id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2023-3113
|
An unauthenticated XML external entity injection (XXE) vulnerability exists in LXCA's Common Information Model (CIM) server that could result in read-only access to specific files.
|
[
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-vrg2-5ghr-57mf
|
Multiple cross-site scripting (XSS) vulnerabilities in Xavi X7968 allow remote attackers to inject arbitrary web script or HTML via the (1) pvcName parameter to webconfig/wan/confirm.html/confirm or (2) host_name_txtbox parameter to webconfig/lan/lan_config.html/local_lan_config.
|
[] | null | null | null | null | null |
|
GHSA-5572-2439-pvwc
|
SonicOS post-authentication Improper Privilege Management vulnerability in the SonicOS SSL VPN Tunnel allows users to elevate their privileges inside the tunnel.
|
[] | null | 8.8 | null | null | null |
|
GHSA-j6v8-rcm6-wxr2
|
Rendering of HTML provided by another authenticated user is possible in browser on M-Files Web before 22.12.12140.3. This allows the content to steal user sensitive information. This issue affects M-Files New Web: before 22.12.12140.3.
|
[] | null | 7.6 | null | null | null |
|
CVE-2013-0111
|
daemonu.exe (aka the NVIDIA Update Service Daemon), as distributed with the NVIDIA driver before 307.78, and Release 310 before 311.00, on Windows, lacks " (double quote) characters in the service path, which allows local users to gain privileges via a Trojan horse program.
|
[
"cpe:2.3:a:nvidia:driver:*:-:*:*:*:windows:*:*",
"cpe:2.3:a:nvidia:driver:310.00:-:*:*:*:windows:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-r3qq-5r3j-gr4c
|
Resource leak vulnerability in ASR180x、ASR190x in con_mgr allows Resource Leak Exposure.This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
|
[] | null | 5.4 | null | null | null |
|
CVE-2020-8223
|
A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves.
|
[
"cpe:2.3:a:nextcloud:nextcloud_server:19.0.0:-:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.5 | null |
|
GHSA-9fhg-4mh8-g5rc
|
A vulnerability, which was classified as problematic, was found in atjiu pybbs up to 6.0.0. This affects an unknown part of the file /api/settings of the component Admin Panel. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
|
[] | 1.9 | 2.4 | null | null | null |
|
CVE-2017-1375
|
IBM System Storage Storwize V7000 Unified (V7000U) 1.5 and 1.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 126868.
|
[
"cpe:2.3:a:ibm:storwize_unified_v7000_software:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:storwize_unified_v7000_software:1.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-r578-pj6f-r4ff
|
Auto-merging Person Records Compromised
|
ImpactNew user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events).PatchesWe have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details.WorkaroundsIf you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | 8.8 | null | null | null |
GHSA-6q2p-wm97-x79g
|
In bluetooth driver, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-27304
|
Operation restriction bypass vulnerability in Message and Bulletin of Cybozu Garoon 4.6.0 to 5.9.2 allows a remote authenticated attacker to alter the data of Message and/or Bulletin.
|
[
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-h3pf-mvgp-g8g3
|
In Knox SDS IAM (Identity Access Management) and EMM (Enterprise Mobility Management) 16.11 on Samsung mobile devices, a man-in-the-middle attacker can install any application into the Knox container (without the user's knowledge) by inspecting network traffic from a Samsung server and injecting content at a certain point in the update sequence. This installed application can further leak information stored inside the Knox container to the outside world.
|
[] | null | null | 5.9 | null | null |
|
CVE-2021-32951
|
Advantech WebAccess/NMS Improper Authentication
|
WebAccess/NMS (Versions prior to v3.0.3_Build6299) has an improper authentication vulnerability, which may allow unauthorized users to view resources monitored and controlled by the WebAccess/NMS, as well as IP addresses and names of all the devices managed via WebAccess/NMS.
