id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2013-1995
|
X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
|
[
"cpe:2.3:a:x.org:libxi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.5.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.5.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.6.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:libxi:1.7:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-92pj-cjhq-xw9c
|
IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.10.and 7.1.0.000 through 7.1.11 could allow a remote attacker to obtain sensitive information, caused by improper authentication of a websocket endpoint. By using known tools to subscribe to the websocket event stream, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 188993.
|
[] | null | null | null | null | null |
|
GHSA-7443-5962-wp4r
|
Directory Traversal in evershop
|
Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the mkdirSync function in the folderCreate/createFolder.js endpoint.
|
[] | null | 5.4 | null | null | null |
GHSA-75wm-hfq9-qgpc
|
Linear eMerge 50P/5000P devices allow Cross-Site Request Forgery (CSRF).
|
[] | null | 8.8 | null | null | null |
|
GHSA-7x7v-3hc4-2gpc
|
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-5539
|
GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors.
|
[
"cpe:2.3:a:grandit:grandit:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:grandit:grandit:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:grandit:grandit:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:grandit:grandit:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:grandit:grandit:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:grandit:grandit:3.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 6.4 | null |
|
GHSA-v89h-m477-8889
|
Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights via unspecified loopholes.
|
[] | null | 8.8 | null | null | null |
|
GHSA-gv9g-pxv2-vq9v
|
Unprotected component vulnerability in StTheaterModeDurationAlarmReceiver in Wear OS 3.0 prior to Firmware update Feb-2022 Release allows untrusted applications to disable theater mode without a proper permission.
|
[] | null | null | null | null | null |
|
ICSA-20-042-03
|
Siemens SIMATIC CP 1543-1
|
An arbitrary file copy vulnerability in mod_copy of the embedded FTP server allowes for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306. An arbitrary file copy vulnerability in mod_copy of the embedded FTP server allowes for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
|
[] | null | 7.5 | null | null | null |
CVE-2020-0178
|
In getAllConfigFlags of SettingsProvider.cpp, there is a possible illegal read due to a missing permission check. This could lead to local information disclosure of config flags with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143299398
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2024-12401
|
Cert-manager: potential dos when parsing specially crafted pem inputs
|
A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.
|
[
"cpe:/a:redhat:cert_manager:1",
"cpe:/a:redhat:cryostat:3",
"cpe:/a:redhat:multicluster_engine",
"cpe:/a:redhat:serverless:1",
"cpe:/a:redhat:connectivity_link:1",
"cpe:/a:redhat:openshift:4",
"cpe:/a:redhat:openshift_data_foundation:4",
"cpe:/a:redhat:openshift_gitops:1"
] | null | 4.4 | null | null | null |
GHSA-rv77-8v7v-vhx8
|
In read_paint of ttcolr.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-254803162
|
[] | null | 7.1 | null | null | null |
|
CVE-2023-38406
|
bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."
|
[
"cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-v93g-8xmc-xvqm
|
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
|
[] | null | 8.8 | null | null | null |
|
GHSA-wqvj-9hcf-95cq
|
IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 148484.
|
[] | null | null | 6.5 | null | null |
|
CVE-2022-0269
|
Cross-Site Request Forgery (CSRF) in yetiforcecompany/yetiforcecrm
|
Cross-Site Request Forgery (CSRF) in Packagist yetiforce/yetiforce-crm prior to 6.3.0.
|
[
"cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*"
] | null | null | 8 | null | null |
RHSA-2018:3663
|
Red Hat Security Advisory: sos-collector security update
|
sos-collector: incorrect permissions set on newly created files
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.9 | null | null |
GHSA-r9c5-8jj7-vm4j
|
Multiple cross-site scripting (XSS) vulnerabilities in post.php in SkyeBox 1.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) message parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information, although it was likely prompted by a vague announcement from a researcher who incorrectly referred to the product as "SkyeShoutbox."
