id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-j3pf-jvpq-m354
|
A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete specific type of files and/or cause denial of service.
|
[] | null | null | 7.1 | null | null |
|
CVE-2016-1411
|
A vulnerability in the update functionality of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Content Management Security Appliance (SMA) could allow an unauthenticated, remote attacker to impersonate the update server. More Information: CSCul88715, CSCul94617, CSCul94627. Known Affected Releases: 7.5.2-201 7.6.3-025 8.0.1-023 8.5.0-000 8.5.0-ER1-198 7.5.2-HP2-303 7.7.0-608 7.7.5-835 8.5.1-021 8.8.0-000 7.9.1-102 8.0.0-404 8.1.1-013 8.2.0-222. Known Fixed Releases: 8.0.2-069 8.0.2-074 8.5.7-042 9.1.0-032 8.5.2-027 9.6.1-019.
|
[
"cpe:2.3:a:cisco:content_security_management_appliance:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-004:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-031:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-033:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_security_management_appliance:9.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_security_management_appliance:9.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.5.2-201:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.5.2-hp2-303:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:7.6.3-025:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.0.1-023:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.0-er1-198:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:email_security_appliance:8.5.1-021:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:7.7.0-608:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:7.7.5-835:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.8.0-000:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 | null |
|
GHSA-4vq7-3qhw-47p6
|
An issue in the component /cgi-bin/GetJsonValue.cgi of Cellinx NVT Web Server 5.0.0.014 allows attackers to leak configuration information via a crafted POST request.
|
[] | null | 5.3 | null | null | null |
|
GHSA-mwh6-pccv-73w2
|
A vulnerability classified as problematic was found in Campcodes Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /admin/add_query_account.php. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 2 | 3.5 | null | null | null |
|
CVE-2025-54626
|
Pointer dangling vulnerability in the cjwindow module.
Impact: Successful exploitation of this vulnerability may affect function stability.
|
[] | null | 4.4 | null | null | null |
|
GHSA-g7g9-7hvj-xfqf
|
Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064
|
[] | null | 8.2 | null | null | null |
|
GHSA-xgmc-r4hm-4xx6
|
A vulnerability was found in Events Calendar Plugin. It has been declared as problematic. This vulnerability affects unknown code of the file post.php of the component Event Handler. The manipulation of the argument title/body leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212632.
|
[] | null | 6.1 | null | null | null |
|
CVE-2009-2238
|
Unrestricted file upload vulnerability in includes/shared_scripts/wysiwyg_editor/assetmanager/assetmanager.asp in DMXReady Registration Manager 1.1 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in assets/webblogmanager.
|
[
"cpe:2.3:a:dmxready:registration_manager:1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
PYSEC-2022-28
| null |
Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.
|
[] | null | null | null | null | null |
CVE-2019-8619
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2001-1501
|
The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
|
[
"cpe:2.3:a:proftpd_project:proftpd:1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-7550
|
A CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247 and prior that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition.
|
[
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2024-23873
|
Cross-Site Scripting (XSS) vulnerability in Cups Easy
|
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/currencymodify.php, in the currencyid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
|
[
"cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
ICSMA-23-103-01
|
B. Braun Battery Pack SP with Wi-Fi
|
An improper neutralization of directives in dynamically evaluated code vulnerability in the Wi-Fi Battery embedded web server versions L90/U70 and L92/U92 can be used to gain administrative access to the Wi-Fi communication module. An authenticated user, having access to both the medical device Wi-Fi network (such as a biomedical engineering staff member) and the specific B. Braun Battery Pack SP with Wi-Fi web server credentials, could gain administrative (root) access on the infusion pump communication module. This could be used as a vector to launch further attacks. CVE-2023-0888 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L).
|
[] | null | null | 5.5 | null | null |
CVE-2018-5269
|
In OpenCV 3.3.1, an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.
