id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-828p-3mr9-7cff
Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature.
[]
null
null
null
null
null
GHSA-pp7w-98jh-p48w
Improper input validation in SMU may allow an attacker with privileges and a compromised physical function (PF)     to modify the PCIe® lane count and speed, potentially leading to a loss of availability.
[]
null
2.3
null
null
null
CVE-2024-6708
Profile Builder <= 3.12.0 - Admin+ Stored Cross Site Scripting
The User Profile Builder WordPress plugin before 3.12.2 does not sanitise and escape some parameters before outputting its content on the admin area, which allows Admin+ users to perform Cross-Site Scripting attacks.
[]
null
4.8
null
null
null
GHSA-wvxh-xchr-m6p5
In getLaunchedFromUid and getLaunchedFromPackage of ActivityClientController.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-191954233
[]
null
null
null
null
null
GHSA-jwg9-q35h-9vwx
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
[]
null
null
7.8
null
null
RHSA-2022:7077
Red Hat Security Advisory: Red Hat Certificate System 9.7 CVE bug fix update
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
[ "cpe:/a:redhat:certificate_system:9.7::el7" ]
null
7.6
null
null
null
GHSA-fmr6-8ggw-wc56
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
[]
null
null
null
null
null
CVE-2018-6288
Cross-site Request Forgery leading to Administrative account takeover in Kaspersky Secure Mail Gateway version 1.1.
[ "cpe:2.3:a:kaspersky:secure_mail_gateway:1.1:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-gmmm-vrfh-pfj9
Unspecified vulnerability in the WebLogic Portal component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
null
CVE-2020-14655
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: SSL API). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Security Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Security Service accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:security_service:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2023-1071
An issue has been discovered in GitLab affecting all versions from 15.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. Due to improper permissions checks it was possible for an unauthorised user to remove an issue from an epic.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*" ]
null
3.1
null
null
null
GHSA-phvg-gc27-gjwp
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
[]
null
9.8
null
null
null
GHSA-wqqm-m4pg-m35f
The barcode scanner (aka tw.com.books.android.plus) application 2.3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
CVE-2018-17502
The Receptionist for iPad could allow a local attacker to obtain sensitive information, caused by an error in the contact.json file. An attacker could exploit this vulnerability to obtain the contact names, phone numbers and emails.
[ "cpe:2.3:a:thereceptionist:the_receptionist_for_ipad:4.0.4:*:*:*:*:*:*:*" ]
null
null
4
null
null
CVE-2021-33026
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
[ "cpe:2.3:a:flask-caching_project:flask-caching:*:*:*:*:*:flask:*:*" ]
null
9.8
null
7.5
null
CVE-2021-20543
IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 198929.
[ "cpe:2.3:a:ibm:jazz_team_server:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_team_server:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_team_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_team_server:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:jazz_team_server:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
5.4
null
null
RHSA-2022:5232
Red Hat Security Advisory: kernel security and bug fix update
kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
7.8
null
null
null
CVE-2007-3120
Cross-site scripting (XSS) vulnerability in public/code/cp_dpage.php in All In One Control Panel (AIOCP) before 1.3.017 allows remote attackers to inject arbitrary web script or HTML via the aiocp_dp parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:aiocp:aiocp:1.3.000:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.001:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.002:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.003:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.004:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.005:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.006:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.007:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.008:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.009:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.010:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.011:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.012:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.013:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.014:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.015:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.016:*:*:*:*:*:*:*", "cpe:2.3:a:aiocp:aiocp:1.3.017:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-v29c-h5f4-7c2v
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H).
[]
null
4
null
null
null
CVE-2024-28979
Dell OpenManage Enterprise, versions 4.1.0 and older, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection.
[ "cpe:2.3:a:dell:openmanage_enterprise:*:*:*:*:*:*:*:*" ]
null
5.1
null
null
null
GHSA-w2hv-rcqr-2h7r
View name validation bypass in Jenkins
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name. When a form to create a view is submitted, the name is included twice in the submission. One instance is validated, but the other instance is used to create the value.This allows attackers with View/Create permission to create views with invalid or already-used names.Jenkins 2.287, LTS 2.277.2 uses the same submitted value for validation and view creation.
[]
null
4.3
null
null
null
GHSA-f84x-5jrq-4c3p
Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
[]
null
null
null
null
null
CVE-2024-29232
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Alert.Enum webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
[]
null
5.4
null
null
null
GHSA-244v-h48v-v63v
In ihevcd_parse_slice_header of ihevcd_parse_slice_header.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143826590
[]
null
null
null
null
null
CVE-2010-0723
SQL injection vulnerability in news.php in Ero Auktion 2.0 and 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:mhproducts:ero_auktion:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mhproducts:ero_auktion:2010:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-qrx9-x75w-xwj4
The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype.
[]
null
9.8
null
null
null
PYSEC-2022-24
null
Flask-AppBuilder is an application development framework, built on top of the Flask web framework. In affected versions there exists a user enumeration vulnerability. This vulnerability allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. Users are advised to upgrade to version 3.4.4 as soon as possible. There are no known workarounds for this issue.