|
[] | null | null | null | null | null |
|
GHSA-rqp2-5j8f-59r3
|
An Escalation of Privilege security vulnerability was found in SecureAge Security Suite software 7.0.x before 7.0.38, 7.1.x before 7.1.11, 8.0.x before 8.0.18, and 8.1.x before 8.1.18 that allows arbitrary file creation, modification and deletion.
|
[] | null | 9.8 | null | null | null |
|
GHSA-cppm-xp38-fh2x
|
The Sunshine Photo Cart WordPress plugin before 2.9.15 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
|
[] | null | 6.1 | null | null | null |
|
CVE-2012-1149
|
Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.
|
[
"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openoffice.org:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:openoffice.org:3.4:beta:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5pr8-59j7-9w95
|
A service DLL preloading vulnerability in Trend Micro Encryption for Email versions 5.6 and below could allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-0695
|
An Allocation of Resources Without Limits or Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input.
|
[] | null | 5.3 | null | null | null |
|
CVE-2021-34411
|
During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.
|
[
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2016-1519
|
The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandstream provisioning server via a crafted certificate.
|
[
"cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-m499-qj3g-vhpx
|
Insecure deserialization of a specially crafted serialized object, in CA Release Automation 6.5 and earlier, allows attackers to potentially execute arbitrary code.
|
[] | null | null | 9.8 | null | null |
|
CVE-2010-2577
|
Multiple SQL injection vulnerabilities in Pligg before 1.1.1 allow remote attackers to execute arbitrary SQL commands via the title parameter to (1) storyrss.php or (2) story.php.
|
[
"cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-1065
|
Mali GPU Kernel Driver allows improper GPU memory processing operations
|
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r45p0 through r48p0; Valhall GPU Kernel Driver: from r45p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r45p0 through r48p0.
|
[
"cpe:2.3:a:arm:valhall_gpu_kernel_driver:r45p0:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r45p0:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r45p0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
CVE-2006-3205
|
Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to gain access via modified user_env, pass_env, power_env, and id_env parameters in a cookie, which comprise a persistent logon that does not vary across sessions.
|
[
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ultimate_php_board:ultimate_php_board:1.9.6:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
PYSEC-2024-227
| null |
Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of configuration files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-24322.
|
[] | null | 8.8 | null | null | null |
CVE-2008-5998
|
Multiple SQL injection vulnerabilities in the ajax_checklist_save function in the Ajax Checklist module 5.x before 5.x-1.1 for Drupal allow remote authenticated users, with "update ajax checklists" permissions, to execute arbitrary SQL commands via a save operation, related to the (1) nid, (2) qid, and (3) state parameters.
|
[
"cpe:2.3:a:drupal:ajax_checklist:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2022-4401
|
pallidlight online-course-selection-system cross site scripting
|
A vulnerability was found in pallidlight online-course-selection-system. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-215268.
|
[
"cpe:2.3:a:pallidlight_online_course_selection_system_project:pallidlight_online_course_selection_system:-:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
CVE-2017-5100
|
A use after free in Apps in Google Chrome prior to 60.0.3112.78 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2024-0360
|
PHPGurukul Hospital Management System edit-doctor-specialization.php sql injection
|
A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/edit-doctor-specialization.php. The manipulation of the argument doctorspecilization leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250127.
|
[
"cpe:2.3:a:phpgurukul:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 | null |
CVE-2000-1162
|
ghostscript before 5.10-16 allows local users to overwrite files of other users via a symlink attack.
|
[
"cpe:2.3:a:aladdin_enterprises:ghostscript:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:aladdin_enterprises:ghostscript:5.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:aladdin_enterprises:ghostscript:5.50:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
GHSA-g69r-p4mx-3r83
|
A stack buffer overflow exists in Mini-XML v3.2. When inputting an unformed XML string to the mxmlLoadString API, it will cause a stack-buffer-overflow in mxml_string_getc:2611.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2024:0554
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: IGB driver inadequate buffer size for frames larger than MTU
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null | null |
CVE-2021-35570
|
Vulnerability in the Oracle Mobile Field Service product of Oracle E-Business Suite (component: Admin UI). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Mobile Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Mobile Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Mobile Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:mobile_field_service:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
|
PYSEC-2021-315
| null |
nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade.