|
[
"cpe:2.3:a:opencv:opencv:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-h4fg-w6hc-gj2p
|
HP ArcSight Logger before 6.0 P2 does not limit attempts to authenticate to the SOAP interface, which makes it easier for remote attackers to obtain access via a brute-force approach.
|
[] | null | null | null | null | null |
|
GHSA-cvxv-497g-895g
|
Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables.
|
[] | null | null | null | null | null |
|
GHSA-rr2x-3m79-49mj
|
A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /user/search_result2.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-pj2p-xpf5-qc8h
|
Navarino Infinity web interface up to version 2.2 exposes an unauthenticated script that is prone to blind sql injection. If successfully exploited the user can get info from the underlying postgresql database that could lead into to total compromise of the product. The said script is available with no authentication.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-28826
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, macOS Monterey 12.7.4, macOS Sonoma 14.1, macOS Ventura 13.6.5. An app may be able to access sensitive user data.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-jmgw-6vjg-jjwg
|
actionpack Improper Input Validation vulnerability
|
`active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
|
[] | null | null | null | null | null |
CVE-2014-6222
|
Directory traversal vulnerability in IBM Marketing Operations 7.x and 8.x before 8.5.0.7.2, 8.6.x before 8.6.0.8, 9.0.x before 9.0.0.4.1, 9.1.0.x before 9.1.0.5, and 9.1.1.x before 9.1.1.2 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URL.
|
[
"cpe:2.3:a:ibm:marketing_operations:7.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:7.5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:8.6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_operations:9.1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-gqrr-x6f4-q53v
|
Unspecified vulnerability in the TIFF viewer (possibly libTIFF) in the Photo Viewer in the Sony PlaystationPortable (PSP) 2.00 through 2.80 allows local users to execute arbitrary code via crafted TIFF images. NOTE: due to lack of details, it is not clear whether this is related to other issues such as CVE-2006-3464 or CVE-2006-3465.
|
[] | null | null | null | null | null |
|
CVE-2022-26745
|
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.6.6. A malicious application may disclose restricted memory.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
RHSA-2022:0181
|
Red Hat Security Advisory: OpenShift Container Platform 4.6.54 extras and security update
|
log4j-core: remote code execution via JDBC Appender
|
[
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 6.6 | null | null | null |
CVE-2004-2041
|
PHP remote file inclusion vulnerability in secure_img_render.php in e107 0.615 allows remote attackers to execute arbitrary PHP code by modifying the p parameter to reference a URL on a remote web server that contains the code.
|
[
"cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-31402
|
The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.
|
[
"cpe:2.3:a:flutterchina:dio:*:*:*:*:*:dart:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-h59h-44cg-5vq7
|
A certain ActiveX control in adsiis.dll in Microsoft Internet Information Services (IIS) allows remote attackers to cause a denial of service (browser crash) via a long string in the second argument to the GetObject method. NOTE: this issue was disclosed by an unreliable researcher, so it might be incorrect.
|
[] | null | null | null | null | null |
|
CVE-2023-46998
|
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
|
[
"cpe:2.3:a:bootboxjs:bootbox:*:*:*:*:*:node.js:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2025-22252
|
A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
|
[
"cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortios:7.4.4:*:*:*:*:*:*:*"
] | null | 9 | null | null | null |
|
CVE-2025-26597
|
Xorg: xwayland: buffer overflow in xkbchangetypesofkey()
|
A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
|
[
"cpe:/o:redhat:enterprise_linux:10.0",
"cpe:/o:redhat:rhel_els:7",
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:8"
] | null | 7.8 | null | null | null |
GHSA-8g7p-j56f-qh5f
|
Affected Vertiv products do not properly protect webserver functions that could allow an attacker to bypass authentication.
|
[] | 9.3 | 9.8 | null | null | null |
|
GHSA-pfjg-27mr-2jhf
|
Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the doctor_contact parameter in doctorsearch.php.
