit the user profile with the wiki editor and set the content toUse the object editor to add an object of type `XWiki.TranslationDocumentClass` with scope `USER`.Open the document `WikiManager.AdminWikiDescriptorSheet`.The expected result would be that a message with title `{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}}` is displayed while in fact an error that the HTML macro couldn't be executed is displayed, followed by the text "hello from groovy!" and some raw HTML, showing that the Groovy macro has been executed.PatchesA mitigation for this vulnerability is part of XWiki 14.10.2 and XWiki 15.0 RC1: translations with user scope now require script right. This means that regular users cannot exploit this anymore as users don't have script right by default anymore starting with XWiki 14.10.WorkaroundsThere are no known workarounds apart from upgrading to a patched versions.Referenceshttps://jira.xwiki.org/browse/XWIKI-19749https://github.com/xwiki/xwiki-platform/commit/d06ff8a58480abc7f63eb1d4b8b366024d990643For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
[]
null
9.9
null
null
null
cisco-sa-20180328-privesc2
Cisco IOS XE Software Privileged EXEC Mode Root Shell Access Vulnerability
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2"]
[]
null
null
6.7
null
null
GHSA-6r3p-fcvm-xh7c
SSRF vulnerability in Apache Airflow
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
[]
6.9
5.3
null
null
null
CVE-2007-4488
Multiple cross-site scripting (XSS) vulnerabilities in the Siemens Gigaset SE361 WLAN router with firmware 1.00.0 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI immediately following the filename for (1) a GIF filename, which triggers display of the GIF file in text format and an unspecified denial of service (crash); or (2) the login.tri filename, which triggers a continuous loop of the browser attempting to visit the login page.
[ "cpe:2.3:h:siemens:gigaset_se361_wlan_router:0:firmware_1.00:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2023-28497
WordPress Slideshow Gallery Plugin <= 1.7.6 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Slideshow Gallery LITE plugin <= 1.7.6 versions.
[ "cpe:2.3:a:tribulant:slideshow_gallery:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2010-0748
Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.
[ "cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2023-6619
SourceCodester Simple Student Attendance System class_form.php sql injection
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /modals/class_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247256.
[ "cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
null
GHSA-9j6q-jggm-9g5w
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[]
null
null
null
null
null
GHSA-rvcc-mqg5-gqq5
Cross-site scripting (XSS) vulnerability in the live preview feature in the Markdown Preview module 6.x for Drupal allows remote attackers to inject arbitrary web script or HTML via "Markdown input."
[]
null
null
null
null
null
GHSA-25vh-8m4m-9m4f
PVote before 1.9 does not authenticate users for restricted operations, which allows remote attackers to add or delete polls by modifying parameters to (1) add.php or (2) del.php.
[]
null
null
null
null
null
CVE-2019-19516
Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.
[ "cpe:2.3:o:intelbras:wrn_150_firmware:1.0.18:*:*:*:*:*:*:*", "cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-rf2p-c3v5-v8fm
VMware ESXi contains an out-of-bounds read vulnerability. A malicious actor with local administrative privileges on a virtual machine with an existing snapshot may trigger an out-of-bounds read leading to a denial-of-service condition of the host.
[]
null
6.8
null
null
null
GHSA-m9ch-6hh2-gc9w
The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections.
[]
null
6.5
null
null
null
cisco-sa-vsoln-arbfile-gtsEYxns
Cisco SD-WAN Software Arbitrary File Creation Vulnerability
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
8.4
null
null
null
GHSA-8x96-f2vc-6qpf
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
[]
null
null
null
null
null
GHSA-c856-7jr3-wm6x
Multiple SQL injection vulnerabilities in Open Source Security Information Management (OSSIM) before 2.1.2 allow remote authenticated users to execute arbitrary SQL commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.
[]
null
null
null
null
null
CVE-2014-9094
Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter.
[ "cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
null
GHSA-p3qx-72c8-xc9p
The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks.
[]
null
5.4
null
null
null
CVE-2014-1477
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" ]
null
9.8
null
6.8
null
GHSA-q779-8rmm-x7qv
Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.