|
[] | null | null | null | null | null |
GHSA-jhw3-vp8x-97c7
|
Authorization Bypass Through User-Controlled Key vulnerability in ameliabooking Amelia allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Amelia: from n/a through 1.2.16.
|
[] | null | 5.3 | null | null | null |
|
CVE-2021-42839
|
Grand Vice info Co. webopac7 - Arbitrary File Upload
|
Grand Vice info Co. webopac7 file upload function fails to filter special characters. While logging in with general user’s permission, remote attackers can upload malicious script and execute arbitrary code to control the system or interrupt services.
|
[
"cpe:2.3:a:vice:webopac:1.8.20160701:*:*:*:*:*:*:*",
"cpe:2.3:a:vice:webopac:7.1.20160701:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2019-15451
|
The Samsung J3 Android device with a build fingerprint of samsung/j3y17ltedx/j3y17lte:8.0.0/R16NW/J330GDXS3BSC1:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=6010000, versionName=6.1.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.
|
[
"cpe:2.3:o:samsung:galaxy_j3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_j3:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2025-38279
|
bpf: Do not include stack ptr register in precision backtracking bookkeeping
|
In the Linux kernel, the following vulnerability has been resolved:
bpf: Do not include stack ptr register in precision backtracking bookkeeping
Yi Lai reported an issue ([1]) where the following warning appears
in kernel dmesg:
[ 60.643604] verifier backtracking bug
[ 60.643635] WARNING: CPU: 10 PID: 2315 at kernel/bpf/verifier.c:4302 __mark_chain_precision+0x3a6c/0x3e10
[ 60.648428] Modules linked in: bpf_testmod(OE)
[ 60.650471] CPU: 10 UID: 0 PID: 2315 Comm: test_progs Tainted: G OE 6.15.0-rc4-gef11287f8289-dirty #327 PREEMPT(full)
[ 60.654385] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[ 60.656682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 60.660475] RIP: 0010:__mark_chain_precision+0x3a6c/0x3e10
[ 60.662814] Code: 5a 30 84 89 ea e8 c4 d9 01 00 80 3d 3e 7d d8 04 00 0f 85 60 fa ff ff c6 05 31 7d d8 04
01 48 c7 c7 00 58 30 84 e8 c4 06 a5 ff <0f> 0b e9 46 fa ff ff 48 ...
[ 60.668720] RSP: 0018:ffff888116cc7298 EFLAGS: 00010246
[ 60.671075] RAX: 54d70e82dfd31900 RBX: ffff888115b65e20 RCX: 0000000000000000
[ 60.673659] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 00000000ffffffff
[ 60.676241] RBP: 0000000000000400 R08: ffff8881f6f23bd3 R09: 1ffff1103ede477a
[ 60.678787] R10: dffffc0000000000 R11: ffffed103ede477b R12: ffff888115b60ae8
[ 60.681420] R13: 1ffff11022b6cbc4 R14: 00000000fffffff2 R15: 0000000000000001
[ 60.684030] FS: 00007fc2aedd80c0(0000) GS:ffff88826fa8a000(0000) knlGS:0000000000000000
[ 60.686837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 60.689027] CR2: 000056325369e000 CR3: 000000011088b002 CR4: 0000000000370ef0
[ 60.691623] Call Trace:
[ 60.692821] <TASK>
[ 60.693960] ? __pfx_verbose+0x10/0x10
[ 60.695656] ? __pfx_disasm_kfunc_name+0x10/0x10
[ 60.697495] check_cond_jmp_op+0x16f7/0x39b0
[ 60.699237] do_check+0x58fa/0xab10
...