|
[] | null | 8.8 | null | null | null |
|
GHSA-4jwq-xq2h-426q
|
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
|
[] | null | null | null | null | null |
|
CVE-2023-22280
|
MAHO-PBX NetDevancer Lite/Uni/Pro/Cloud prior to Ver.1.11.00, MAHO-PBX NetDevancer VSG Lite/Uni prior to Ver.1.11.00, and MAHO-PBX NetDevancer MobileGate Home/Office prior to Ver.1.11.00 allow a remote authenticated attacker with an administrative privilege to execute an arbitrary OS command.
|
[
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_firmware:*:*:*:*:lite:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer:-:*:*:*:lite:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_vsg_firmware:*:*:*:*:lite:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer_vsg:-:*:*:*:lite:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_mobilegate_firmware:*:*:*:*:home:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer_mobilegate:-:*:*:*:home:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_firmware:*:*:*:*:uni:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer:-:*:*:*:uni:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_firmware:*:*:*:*:pro:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer:-:*:*:*:pro:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_firmware:*:*:*:*:cloud:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer:-:*:*:*:cloud:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_vsg_firmware:*:*:*:*:uni:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer_vsg:-:*:*:*:uni:*:*:*",
"cpe:2.3:o:ate-mahoroba:maho-pbx_netdevancer_mobilegate_firmware:*:*:*:*:office:*:*:*",
"cpe:2.3:h:ate-mahoroba:maho-pbx_netdevancer_mobilegate:-:*:*:*:office:*:*:*"
] | null | 7.2 | null | null | null |
|
GHSA-2vx2-q9p6-5g67
|
The Similarity WordPress plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
|
[] | null | 4.3 | null | null | null |
|
GHSA-6wjq-cph5-rq6r
|
Memory leak in the senc_Parse function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input.
|
[] | null | null | null | null | null |
|
GHSA-767c-x22r-vwp4
|
FreeBSD port programs that use libkvm for FreeBSD 4.6.2-RELEASE and earlier, including (1) asmon, (2) ascpu, (3) bubblemon, (4) wmmon, and (5) wmnet2, leave open file descriptors for /dev/mem and /dev/kmem, which allows local users to read kernel memory.
|
[] | null | null | null | null | null |
|
RHSA-2019:2703
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Use-after-free in sound/usb/card.c:usb_audio_probe() kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c Kernel: KVM: nVMX: guest accesses L0 MSR causes potential DoS kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results kernel: brcmfmac frame validation bypass kernel: Count overflow in FUSE request leading to use-after-free issues. kernel: ppc: unrelated processes being able to read/write to each other's virtual memory
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | null | 7 | null | null |
RHSA-2021:3818
|
Red Hat Security Advisory: .NET 5.0 on RHEL 7 security and bugfix update
|
dotnet: System.DirectoryServices.Protocols.LdapConnection sends credentials in plaintext if TLS handshake fails
|
[
"cpe:/a:redhat:rhel_dotnet:5.0::el7"
] | null | 5.7 | null | null | null |
GHSA-f9vm-fr8w-hm2v
|
An integer overflow exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-29315
|
ThinkAdmin version v1 v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML.
|
[
"cpe:2.3:a:thinkadmin:thinkadmin:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:thinkadmin:thinkadmin:6.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 4.3 | null |
|
GHSA-589g-jvw3-2rm2
|
Cross-site scripting (XSS) vulnerability in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to inject arbitrary web script or HTML via the Name field to the New Host groups page, related to create, update, and destroy notification boxes.