|
[
"cpe:2.3:a:advantech:webaccess\\/nms:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2025-30100
|
Dell Alienware Command Center 6.x, versions prior to 6.7.37.0 contain an Improper Access Control Vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
|
[] | null | 6.7 | null | null | null |
|
GHSA-66qc-59q2-vv7v
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
|
[] | null | 5.5 | null | null | null |
|
GHSA-hcw9-2264-5v6x
|
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
[] | null | null | 8.8 | null | null |
|
ICSA-21-040-08
|
Siemens SIMARIS Configuration (Update A)
|
During installation to default target folder, incorrect permissions are configured for the application folder and subfolders, which may allow an attacker to gain persistence or potentially escalate privileges if a user with elevated credentials logs onto the machine.CVE-2020-28392 has been assigned to this vulnerability. A CVSS v3 base score of 4.4 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).
|
[] | null | null | 4.4 | null | null |
GHSA-xcfc-fhv2-9grh
|
An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiOS SSL-VPN versions 7.2.0, versions 7.0.0 through 7.0.6 and versions 6.4.0 through 6.4.9 may allow a remote unauthenticated attacker to gain information about LDAP and SAML settings configured in FortiOS.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6g2j-hjvm-jvwm
|
plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
|
[] | null | null | null | null | null |
|
CVE-2024-41857
|
Illustrator | Integer Underflow (Wrap or Wraparound) (CWE-191)
|
Illustrator versions 28.6, 27.9.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2025-48237
|
WordPress Wishlist for WooCommerce <= 3.2.2 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Wishlist for WooCommerce allows Stored XSS. This issue affects Wishlist for WooCommerce: from n/a through 3.2.2.
|
[] | null | 6.5 | null | null | null |
GHSA-gfq7-h592-v3xj
|
Insecure AES key in Yealink Configuration Encrypt Tool below verrsion 1.2. A single, vendorwide, hardcoded AES key in the configuration tool used to encrypt provisioning documents was leaked leading to a compromise of confidentiality of provisioning documents.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-16768
|
Internal exception message exposure for login action in Sylius
|
In affected versions of Sylius, exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation message with the exception details will be presented to the user when one will try to log into the shop. This has been patched in versions 1.3.14, 1.4.10, 1.5.7, and 1.6.3.
|
[
"cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*"
] | null | 3.5 | null | null | null |
GHSA-cg79-98m6-5fvc
|
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Workcenter). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | null | 6.1 | null | null |
|
CVE-2005-0142
|
Firefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF.
|
[
"cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2011-3825
|
Zend Framework 1.11.3 in Zend Server CE 5.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Validate.php and certain other files.
|
[
"cpe:2.3:a:zend:framework:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:server:5.1.0:*:ce:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2010-3803
|
Integer overflow in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2010-4919
|
SQL injection vulnerability in detail.asp in Micronetsoft RV Dealer Website 1.0 allows remote attackers to execute arbitrary SQL commands via the vehicletypeID parameter.
|
[
"cpe:2.3:a:micronetsoft:rv_dealer_website:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-6359
|
Cross-Site Scripting in Alumne LMS
|
A Cross-Site Scripting (XSS) vulnerability has been found in Alumne LMS affecting version 4.0.0.1.08. An attacker could exploit the 'localidad' parameter to inject a custom JavaScript payload and partially take over another user's browser session, due to the lack of proper sanitisation of the 'localidad' field on the /users/editmy page.
|
[
"cpe:2.3:a:grupoalumne:alumne_lms:4.0.0.1.08:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-jg48-pfjv-c72h
|
The Coca-Cola FM Peru (aka com.enyetech.radio.coca_cola.fm_pe) application 2.0.41716 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-jgqm-9prw-2qr6
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InstaWP Team InstaWP Connect – 1-click WP Staging & Migration.This issue affects InstaWP Connect – 1-click WP Staging & Migration: from n/a through 0.1.0.9.