Further analysis shows the warning is at line 4302 as below:
4294 /* static subprog call instruction, which
4295 * means that we are exiting current subprog,
4296 * so only r1-r5 could be still requested as
4297 * precise, r0 and r6-r10 or any stack slot in
4298 * the current frame should be zero by now
4299 */
4300 if (bt_reg_mask(bt) & ~BPF_REGMASK_ARGS) {
4301 verbose(env, "BUG regs %x\n", bt_reg_mask(bt));
4302 WARN_ONCE(1, "verifier backtracking bug");
4303 return -EFAULT;
4304 }
With the below test (also in the next patch):
__used __naked static void __bpf_jmp_r10(void)
{
asm volatile (
"r2 = 2314885393468386424 ll;"
"goto +0;"
"if r2 <= r10 goto +3;"
"if r1 >= -1835016 goto +0;"
"if r2 <= 8 goto +0;"
"if r3 <= 0 goto +0;"
"exit;"
::: __clobber_all);
}
SEC("?raw_tp")
__naked void bpf_jmp_r10(void)
{
asm volatile (
"r3 = 0 ll;"
"call __bpf_jmp_r10;"
"r0 = 0;"
"exit;"
::: __clobber_all);
}
The following is the verifier failure log:
0: (18) r3 = 0x0 ; R3_w=0
2: (85) call pc+2
caller:
R10=fp0
callee:
frame1: R1=ctx() R3_w=0 R10=fp0
5: frame1: R1=ctx() R3_w=0 R10=fp0
; asm volatile (" \ @ verifier_precision.c:184
5: (18) r2 = 0x20202000256c6c78 ; frame1: R2_w=0x20202000256c6c78
7: (05) goto pc+0
8: (bd) if r2 <= r10 goto pc+3 ; frame1: R2_w=0x20202000256c6c78 R10=fp0
9: (35) if r1 >= 0xffe3fff8 goto pc+0 ; frame1: R1=ctx()
10: (b5) if r2 <= 0x8 goto pc+0
mark_precise: frame1: last_idx 10 first_idx 0 subseq_idx -1
mark_precise: frame1: regs=r2 stack= before 9: (35) if r1 >= 0xffe3fff8 goto pc+0
mark_precise: frame1: regs=r2 stack= before 8: (bd) if r2 <= r10 goto pc+3
mark_preci
---truncated---
|
[] | null | null | null | null | null |
GHSA-2vw6-vp5j-cgp9
|
finger .@host on some systems may print information on some user accounts.
|
[] | null | null | null | null | null |
|
CVE-2017-17560
|
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.
|
[
"cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:2.30.172:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-vwh6-r56v-wq74
|
The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with administrative privileges.
|
[] | null | 6.5 | null | null | null |
|
GHSA-m53q-66x7-v5m2
|
D-Link DAP-2622 DDP Configuration Backup Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20065.
|
[] | null | null | 8.8 | null | null |
|
GHSA-2xw8-j43j-5vxp
|
elgg is vulnerable to Cross-site Scripting
|
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
[] | null | 5.4 | null | null | null |
GHSA-p972-7w88-335j
|
A vulnerability has been found in PHPGurukul Online Library Management System 3.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/student-history.php. The manipulation of the argument stdid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2 | 3.5 | null | null | null |
|
GHSA-p57h-3968-wf74
|
Unspecified vulnerability in Futomi's CGI Cafe MP Form Mail CGI eCommerce 1.3.0 and earlier, and CGI Professional 3.2.2 and earlier, allows remote attackers to gain administrative privileges via unknown attack vectors.
|
[] | null | null | null | null | null |
|
GHSA-r2x9-77mc-c6x6
|
NVIDIA DGX A100 SBIOS contains a vulnerability where a local attacker can cause input validation checks to be bypassed by causing an integer overflow. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
|
[] | null | 6.6 | null | null | null |
|
CVE-2019-16263
|
The Twitter Kit framework through 3.4.2 for iOS does not properly validate the api.twitter.com SSL certificate. Although the certificate chain must contain one of a set of pinned certificates, there are certain implementation errors such as a lack of hostname verification. NOTE: this is an end-of-life product.
|
[
"cpe:2.3:a:twitter:twitter_kit:*:*:*:*:*:iphone_os:*:*"
] | null | 7.4 | null | 5.8 | null |
|
CVE-2006-0466
|
Cross-site scripting (XSS) vulnerability in search.asp in Goldstag Content Management System allows remote attackers to inject arbitrary web script or HTML via the text parameter.