|
[] | null | null | null | null | null |
|
CVE-2024-56565
|
f2fs: fix to drop all discards after creating snapshot on lvm device
|
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to drop all discards after creating snapshot on lvm device
Piergiorgio reported a bug in bugzilla as below:
------------[ cut here ]------------
WARNING: CPU: 2 PID: 969 at fs/f2fs/segment.c:1330
RIP: 0010:__submit_discard_cmd+0x27d/0x400 [f2fs]
Call Trace:
__issue_discard_cmd+0x1ca/0x350 [f2fs]
issue_discard_thread+0x191/0x480 [f2fs]
kthread+0xcf/0x100
ret_from_fork+0x31/0x50
ret_from_fork_asm+0x1a/0x30
w/ below testcase, it can reproduce this bug quickly:
- pvcreate /dev/vdb
- vgcreate myvg1 /dev/vdb
- lvcreate -L 1024m -n mylv1 myvg1
- mount /dev/myvg1/mylv1 /mnt/f2fs
- dd if=/dev/zero of=/mnt/f2fs/file bs=1M count=20
- sync
- rm /mnt/f2fs/file
- sync
- lvcreate -L 1024m -s -n mylv1-snapshot /dev/myvg1/mylv1
- umount /mnt/f2fs
The root cause is: it will update discard_max_bytes of mounted lvm
device to zero after creating snapshot on this lvm device, then,
__submit_discard_cmd() will pass parameter @nr_sects w/ zero value
to __blkdev_issue_discard(), it returns a NULL bio pointer, result
in panic.
This patch changes as below for fixing:
1. Let's drop all remained discards in f2fs_unfreeze() if snapshot
of lvm device is created.
2. Checking discard_max_bytes before submitting discard during
__submit_discard_cmd().
|
[] | null | null | null | null | null |
CVE-2024-49001
|
SQL Server Native Client Remote Code Execution Vulnerability
|
SQL Server Native Client Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*"
] | null | 8.8 | null | null | null |
GHSA-mx3j-v3jg-vhf7
|
An intent redirection vulnerability in the Mi Browser product. This vulnerability is caused by the Mi Browser does not verify the validity of the incoming data. Attackers can perform sensitive operations by exploiting this.
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-13297
|
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] | null | 3.8 | null | null | null |
|
GHSA-4546-c7q2-w4p5
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
CVE-2015-1676
|
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2007-2889
|
SQL injection vulnerability in tracking/courseLog.php in Dokeos 1.6.5 and earlier allows remote attackers to execute arbitrary SQL commands via the scormcontopen parameter.
|
[
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.4_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6_rc2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wv7w-fgmw-6vg2
|
A type confusion issue was addressed with improved state handling. This issue is fixed in watchOS 11.5, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
|
[] | null | 4.3 | null | null | null |
|
CVE-2007-4813
|
Cross-site scripting (XSS) vulnerability in Domino Blogsphere 3.01 Beta 7 allows remote attackers to inject arbitrary web script or HTML via the name field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:domino_blogsphere:domino_blogsphere:3.01_beta7:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-48288
|
TP-Link TL-IPC42C V4.0_20211227_1.0.16 is vulnerable to command injection due to the lack of malicious code verification on both the frontend and backend.
|
[
"cpe:2.3:o:tp-link:tl-ipc42c_firmware:1.0.06.002:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2024-51621
|
WordPress Download-Mirror-Counter plugin <= 1.1 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Reza Sh Download-Mirror-Counter allows SQL Injection.This issue affects Download-Mirror-Counter: from n/a through 1.1.
|
[] | null | 8.5 | null | null | null |
CVE-2011-3444
|
Address Book in Apple Mac OS X before 10.7.3 automatically switches to unencrypted sessions upon failure of encrypted connections, which allows remote attackers to read CardDAV data by terminating an encrypted connection and then sniffing the network.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2023-31976
|
libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c.
|
[
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2022-49417
|
iwlwifi: mei: fix potential NULL-ptr deref
|
In the Linux kernel, the following vulnerability has been resolved:
iwlwifi: mei: fix potential NULL-ptr deref
If SKB allocation fails, continue rather than using the NULL
pointer.