|
[] | null | 8.5 | null | null | null |
|
GHSA-hwxq-q96q-4j44
|
A stored cross-site scripting (XSS) vulnerability in the Site Setup module of SEACMS v12.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
[] | null | 5.4 | null | null | null |
|
GHSA-phg3-p745-m685
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Dazzlersoft Team Members Showcase plugin <= 1.3.4 versions.
|
[] | null | 5.9 | null | null | null |
|
PYSEC-2021-370
| null |
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.
|
[] | null | null | null | null | null |
CVE-2016-9061
|
A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox < 50.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2012-0698
|
tcsd in TrouSerS before 0.3.10 allows remote attackers to cause a denial of service (daemon crash) via a crafted type_offset value in a TCP packet to port 30003.
|
[
"cpe:2.3:a:trustedcomputinggroup:trousers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:trustedcomputinggroup:trousers:0.3.8:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-32v2-2r5f-wqr9
|
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'vpn schedule name1 WORD name2 WORD policy (failover|backup) description (WORD|null)' command template.
|
[] | null | 7.2 | null | null | null |
|
GHSA-2gwq-qf7f-gj9c
|
Unspecified vulnerability in the NetEase CloudAlbum (com.netease.cloudalbum) application 2.0.0 and 2.2.0 for Android has unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2015-1821
|
Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
|
[
"cpe:2.3:a:tuxfamily:chrony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
GHSA-43qr-pjmr-cgfv
|
Netgate pfSense CE (prior to 2.8.0 beta release) and corresponding Plus builds is vulnerable to Cross Site Scripting (XSS) in widgets/log.widget.php.
|
[] | null | 5.4 | null | null | null |
|
GHSA-x2jc-pwfj-h9p3
|
SQL Injection in sequelize
|
Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability.RecommendationUpdate to version 1.7.0-alpha3 or later.
|
[] | null | null | null | null | null |
GHSA-ch7x-55jf-9fgx
|
libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.
|
[] | null | 6.5 | null | null | null |
|
GHSA-6fmv-c3mq-xjpq
|
In the Linux kernel, the following vulnerability has been resolved:nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()nfcmrvl_i2c_nci_send() will be called by nfcmrvl_nci_send(), and skb
should be freed in nfcmrvl_i2c_nci_send(). However, nfcmrvl_nci_send()
will only free skb when i2c_master_send() return >=0, which means skb
will memleak when i2c_master_send() failed. Free skb no matter whether
i2c_master_send() succeeds.
|
[] | null | 5.5 | null | null | null |
|
GHSA-8g9x-2rqx-hwvf
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app may be able to execute arbitrary code with kernel privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2014-8118
|
Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
|
[
"cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.2\\/a:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.0.:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.5.90:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rpm:rpm:4.10.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-vcqj-cmgh-j5h7
|
Buffer overflow in dbsnmp in Oracle 8.0.6 through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable.
|
[] | null | null | null | null | null |
|
GHSA-v45m-vhm5-hj52
|
There is a command injection vulnerability in Huawei terminal printer product. Successful exploitation could result in the highest privileges of the printer. (Vulnerability ID: HWPSIRT-2022-51773)This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2022-32203.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-47112
|
7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.
|
[] | null | 2.5 | null | null | null |
|
RHSA-2025:10110
|
Red Hat Security Advisory: sudo security update
|
sudo: LPE via host option
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | null | null | null |
GHSA-jqx5-64jc-mg47
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
|
[] | null | null | null | null | null |
|
GHSA-cqv8-rcm7-jhxx
|
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
[] | null | 7.2 | null | null | null |
|
CVE-2017-10316
|
Vulnerability in the Oracle Hospitality Suite8 component of Oracle Hospitality Applications (subcomponent: WebConnect). Supported versions that are affected are 8.10.1 and 8.10.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Suite8 accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:hospitality_suite8:8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_suite8:8.10.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
RHSA-2023:7653
|
Red Hat Security Advisory: Service Registry (container images) release and security update [2.5.4 GA]
|
quarkus-oidc: ID and access tokens leak via the authorization code flow quarkus: HTTP security policy bypass snappy-java: Unchecked chunk length leads to DoS netty: SniHandler 16MB allocation leads to OOM HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:service_registry:2.5"
] | null | 7.5 | null | null | null |
CVE-2024-40472
|
Sourcecodester Daily Calories Monitoring Tool v1.0 is vulnerable to SQL Injection via "delete-calorie.php."