|
[
"cpe:2.3:a:goldstag:goldstag_content_management_system:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4mgj-f599-w3j8
|
In the Linux kernel, the following vulnerability has been resolved:ublk: don't allow user copy for unprivileged deviceUBLK_F_USER_COPY requires userspace to call write() on ublk char
device for filling request buffer, and unprivileged device can't
be trusted.So don't allow user copy for unprivileged device.
|
[] | null | 5.5 | null | null | null |
|
CVE-2008-4644
|
hits.php in myWebland myStats allows remote attackers to bypass IP address restrictions via a modified X-Forwarded-For HTTP header.
|
[
"cpe:2.3:a:mywebland:mystats:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2014-0930
|
The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.
|
[
"cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.7 | null |
|
GHSA-4v38-964c-xjmw
|
Code injection via unescaped translations in xwiki-platform
|
ImpactIn XWiki, every user can add translations that are only applied to the current user. This also allows overriding existing translations. Such translations are often included in privileged contexts without any escaping which allows remote code execution for any user who has edit access on at least one document which could be the user's own profile where edit access is enabled by default.The following describes a proof of concept exploit to demonstrate this vulnerability:Edit the user profile with the wiki editor and set the content toUse the object editor to add an object of type `XWiki.TranslationDocumentClass` with scope `USER`.Open the document `WikiManager.AdminWikiDescriptorSheet`.The expected result would be that a message with title `{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}}` is displayed while in fact an error that the HTML macro couldn't be executed is displayed, followed by the text "hello from groovy!" and some raw HTML, showing that the Groovy macro has been executed.PatchesA mitigation for this vulnerability is part of XWiki 14.10.2 and XWiki 15.0 RC1: translations with user scope now require script right. This means that regular users cannot exploit this anymore as users don't have script right by default anymore starting with XWiki 14.10.WorkaroundsThere are no known workarounds apart from upgrading to a patched versions.Referenceshttps://jira.xwiki.org/browse/XWIKI-19749https://github.com/xwiki/xwiki-platform/commit/d06ff8a58480abc7f63eb1d4b8b366024d990643For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
|
[] | null | 9.9 | null | null | null |
cisco-sa-20180328-privesc2
|
Cisco IOS XE Software Privileged EXEC Mode Root Shell Access Vulnerability
|
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device.
The vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc2"]
|
[] | null | null | 6.7 | null | null |
GHSA-6r3p-fcvm-xh7c
|
SSRF vulnerability in Apache Airflow
|
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
|
[] | 6.9 | 5.3 | null | null | null |
CVE-2007-4488
|
Multiple cross-site scripting (XSS) vulnerabilities in the Siemens Gigaset SE361 WLAN router with firmware 1.00.0 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI immediately following the filename for (1) a GIF filename, which triggers display of the GIF file in text format and an unspecified denial of service (crash); or (2) the login.tri filename, which triggers a continuous loop of the browser attempting to visit the login page.
|
[
"cpe:2.3:h:siemens:gigaset_se361_wlan_router:0:firmware_1.00:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-28497
|
WordPress Slideshow Gallery Plugin <= 1.7.6 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Slideshow Gallery LITE plugin <= 1.7.6 versions.
|
[
"cpe:2.3:a:tribulant:slideshow_gallery:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2010-0748
|
Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.
|
[
"cpe:2.3:a:transmissionbt:transmission:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2023-6619
|
SourceCodester Simple Student Attendance System class_form.php sql injection
|
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /modals/class_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247256.
|
[
"cpe:2.3:a:oretnom23:simple_student_attendance_system:1.0:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 | null |
GHSA-9j6q-jggm-9g5w
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
|
[] | null | null | null | null | null |
|
GHSA-rvcc-mqg5-gqq5
|
Cross-site scripting (XSS) vulnerability in the live preview feature in the Markdown Preview module 6.x for Drupal allows remote attackers to inject arbitrary web script or HTML via "Markdown input."