Coverity CID: 1497650
|
[] | null | null | null | null | null |
CVE-2022-46280
|
A use of uninitialized pointer vulnerability exists in the PQS format pFormat functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
[
"cpe:2.3:a:openbabel:open_babel:3.1.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-fh68-7wjw-wh96
|
There is a heap-based buffer overflow in the Image::printIFDStructure function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.
|
[] | null | null | 6.5 | null | null |
|
GHSA-3rgg-fv5r-qj8f
|
In the Linux kernel, the following vulnerability has been resolved:scsi: qla2xxx: Fix double free of fcportThe server was crashing after LOGO because fcport was getting freed twice.-----------[ cut here ]-----------
kernel BUG at mm/slub.c:371!
invalid opcode: 0000 1 SMP PTI
CPU: 35 PID: 4610 Comm: bash Kdump: loaded Tainted: G OE --------- - - 4.18.0-425.3.1.el8.x86_64 #1
Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021
RIP: 0010:set_freepointer.part.57+0x0/0x10
RSP: 0018:ffffb07107027d90 EFLAGS: 00010246
RAX: ffff9cb7e3150000 RBX: ffff9cb7e332b9c0 RCX: ffff9cb7e3150400
RDX: 0000000000001f37 RSI: 0000000000000000 RDI: ffff9cb7c0005500
RBP: fffff693448c5400 R08: 0000000080000000 R09: 0000000000000009
R10: 0000000000000000 R11: 0000000000132af0 R12: ffff9cb7c0005500
R13: ffff9cb7e3150000 R14: ffffffffc06990e0 R15: ffff9cb7ea85ea58
FS: 00007ff6b79c2740(0000) GS:ffff9cb8f7ec0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b426b7d700 CR3: 0000000169c18002 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
kfree+0x238/0x250
qla2x00_els_dcmd_sp_free+0x20/0x230 [qla2xxx]
? qla24xx_els_dcmd_iocb+0x607/0x690 [qla2xxx]
qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx]
? qla2x00_issue_logo+0x28c/0x2a0 [qla2xxx]
? kernfs_fop_write+0x11e/0x1a0Remove one of the free calls and add check for valid fcport. Also use
function qla2x00_free_fcport() instead of kfree().
|
[] | null | 7.8 | null | null | null |
|
GHSA-83f5-53jx-3mvf
|
CloudForms Management Engine before 5.8 includes a default SSL/TLS certificate.
|
[] | null | null | 7.5 | null | null |
|
GHSA-qc9v-r7rw-wvm2
|
Insecure storage of device information in Contacts prior to version 12.7.05.24 allows attacker to get Samsung Account ID.
|
[] | null | null | null | null | null |
|
CVE-2000-1217
|
Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unlimited number of login attempts, aka the "Domain Account Lockout" vulnerability.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-3cf2-x423-x582
|
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
|
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
|
[] | null | 6.5 | null | null | null |
CVE-2007-0504
|
Eval injection vulnerability in poll_frame.php in Vote! Pro 4.0, and possibly other scripts, allows remote attackers to execute arbitrary code via the poll_id parameter, which is supplied to an eval function call, a different vulnerability type than CVE-2005-4632.
|
[
"cpe:2.3:a:vote_pro:vote_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-4v6g-m96g-x25q
|
Stack-based buffer overflow in the get_key function in parse.c in abcm2ps through 8.13.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[] | null | null | 9.8 | null | null |
|
RHSA-2023:6346
|
Red Hat Security Advisory: toolbox security and bug fix update
|
go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding golang: net/http, mime/multipart: denial of service from excessive resource consumption golang: net/http, net/textproto: denial of service from excessive memory allocation golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption golang: html/template: backticks not treated as string delimiters golang: html/template: improper sanitization of CSS values golang: html/template: improper handling of JavaScript whitespace golang: html/template: improper handling of empty HTML attributes golang: net/http: insufficient sanitization of Host header
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 6.5 | null | null | null |
GHSA-f2rm-99fw-5555
|
Barco wePresent WiPG-1600W devices have Unprotected Transport of Credentials. Affected Version(s): 2.5.1.8. An attacker armed with hardcoded API credentials (retrieved by exploiting CVE-2020-28329) can issue an authenticated query to display the admin password for the main web user interface listening on port 443/tcp of a Barco wePresent WiPG-1600W device.