|
[
"cpe:2.3:a:sourcecodester:daily_calories_monitoring_tool:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rems:daily_calories_monitoring_tool:1.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2024-2038
|
Visual Website Collaboration, Feedback & Project Management – Atarim <= 3.22.6 - Hardcoded Credentials
|
The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 3.22.6. This is due to the use of hardcoded credentials to authenticate all the incoming API requests. This makes it possible for unauthenticated attackers to modify plugin settings, delete posts, modify post titles, and upload images.
|
[
"cpe:2.3:a:atarim:visual_collaboration:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
GHSA-fmgp-qj82-6c8w
|
MailEnable before 8.60 allows Privilege Escalation because admin accounts could be created as a consequence of %0A mishandling in AUTH.TAB after a password-change request.
|
[] | null | null | 9.8 | null | null |
|
GHSA-vr5f-v75p-g4qw
|
In the Linux kernel, the following vulnerability has been resolved:iommu/amd: Clear DMA ops when switching domainSince commit 08a27c1c3ecf ("iommu: Add support to change default domain
of an iommu group") a user can switch a device between IOMMU and direct
DMA through sysfs. This doesn't work for AMD IOMMU at the moment because
dev->dma_ops is not cleared when switching from a DMA to an identity
IOMMU domain. The DMA layer thus attempts to use the dma-iommu ops on an
identity domain, causing an oops:echo 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/unbindecho identity > /sys/bus/pci/devices/0000:00:05.0/iommu_group/typeecho 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/bind...
BUG: kernel NULL pointer dereference, address: 0000000000000028
...
Call Trace:
iommu_dma_alloc
e1000e_setup_tx_resources
e1000e_openSince iommu_change_dev_def_domain() calls probe_finalize() again, clear
the dma_ops there like Vt-d does.
|
[] | null | 5.3 | null | null | null |
|
GHSA-mjwc-4vr5-7xr3
|
The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'np1' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2015-0565
|
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.
|
[
"cpe:2.3:a:google:native_client:2015:*:*:*:*:*:*:*"
] | null | 10 | null | 10 | null |
|
GHSA-65hc-vfvw-w6rc
|
Minecraft before 1.17.1, when online-mode=false is configured, allows path traversal for deletion of arbitrary JSON files.
|
[] | null | null | null | null | null |
|
GHSA-2jg4-f9f6-jf7m
|
Inappropriate implementation in Resource Timing in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
|
[] | null | 6.5 | null | null | null |
|
GHSA-q65j-7f6h-c2fh
|
The Gentoo net-im/jabberd2 package through 2.6.1 installs jabberd, jabberd2-c2s, jabberd2-router, jabberd2-s2s, and jabberd2-sm in /usr/bin owned by the jabber account, which might allow local users to gain privileges by leveraging access to this account and then waiting for root to execute one of these programs.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xcpw-69mx-3fwj
|
In GL.iNet Goodcloud 1.0, insecure design allows remote attacker to access devices' admin panel.
|
[] | null | 5.9 | null | null | null |
|
GHSA-x2cj-w5c5-j878
|
There is a stack consumption vulnerability in the Parser::advanceToNextToken function in parser.cpp in LibSass 3.4.5. A crafted input may lead to remote denial of service.