|
[] | null | null | null | null | null |
|
GHSA-25vh-8m4m-9m4f
|
PVote before 1.9 does not authenticate users for restricted operations, which allows remote attackers to add or delete polls by modifying parameters to (1) add.php or (2) del.php.
|
[] | null | null | null | null | null |
|
CVE-2019-19516
|
Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.
|
[
"cpe:2.3:o:intelbras:wrn_150_firmware:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-rf2p-c3v5-v8fm
|
VMware ESXi contains an out-of-bounds read vulnerability. A
malicious actor with local administrative privileges on a virtual
machine with an existing snapshot may trigger an out-of-bounds read
leading to a denial-of-service condition of the host.
|
[] | null | 6.8 | null | null | null |
|
GHSA-m9ch-6hh2-gc9w
|
The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections.
|
[] | null | 6.5 | null | null | null |
|
cisco-sa-vsoln-arbfile-gtsEYxns
|
Cisco SD-WAN Software Arbitrary File Creation Vulnerability
|
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition.
The vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 8.4 | null | null | null |
GHSA-8x96-f2vc-6qpf
|
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
|
[] | null | null | null | null | null |
|
GHSA-c856-7jr3-wm6x
|
Multiple SQL injection vulnerabilities in Open Source Security Information Management (OSSIM) before 2.1.2 allow remote authenticated users to execute arbitrary SQL commands via the id_document parameter to (1) repository_document.php, (2) repository_links.php, and (3) repository_editdocument.php in repository/; the (4) group parameter to policy/getpolicy.php; the name parameter to (5) host/newhostgroupform.php and (6) net/modifynetform.php; and unspecified other vectors related to the policy menu.
|
[] | null | null | null | null | null |
|
CVE-2014-9094
|
Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter.
|
[
"cpe:2.3:a:digitalzoomstudio:video_gallery:-:*:*:*:*:wordpress:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-p3qx-72c8-xc9p
|
The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks.
|
[] | null | 5.4 | null | null | null |
|
CVE-2014-1477
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
] | null | 9.8 | null | 6.8 | null |
|
GHSA-q779-8rmm-x7qv
|
Buffer overflows in WS_FTP 2.02 allow remote attackers to execute arbitrary code via long arguments to (1) DELE, (2) MDTM, (3) MLST, (4) MKD, (5) RMD, (6) RNFR, (7) RNTO, (8) SIZE, (9) STAT, (10) XMKD, or (11) XRMD.
|
[] | null | null | null | null | null |
|
CVE-2020-2801
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. Note: The patch for this issue will address the vulnerability only if the WLS instance is using JDK 1.7.0_191 or later, or JDK 1.8.0_181 or later. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update191_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update191_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update201_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update211_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update211_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update221_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update221_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update221_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update221_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update231_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update241_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update271_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update281_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update281_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update291_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update291_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update301_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update311_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update331:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update341:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update341_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update343_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update51_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update55_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update55_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update55_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update55_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update60_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update60_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update65_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update67_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update67_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update72_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update72_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update72_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update76_b38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update79:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update80_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update80_b35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update85_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update85_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update85_b34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update91_b17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update91_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update91_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update95_b13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update95_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update95_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update97_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update97_b32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update97_b33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update99_b31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update182:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update331:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update341:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update345:*:*:enterprise_performance_pack:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
|
CVE-2016-20022
|
In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.
|
[] | null | 8.4 | null | null | null |
|
RHSA-2020:1264
|
Red Hat Security Advisory: systemd security and bug fix update
|
systemd: line splitting via fgets() allows for state injection during daemon-reexec systemd: out-of-bounds read when parsing a crafted syslog message
|
[
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 4.3 | null | null |
GHSA-p7mx-frqj-j9hq
|
Exploitation of session variables, resource IDs and other trusted credentials vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to exploit or harm a user's browser via reusing the exposed session token in the application URL.
|
[] | null | null | 6.3 | null | null |
|
CVE-2017-13713
|
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
|
[
"cpe:2.3:o:twsz:wifi_repeater_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:twsz:wifi_repeater:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2023-23874
|
WordPress Ditty Plugin <= 3.0.32 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Metaphor Creations Ditty plugin <= 3.0.32 versions.