|
[] | null | null | null | null | null |
|
GHSA-rqjf-c9wc-25vr
|
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier and ZoneAlarm Pro 2.6 and 2.4 does not block prohibited file types with long file names, which allows remote attackers to send potentially dangerous attachments.
|
[] | null | null | null | null | null |
|
GHSA-vx4g-vvxx-q2r4
|
The Fling Gold (aka com.mbgames.fling.gold) application 1.1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2024-50098
|
scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
There is a history of deadlock if reboot is performed at the beginning
of booting. SDEV_QUIESCE was set for all LU's scsi_devices by UFS
shutdown, and at that time the audio driver was waiting on
blk_mq_submit_bio() holding a mutex_lock while reading the fw binary.
After that, a deadlock issue occurred while audio driver shutdown was
waiting for mutex_unlock of blk_mq_submit_bio(). To solve this, set
SDEV_OFFLINE for all LUs except WLUN, so that any I/O that comes down
after a UFS shutdown will return an error.
[ 31.907781]I[0: swapper/0: 0] 1 130705007 1651079834 11289729804 0 D( 2) 3 ffffff882e208000 * init [device_shutdown]
[ 31.907793]I[0: swapper/0: 0] Mutex: 0xffffff8849a2b8b0: owner[0xffffff882e28cb00 kworker/6:0 :49]
[ 31.907806]I[0: swapper/0: 0] Call trace:
[ 31.907810]I[0: swapper/0: 0] __switch_to+0x174/0x338
[ 31.907819]I[0: swapper/0: 0] __schedule+0x5ec/0x9cc
[ 31.907826]I[0: swapper/0: 0] schedule+0x7c/0xe8
[ 31.907834]I[0: swapper/0: 0] schedule_preempt_disabled+0x24/0x40
[ 31.907842]I[0: swapper/0: 0] __mutex_lock+0x408/0xdac
[ 31.907849]I[0: swapper/0: 0] __mutex_lock_slowpath+0x14/0x24
[ 31.907858]I[0: swapper/0: 0] mutex_lock+0x40/0xec
[ 31.907866]I[0: swapper/0: 0] device_shutdown+0x108/0x280
[ 31.907875]I[0: swapper/0: 0] kernel_restart+0x4c/0x11c
[ 31.907883]I[0: swapper/0: 0] __arm64_sys_reboot+0x15c/0x280
[ 31.907890]I[0: swapper/0: 0] invoke_syscall+0x70/0x158
[ 31.907899]I[0: swapper/0: 0] el0_svc_common+0xb4/0xf4
[ 31.907909]I[0: swapper/0: 0] do_el0_svc+0x2c/0xb0
[ 31.907918]I[0: swapper/0: 0] el0_svc+0x34/0xe0
[ 31.907928]I[0: swapper/0: 0] el0t_64_sync_handler+0x68/0xb4
[ 31.907937]I[0: swapper/0: 0] el0t_64_sync+0x1a0/0x1a4
[ 31.908774]I[0: swapper/0: 0] 49 0 11960702 11236868007 0 D( 2) 6 ffffff882e28cb00 * kworker/6:0 [__bio_queue_enter]
[ 31.908783]I[0: swapper/0: 0] Call trace:
[ 31.908788]I[0: swapper/0: 0] __switch_to+0x174/0x338
[ 31.908796]I[0: swapper/0: 0] __schedule+0x5ec/0x9cc
[ 31.908803]I[0: swapper/0: 0] schedule+0x7c/0xe8
[ 31.908811]I[0: swapper/0: 0] __bio_queue_enter+0xb8/0x178
[ 31.908818]I[0: swapper/0: 0] blk_mq_submit_bio+0x194/0x67c
[ 31.908827]I[0: swapper/0: 0] __submit_bio+0xb8/0x19c
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2024:0040
|
Red Hat Security Advisory: OpenShift Container Platform 4.16.0 security and extras update
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON cloudevents/sdk-go: usage of WithRoundTripper to create a Client leaks credentials
|
[
"cpe:/a:redhat:openshift:4.16::el8",
"cpe:/a:redhat:openshift:4.16::el9"
] | null | 6.5 | null | null | null |
GHSA-25f3-f9ww-ghq4
|
The Administrator Service component of TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center, and TIBCO Managed File Transfer Internet Server contains vulnerabilities where an authenticated user with specific privileges can gain access to credentials to other systems. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Command Center: versions up to and including 7.3.2; 8.0.0; 8.0.1; 8.0.2; 8.1.0, and TIBCO Managed File Transfer Internet Server: versions up to and including 7.3.2; 8.0.0; 8.0.1; 8.0.2; 8.1.0.