|
[] | null | null | 7.5 | null | null |
|
GHSA-9qg2-48rp-q2cr
|
Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
|
[] | null | null | null | null | null |
|
GHSA-3f6g-q6j8-gjpg
|
Cisco 600 series routers running CBOS 2.0.1 through 2.4.2ap allows remote attackers to cause a denial of service via multiple connections to the router on the (1) HTTP or (2) telnet service, which causes the router to become unresponsive and stop forwarding packets.
|
[] | null | null | null | null | null |
|
CVE-2024-5756
|
Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.23 - Unauthenticated SQL Injection via optin
|
The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the db parameter in all versions up to, and including, 5.7.23 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[
"cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:icegram:icegram_express:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-jg34-vvwh-5qv9
|
Server Side Request Forgery vulnerability has been discovered in OpenText™ iManager 3.2.6.0200. This
could lead to senstive information disclosure.
|
[] | null | 5.3 | null | null | null |
|
CVE-2010-4346
|
The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
CVE-2016-0841
|
media/libmedia/mediametadataretriever.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 mishandles cleared service binders, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 26040840.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-chvj-m73r-9q8x
|
The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
|
[] | null | null | null | null | null |
|
GHSA-mhq4-2r6p-x7vh
|
A sensitive information disclosure vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to get username and password by request /cgi-bin/webadminget.cgi script via the browser.
|
[] | null | null | null | null | null |
|
CVE-2020-7146
|
A devgroupselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-51598
|
WordPress Selar.co Widget plugin <= 1.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kendysond Selar.Co Widget allows DOM-Based XSS.This issue affects Selar.Co Widget: from n/a through 1.2.
|
[
"cpe:2.3:a:kendysond:selar.co_widget:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
CVE-2021-47292
|
io_uring: fix memleak in io_init_wq_offload()
|
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix memleak in io_init_wq_offload()
I got memory leak report when doing fuzz test:
BUG: memory leak
unreferenced object 0xffff888107310a80 (size 96):
comm "syz-executor.6", pid 4610, jiffies 4295140240 (age 20.135s)
hex dump (first 32 bytes):
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
backtrace:
[<000000001974933b>] kmalloc include/linux/slab.h:591 [inline]
[<000000001974933b>] kzalloc include/linux/slab.h:721 [inline]
[<000000001974933b>] io_init_wq_offload fs/io_uring.c:7920 [inline]
[<000000001974933b>] io_uring_alloc_task_context+0x466/0x640 fs/io_uring.c:7955
[<0000000039d0800d>] __io_uring_add_tctx_node+0x256/0x360 fs/io_uring.c:9016
[<000000008482e78c>] io_uring_add_tctx_node fs/io_uring.c:9052 [inline]
[<000000008482e78c>] __do_sys_io_uring_enter fs/io_uring.c:9354 [inline]
[<000000008482e78c>] __se_sys_io_uring_enter fs/io_uring.c:9301 [inline]
[<000000008482e78c>] __x64_sys_io_uring_enter+0xabc/0xc20 fs/io_uring.c:9301
[<00000000b875f18f>] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[<00000000b875f18f>] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
[<000000006b0a8484>] entry_SYSCALL_64_after_hwframe+0x44/0xae
CPU0 CPU1
io_uring_enter io_uring_enter
io_uring_add_tctx_node io_uring_add_tctx_node
__io_uring_add_tctx_node __io_uring_add_tctx_node
io_uring_alloc_task_context io_uring_alloc_task_context
io_init_wq_offload io_init_wq_offload
hash = kzalloc hash = kzalloc
ctx->hash_map = hash ctx->hash_map = hash <- one of the hash is leaked
When calling io_uring_enter() in parallel, the 'hash_map' will be leaked,
add uring_lock to protect 'hash_map'.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-ccrh-57hj-rh5r
|
An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn't properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2024:4028
|
Red Hat Security Advisory: Release of OpenShift Serverless 1.33.0 security update & enhancements
|
golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect quarkus-core: Leak of local configuration properties into Quarkus applications golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm golang: net/mail: comments in display names are incorrectly handled golang: html/template: errors returned from MarshalJSON methods may break template escaping golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON jose-go: improper handling of highly compressed data netty-codec-http: Allocation of Resources Without Limits or Throttling
|
[
"cpe:/a:redhat:openshift_serverless:1.33::el8"
] | null | 5.3 | null | null | null |
CVE-2024-0817
|
Command injection in IrGraph.draw in paddlepaddle/paddle 2.6.0
|
[
"cpe:2.3:a:paddlepaddle:paddlepaddle:*:*:*:*:*:*:*:*"
] | null | null | 9.3 | null | null |
|
CVE-2003-1187
|
Cross-site scripting (XSS) vulnerability in include.php in PHPKIT 1.6.02 and 1.6.03 allows remote attackers to inject arbitrary web script or HTML via the contact_email parameter.