|
[
"cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-6pp2-r37j-3rhq
|
Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
|
[] | null | null | null | null | null |
|
CVE-2008-0828
|
Multiple cross-site scripting (XSS) vulnerabilities in ATutor 1.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) attributes such as style and onmouseover in (a) forum post or (b) mail; or (2) the website field of the profile.
|
[
"cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.1:pl1:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.1:pl2:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atutor:atutor:1.5.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2019-11581
|
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 9.3 | null |
|
CVE-2022-26471
|
In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319121; Issue ID: ALPS07319121.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-r44h-hhf2-mhwp
|
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 does not disable the SSL 2.0 protocol, which makes it easier for remote attackers to conduct spoofing attacks by leveraging protocol weaknesses.
|
[] | null | null | null | null | null |
|
GHSA-p45f-4wjg-jj3v
|
A vulnerability classified as problematic has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /aboutadd.php of the component About Us Page. The manipulation of the argument aimage leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1 | 4.7 | null | null | null |
|
RHSA-2012:0478
|
Red Hat Security Advisory: samba security update
|
samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
|
[
"cpe:/o:redhat:rhel_els:4::as",
"cpe:/o:redhat:rhel_els:4::es"
] | null | null | null | null | null |
CVE-2022-3752
|
Rockwell Automation GuardLogix and ControlLogix controllers Vulnerable to Denial-Of-Service Attack
|
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic
loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload
the user project file to bring the device back online and continue normal operation.
|
[
"cpe:2.3:o:rockwellautomation:compactlogix_5480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compactlogix_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:guardlogix_5580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compact_guardlogix_5380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compact_guardlogix_5380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:compactlogix_5380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_5380:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | null | null |
cisco-sa-20190821-ucs-cimc
|
Cisco Integrated Management Controller Command Injection Vulnerability
|
A vulnerability in the Redfish protocol of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device.
The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending crafted authenticated commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands on an affected device with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-ucs-cimc"]
|
[] | null | null | 7.2 | null | null |
GHSA-3jfx-5w5g-hfh9
|
Stack-based buffer overflow in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow attackers to execute arbitrary code via a PDF file containing a malformed U3D model file with a crafted extension block.
|
[] | null | null | null | null | null |
|
CVE-2015-8890
|
platform/msm_shared/partition_parser.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate certain GUID Partition Table (GPT) data, which allows attackers to bypass intended access restrictions via a crafted MultiMediaCard (MMC), aka Android internal bug 28822878 and Qualcomm internal bug CR823461.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2025-37941
|
ASoC: codecs: wcd937x: fix a potential memory leak in wcd937x_soc_codec_probe()
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: codecs: wcd937x: fix a potential memory leak in wcd937x_soc_codec_probe()
When snd_soc_dapm_new_controls() or snd_soc_dapm_add_routes() fails,
wcd937x_soc_codec_probe() returns without releasing 'wcd937x->clsh_info',
which is allocated by wcd_clsh_ctrl_alloc. Add wcd_clsh_ctrl_free()
to prevent potential memory leak.
|
[] | null | null | null | null | null |
GHSA-wvjw-p9f5-vq28
|
Segfault in `tf.raw_ops.SparseCountSparseOutput`
|
ImpactPassing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault.PatchesWe have patched the issue in GitHub commit [82e6203221865de4008445b13c69b6826d2b28d9](https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
[] | 2 | 2.5 | null | null | null |
CVE-2020-0172
|
In Parse_art of eas_mdls.c, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127312550
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2014-8018
|
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur19630, and CSCur19661.
|
[
"cpe:2.3:a:cisco:unified_communications_domain_manager:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-6qmq-j47c-v4fj
|
The Email Subscribers by Icegram Express WordPress plugin before 5.7.45 does not sanitise and escape some of its Workflow settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
|
GHSA-qvh2-rg4v-27xj
|
The Embed Calendly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'calendly' shortcode in versions up to, and including, 3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2023-42793
|
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.