|
[] | null | null | 9.9 | null | null |
|
RHSA-2024:4464
|
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.10.4 security updates and bug fixes
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS braces: fails to limit the number of characters it can handle
|
[
"cpe:/a:redhat:acm:2.10::el9"
] | null | 7.5 | null | null | null |
GHSA-8226-xx72-qrh6
|
The Expressway component in Cisco TelePresence Video Communication Server (VCS) uses the same default X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship, aka Bug ID CSCue07471.
|
[] | null | null | null | null | null |
|
GHSA-2247-rcg6-4977
|
Cross-site scripting (XSS) vulnerability in PHPPageProtect 1.0.0a allows remote attackers to inject arbitrary web script or HTML via the username parameter to (1) admin.php or (2) login.php.
|
[] | null | null | null | null | null |
|
CVE-2016-2031
|
Multiple vulnerabilities exists in Aruba Instate before 4.1.3.0 and 4.2.3.1 due to insufficient validation of user-supplied input and insufficient checking of parameters, which could allow a malicious user to bypass security restrictions, obtain sensitive information, perform unauthorized actions and execute arbitrary code.
|
[
"cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:aruba_instant:4.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-qh62-99w2-xfq5
|
A SQL Injection vulnerability was identified in the admin/edit-directory.php file of the PHPGurukul Directory Management System v2.0. Attackers can exploit this vulnerability via the email parameter in a POST request to execute arbitrary SQL commands.
|
[] | null | 5.3 | null | null | null |
|
CVE-2019-20222
|
In Support Incident Tracker (SiT!) 3.67, the Short Application Name and Application Name inputs in the config.php page are affected by XSS.
|
[
"cpe:2.3:a:sitracker:support_incident_tracker:3.67:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-3hjv-h99c-wghr
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2025-3411
|
mymagicpower AIAS AsrController.java server-side request forgery
|
A vulnerability, which was classified as critical, has been found in mymagicpower AIAS 20250308. This issue affects some unknown processing of the file 3_api_platform/api-platform/src/main/java/top/aias/platform/controller/AsrController.java. The manipulation of the argument url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-r5cc-6x6f-2359
|
Music daemon (musicd) 0.0.3 and earlier allows remote attackers to read arbitrary files by calling LOAD with a full pathname, then calling SHOWLIST.
|
[] | null | null | null | null | null |
|
GHSA-9775-74j2-3355
|
Multiple unspecified vulnerabilities in Oracle Application Server 9.0.4.3 and 10.1.2.0.0, and Collaboration Suite 9.0.4.2, have unknown impact and attack vectors related to Oracle Containers for J2EE, aka (1) OC4J03 and (2) OC4J04.
|
[] | null | null | null | null | null |
|
GHSA-m556-c46g-q894
|
Cross-site request forgery (CSRF) vulnerability in commonsettings.php in AlstraSoft Site Uptime Enterprise, possibly 5.4, allows remote attackers to hijack the authentication of administrators.