|
[
"cpe:2.3:a:phpkit:phpkit:1.6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:phpkit:phpkit:1.6.03:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
ICSA-23-033-04
|
Delta Electronics DVW-W02W2-E2
|
The web server of the affected device is vulnerable to authenticated command injection via POST parameters. A threat actor could gain full access to the underlying operating system (OS) of the device. If the device is acting as a key device in an industrial network, or controls various critical equipment via serial ports, the threat actor could cause extensive damage in the corresponding network.-CVE-2022-42139 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | 9.9 | null | null | null |
CVE-2008-0862
|
IBM Lotus Notes 6.0, 6.5, 7.0, and 8.0 signs an unsigned applet when a user forwards an email message to another user, which allows user-assisted remote attackers to bypass Execution Control List (ECL) protection.
|
[
"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-j59m-2g2f-c3pc
|
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Content Ticker arrow attribute in all versions up to, and including, 5.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-pmv9-f5mg-cp3v
|
Genymotion Desktop v3.3.2 was discovered to contain a DLL hijacking vulnerability that allows attackers to escalate privileges and execute arbitrary code via a crafted DLL.
|
[] | null | 7.8 | null | null | null |
|
CVE-2014-0665
|
The RBAC implementation in Cisco Identity Services Engine (ISE) Software does not properly verify privileges for support-bundle downloads, which allows remote authenticated users to obtain sensitive information via a download action, as demonstrated by obtaining read access to the user database, aka Bug ID CSCul83904.
|
[
"cpe:2.3:a:cisco:identity_services_engine_software:-:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-f62p-qx9c-xcwr
|
Insufficient compartmentalization in HECI subsystem for the Intel(R) SPS before versions SPS_E5_04.01.04.516.0, SPS_E5_04.04.04.033.0, SPS_E5_04.04.03.281.0, SPS_E5_03.01.03.116.0, SPS_E3_05.01.04.309.0, SPS_02.04.00.101.0, SPS_SoC-A_05.00.03.114.0, SPS_SoC-X_04.00.04.326.0, SPS_SoC-X_03.00.03.117.0, IGN_E5_91.00.00.167.0, SPS_PHI_03.01.03.078.0 may allow an authenticated user to potentially enable escalation of privilege via physical access.
|
[] | null | 6.6 | null | null | null |
|
CVE-2015-1318
|
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
|
[
"cpe:2.3:a:apport_project:apport:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apport_project:apport:2.17:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2023:0611
|
Red Hat Security Advisory: git security update
|
git: gitattributes parsing integer overflow git: Heap overflow in `git archive`, `git log --format` leading to RCE
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 9.8 | null | null | null |
GHSA-xpq9-hr2h-w5cj
|
In the Linux kernel, the following vulnerability has been resolved:octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rtThe commit 4af1b64f80fb ("octeontx2-pf: Fix lmtst ID used in aura
free") uses the get/put_cpu() to protect the usage of percpu pointer
in ->aura_freeptr() callback, but it also unnecessarily disable the
preemption for the blockable memory allocation. The commit 87b93b678e95
("octeontx2-pf: Avoid use of GFP_KERNEL in atomic context") tried to
fix these sleep inside atomic warnings. But it only fix the one for
the non-rt kernel. For the rt kernel, we still get the similar warnings
like below.
BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by swapper/0/1:
#0: ffff800009fc5fe8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x24/0x30
#1: ffff000100c276c0 (&mbox->lock){+.+.}-{3:3}, at: otx2_init_hw_resources+0x8c/0x3a4
#2: ffffffbfef6537e0 (&cpu_rcache->lock){+.+.}-{2:2}, at: alloc_iova_fast+0x1ac/0x2ac
Preemption disabled at:
[<ffff800008b1908c>] otx2_rq_aura_pool_init+0x14c/0x284
CPU: 20 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc3-rt1-yocto-preempt-rt #1
Hardware name: Marvell OcteonTX CN96XX board (DT)
Call trace:
dump_backtrace.part.0+0xe8/0xf4
show_stack+0x20/0x30
dump_stack_lvl+0x9c/0xd8
dump_stack+0x18/0x34
__might_resched+0x188/0x224
rt_spin_lock+0x64/0x110
alloc_iova_fast+0x1ac/0x2ac
iommu_dma_alloc_iova+0xd4/0x110
__iommu_dma_map+0x80/0x144
iommu_dma_map_page+0xe8/0x260
dma_map_page_attrs+0xb4/0xc0
__otx2_alloc_rbuf+0x90/0x150
otx2_rq_aura_pool_init+0x1c8/0x284
otx2_init_hw_resources+0xe4/0x3a4
otx2_open+0xf0/0x610
__dev_open+0x104/0x224
__dev_change_flags+0x1e4/0x274
dev_change_flags+0x2c/0x7c
ic_open_devs+0x124/0x2f8
ip_auto_config+0x180/0x42c
do_one_initcall+0x90/0x4dc
do_basic_setup+0x10c/0x14c
kernel_init_freeable+0x10c/0x13c
kernel_init+0x2c/0x140
ret_from_fork+0x10/0x20Of course, we can shuffle the get/put_cpu() to only wrap the invocation
of ->aura_freeptr() as what commit 87b93b678e95 does. But there are only
two ->aura_freeptr() callbacks, otx2_aura_freeptr() and
cn10k_aura_freeptr(). There is no usage of perpcu variable in the
otx2_aura_freeptr() at all, so the get/put_cpu() seems redundant to it.
We can move the get/put_cpu() into the corresponding callback which
really has the percpu variable usage and avoid the sprinkling of
get/put_cpu() in several places.
|
[] | null | null | null | null | null |
|
CVE-2006-2079
|
Cross-site scripting (XSS) vulnerability in portfolio.php in Verosky Media Instant Photo Gallery, possibly before 1.0.2, allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter.