[]
null
null
null
null
null
CVE-2020-2801
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. Note: The patch for this issue will address the vulnerability only if the WLS instance is using JDK 1.7.0_191 or later, or JDK 1.8.0_181 or later. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update191_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update191_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update201_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update211_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update211_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update221_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update221_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update221_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update221_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update231_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update241_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update261:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update271_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update281:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update281_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update281_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update291_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update291_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update301:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update301_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update311_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update321_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update331:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update341:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update341_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update343_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update51_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update55:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update55_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update55_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update55_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update55_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update65_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update67_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update67_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update72_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update72_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update72_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b36:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b37:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76_b38:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update79:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update80_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update80_b35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update85_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update85_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update85_b34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update91_b17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update91_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update91_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update95_b13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update95_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update95_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update97_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update97_b32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update97_b33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update99_b31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update182:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update212:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update252:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update271:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update291:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update301:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update321:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update331:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update341:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*" ]
null
null
9.8
null
null
CVE-2016-20022
In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.
[]
null
8.4
null
null
null
RHSA-2020:1264
Red Hat Security Advisory: systemd security and bug fix update
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
4.3
null
null
GHSA-p7mx-frqj-j9hq
Exploitation of session variables, resource IDs and other trusted credentials vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to exploit or harm a user's browser via reusing the exposed session token in the application URL.
[]
null
null
6.3
null
null
CVE-2017-13713
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
[ "cpe:2.3:o:twsz:wifi_repeater_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:twsz:wifi_repeater:-:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
CVE-2023-23874
WordPress Ditty Plugin <= 3.0.32 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Metaphor Creations Ditty plugin <= 3.0.32 versions.
[ "cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
GHSA-6pp2-r37j-3rhq
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
[]
null
null
null
null
null
CVE-2008-0828
Multiple cross-site scripting (XSS) vulnerabilities in ATutor 1.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) attributes such as style and onmouseover in (a) forum post or (b) mail; or (2) the website field of the profile.
[ "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.1:pl1:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.1:pl2:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:atutor:atutor:1.5.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2019-11581
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
[ "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
null
9.8
null
9.3
null
CVE-2022-26471
In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319121; Issue ID: ALPS07319121.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-r44h-hhf2-mhwp
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 does not disable the SSL 2.0 protocol, which makes it easier for remote attackers to conduct spoofing attacks by leveraging protocol weaknesses.
[]
null
null
null
null
null
GHSA-p45f-4wjg-jj3v
A vulnerability classified as problematic has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /aboutadd.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
4.7
null
null
null
RHSA-2012:0478
Red Hat Security Advisory: samba security update
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
[ "cpe:/o:redhat:rhel_els:4::as", "cpe:/o:redhat:rhel_els:4::es" ]
null
null
null
null
null
CVE-2022-3752
Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation.
[ "cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*", "cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
cisco-sa-20190821-ucs-cimc
Cisco Integrated Management Controller Command Injection Vulnerability
A vulnerability in the Redfish protocol of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending crafted authenticated commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands on an affected device with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc"]
[]
null
null
7.2
null
null
GHSA-3jfx-5w5g-hfh9
Stack-based buffer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via a PDF file containing a malformed U3D model file with a crafted extension block.
[]
null
null
null
null
null
CVE-2015-8890
platform/msm_shared/partition_parser.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate certain GUID Partition Table (GPT) data, which allows attackers to bypass intended access restrictions via a crafted MultiMediaCard (MMC), aka Android internal bug 28822878 and Qualcomm internal bug CR823461.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2025-37941
ASoC: codecs: wcd937x: fix a potential memory leak in wcd937x_soc_codec_probe()
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: fix a potential memory leak in wcd937x_soc_codec_probe() When snd_soc_dapm_new_controls() or snd_soc_dapm_add_routes() fails, wcd937x_soc_codec_probe() returns without releasing 'wcd937x->clsh_info', which is allocated by wcd_clsh_ctrl_alloc. Add wcd_clsh_ctrl_free() to prevent potential memory leak.
[]
null
null
null
null
null
GHSA-wvjw-p9f5-vq28
Segfault in `tf.raw_ops.SparseCountSparseOutput`
ImpactPassing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault.PatchesWe have patched the issue in GitHub commit [82e6203221865de4008445b13c69b6826d2b28d9](https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[]
2
2.5
null
null
null
CVE-2020-0172
In Parse_art of eas_mdls.c, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127312550
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2014-8018
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur19630, and CSCur19661.
[ "cpe:2.3:a:cisco:unified_communications_domain_manager:8.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-6qmq-j47c-v4fj
The Email Subscribers by Icegram Express WordPress plugin before 5.7.45 does not sanitise and escape some of its Workflow settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
GHSA-qvh2-rg4v-27xj
The Embed Calendly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'calendly' shortcode in versions up to, and including, 3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2023-42793
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null