|
[] | null | null | null | null | null |
|
GHSA-wr8q-hg3q-6xfh
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
GHSA-7vrp-3pff-c3j4
|
OpenCart Stored Cross-Site Scripting
|
OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. An admin can upload a profile image as a malicious code using JavaScript. Whenever anyone will see the profile picture, the code will execute and XSS will trigger.
|
[] | null | 4.8 | null | null | null |
GHSA-5cgp-g38q-m4xj
|
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
|
[] | null | 8.8 | null | null | null |
|
GHSA-67j5-x65h-gpp7
|
Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Login). Supported versions that are affected are 7.x, 8.0.x and 8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Argus Safety. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Argus Safety accessible data as well as unauthorized update, insert or delete access to some of Oracle Argus Safety accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).
|
[] | null | null | 8.2 | null | null |
|
CVE-2011-1143
|
epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-r62r-xg8x-42v8
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in woobox Woobox allows Stored XSS. This issue affects Woobox: from n/a through 1.6.
|
[] | null | 6.5 | null | null | null |
|
CVE-2018-0871
|
An information disclosure vulnerability exists when Edge improperly marks files, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8234.
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4.3 | null |
|
CVE-2018-17199
|
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
|
[
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
RHSA-2014:0100
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: exec/ptrace: get_dumpable() incorrect tests kernel: perf/ftrace: insufficient check in perf_trace_event_perm() kernel: net: permissions flaw in /proc/sys/net Kernel: net: memory corruption with UDP_CORK and UFO Kernel: drivers: libertas: potential oops in debugfs Kernel: AACRAID Driver compat IOCTL missing capability check kernel: net: fib: fib6_add: potential NULL pointer dereference
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null | null |
CVE-2006-2333
|
Multiple SQL injection vulnerabilities in MyBB (aka MyBulletinBoard) 1.1.1 allow remote attackers to execute arbitrary SQL commands via the e-mail address when registering for a forum that requires e-mail verification, which is not properly handled in (1) usercp.php and (2) member.php.
|
[
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2024-29020
|
JumpServer allows nn authorized attacker to get sensitive information in playbook files when playbook_id is leaked
|
JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.
|
[
"cpe:2.3:a:fit2cloud:jumpserver:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
GHSA-j5rv-6w5m-gxm6
|
Multiple cross-site scripting (XSS) vulnerabilities in submit.php in PHP-Fusion before 6.01.3 allow remote attackers to inject arbitrary web script or HTML by using edit_profile.php to upload a (1) avatar or (2) forum image attachment that has a .gif or .jpg extension, and begins with a GIF header followed by JavaScript code, which is executed by Internet Explorer.
|
[] | null | null | null | null | null |
|
GHSA-rqch-2mmw-28wc
|
A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2003-0672
|
Format string vulnerability in pam-pgsql 0.5.2 and earlier allows remote attackers to execute arbitrary code via the username that isp rovided during authentication, which is not properly handled when recording a log message.
|
[
"cpe:2.3:a:leon_j_breedt:pam-pgsql:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:leon_j_breedt:pam-pgsql:0.5.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2016-0865
|
Tollgrade SmartGrid LightHouse Sensor Management System (SMS) Software EMS before 5.1, and 4.1.0 Build 16, allows remote authenticated users to change arbitrary passwords via unspecified vectors.
|
[
"cpe:2.3:a:tollgrade:smartgrid_lighthouse_sensor_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tollgrade:smartgrid_lighthouse_sensor_management_system:4.1.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
CVE-2008-3583
|
Buffer overflow in the HTML parser in IntelliTamper 2.07 allows remote attackers to execute arbitrary code via a long URL in the SRC attribute of an IMG element. NOTE: this might be related to CVE-2008-3360. NOTE: it was later reported that 2.08 Beta 4 is also affected.
|
[
"cpe:2.3:a:intellitamper:intellitamper:2.0.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.