|
[
"cpe:2.3:a:verosky_media:instant_photo_gallery:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2024:1786
|
Red Hat Security Advisory: httpd:2.4/mod_http2 security update
|
httpd: CONTINUATION frames DoS
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null | null |
GHSA-f5xx-949w-7ch3
|
In the Linux kernel, the following vulnerability has been resolved:PCI/MSI: Fix UAF in msi_capability_initKFENCE reports the following UAF:BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488Use-after-free read at 0x0000000024629571 (in kfence-#12):
__pci_enable_msi_range+0x2c0/0x488
pci_alloc_irq_vectors_affinity+0xec/0x14c
pci_alloc_irq_vectors+0x18/0x28kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128allocated by task 81 on cpu 7 at 10.808142s:
__kmem_cache_alloc_node+0x1f0/0x2bc
kmalloc_trace+0x44/0x138
msi_alloc_desc+0x3c/0x9c
msi_domain_insert_msi_desc+0x30/0x78
msi_setup_msi_desc+0x13c/0x184
__pci_enable_msi_range+0x258/0x488
pci_alloc_irq_vectors_affinity+0xec/0x14c
pci_alloc_irq_vectors+0x18/0x28freed by task 81 on cpu 7 at 10.811436s:
msi_domain_free_descs+0xd4/0x10c
msi_domain_free_locked.part.0+0xc0/0x1d8
msi_domain_alloc_irqs_all_locked+0xb4/0xbc
pci_msi_setup_msi_irqs+0x30/0x4c
__pci_enable_msi_range+0x2a8/0x488
pci_alloc_irq_vectors_affinity+0xec/0x14c
pci_alloc_irq_vectors+0x18/0x28Descriptor allocation done in:
__pci_enable_msi_range
msi_capability_init
msi_setup_msi_desc
msi_insert_msi_desc
msi_domain_insert_msi_desc
msi_alloc_desc
...Freed in case of failure in __msi_domain_alloc_locked()
__pci_enable_msi_range
msi_capability_init
pci_msi_setup_msi_irqs
msi_domain_alloc_irqs_all_locked
msi_domain_alloc_locked
__msi_domain_alloc_locked => fails
msi_domain_free_locked
...That failure propagates back to pci_msi_setup_msi_irqs() in
msi_capability_init() which accesses the descriptor for unmasking in the
error exit path.Cure it by copying the descriptor and using the copy for the error exit path
unmask operation.[ tglx: Massaged change log ]
|
[] | null | 7.8 | null | null | null |
|
GHSA-97h5-f2m3-8jfr
|
Multiple PHP remote file inclusion vulnerabilities in Aigaion Web based bibliography management system 1.2.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the DIR parameter to certain PHP scripts in (1) lib/actions/, (2) lib/displays/, (3) lib/editforms/, (4) lib/functions/, (5) scheme/, and (6) the root directory. NOTE: the provenance of this information is unknown; details are obtained from third party sources.
|
[] | null | null | null | null | null |
|
CVE-2024-9377
|
Products, Order & Customers Export for WooCommerce <= 2.0.15 - Reflected Cross-Site Scripting
|
The Products, Order & Customers Export for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:wpfactory:products\\,_order_\\&_customers_export_for_woocommerce:*:*:*:*:free:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2012-0289
|
Buffer overflow in Symantec Endpoint Protection (SEP) 11.0.600x through 11.0.710x and Symantec Network Access Control (SNAC) 11.0.600x through 11.0.710x allows local users to gain privileges, and modify data or cause a denial of service, via a crafted script.
|
[
"cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6200.754:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.6000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.6100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.6200:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.6300:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.7000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:11.0.7100:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-8vq5-c5g4-p382
|
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console panel fields. When exploited an attacker could read files on the file system. IBM X-Force ID: 134931.
|
[] | null | null | 4.3 | null | null |
|
RHSA-2019:3048
|
Red Hat Security Advisory: RH-SSO 7.3.4 adapters for Enterprise Application Platform 6 security update
|
keycloak: adapter endpoints are exposed via arbitrary URLs
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
] | null | null | 4.3 | null | null |
CVE-2006-3047
|
Cross-site scripting (XSS) vulnerability in TikiWiki 1.9.3.2 and possibly earlier versions allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
|
[
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:1.9.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2006-5363
|
Unspecified vulnerability in Oracle Single Sign-On component in Oracle Application Server 10.1.2.0.1 and Collaboration Suite 10.1.2 has unknown impact and remote attack vectors, aka Vuln# SSO02.
|
[
"cpe:2.3:a:oracle:application_server:10.1.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-27f3-4xcg-9c5m
|
Unspecified vulnerability on certain Sun StorEdge 6130 (SE6130) Controller Arrays allows remote attackers to delete data via unknown vectors.
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.