[]
null
null
null
null
null
CVE-2021-25121
Rating by BestWebSoft < 1.6 - Rating Denial of Service
The Rating by BestWebSoft WordPress plugin before 1.6 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating
[ "cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4
null
GHSA-xw6r-x75r-2fh4
The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
[]
null
null
null
null
null
RHSA-2018:3000
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
[ "cpe:/a:redhat:rhel_extras_oracle_java:6" ]
null
null
6.5
null
null
RHSA-2002:297
Red Hat Security Advisory: : : : Updated vim packages fix modeline vulnerability
security flaw
[ "cpe:/o:redhat:linux:6.2", "cpe:/o:redhat:linux:7.0", "cpe:/o:redhat:linux:7.1", "cpe:/o:redhat:linux:7.2", "cpe:/o:redhat:linux:7.3", "cpe:/o:redhat:linux:8.0" ]
null
null
null
null
null
GHSA-5rgh-m6wh-gr8g
Cross-site scripting (XSS) vulnerability in index.php in Elaine Aquino Online Zone Journals (OZJournals) 1.5 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
null
GHSA-mc5p-m3mj-r7g7
Cross-site scripting (XSS) vulnerability in the web mail module for Usermin 1.070 allows remote attackers to insert arbitrary HTML and script via e-mail messages.
[]
null
null
null
null
null
CVE-2015-2020
The MyScript SDK before 1.3 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
[ "cpe:2.3:a:myscript:myscript:*:*:*:*:*:android:*:*" ]
null
null
9.8
7.5
null
CVE-2018-2364
SAP CRM WebClient UI 7.01, 7.31, 7.46, 7.47, 7.48, 8.00, 8.01, S4FND 1.02, does not sufficiently validate and/or encode hidden fields, resulting in Cross-Site Scripting (XSS) vulnerability.
[ "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.01:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.46:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.47:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.48:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4fnd:1.02:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
PYSEC-2021-353
null
furlongm openvpn-monitor through 1.1.3 allows %0a command injection via the OpenVPN management interface socket. This can shut down the server via signal%20SIGTERM.
[]
null
null
null
null
null
CVE-2006-4021
The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption.
[ "cpe:2.3:a:scatterchat:scatterchat:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
GHSA-7gg7-9cpw-h9r9
GTK+ library allows local users to specify arbitrary modules via the GTK_MODULES environmental variable, which could allow local users to gain privileges if GTK+ is used by a setuid/setgid program.
[]
null
null
null
null
null
GHSA-238j-pxjv-rh2p
Zoho ManageEngine ADSelfService Plus before 6218 allows anyone to conduct a Denial-of-Service attack via the Mobile App Authentication API.
[]
null
7.5
null
null
null
ICSA-24-074-10
Siemens Siveillance Control
The affected product does not properly check the list of access groups that are assigned to an individual user. This could enable a locally logged on user to gain write privileges for objects where they only have read privileges.
[]
null
5.5
null
null
null
CVE-2024-53295
Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
[]
null
7.8
null
null
null
GHSA-c856-w373-jm6c
In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page
[]
null
4.6
null
null
null
CVE-2018-20171
An issue was discovered in Nagios XI before 5.5.8. The url parameter of rss_dashlet/magpierss/scripts/magpie_simple.php is not filtered, resulting in an XSS vulnerability.
[ "cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
CVE-2021-47004
f2fs: fix to avoid touching checkpointed data in get_victim()
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid touching checkpointed data in get_victim() In CP disabling mode, there are two issues when using LFS or SSR | AT_SSR mode to select victim: 1. LFS is set to find source section during GC, the victim should have no checkpointed data, since after GC, section could not be set free for reuse. Previously, we only check valid chpt blocks in current segment rather than section, fix it. 2. SSR | AT_SSR are set to find target segment for writes which can be fully filled by checkpointed and newly written blocks, we should never select such segment, otherwise it can cause panic or data corruption during allocation, potential case is described as below: a) target segment has 'n' (n < 512) ckpt valid blocks b) GC migrates 'n' valid blocks to other segment (segment is still in dirty list) c) GC migrates '512 - n' blocks to target segment (segment has 'n' cp_vblocks and '512 - n' vblocks) d) If GC selects target segment via {AT,}SSR allocator, however there is no free space in targe segment.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-58qx-pwx2-gqm9
In the Linux kernel, the following vulnerability has been resolved:mptcp: error out earlier on disconnectEric reported a division by zero splat in the MPTCP protocol:Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 6094 Comm: syz-executor317 Not tainted 6.12.0-rc5-syzkaller-00291-g05b92660cdfe #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__tcp_select_window+0x5b4/0x1310 net/ipv4/tcp_output.c:3163 Code: f6 44 01 e3 89 df e8 9b 75 09 f8 44 39 f3 0f 8d 11 ff ff ff e8 0d 74 09 f8 45 89 f4 e9 04 ff ff ff e8 00 74 09 f8 44 89 f0 99 <f7> 7c 24 14 41 29 d6 45 89 f4 e9 ec fe ff ff e8 e8 73 09 f8 48 89 RSP: 0018:ffffc900041f7930 EFLAGS: 00010293 RAX: 0000000000017e67 RBX: 0000000000017e67 RCX: ffffffff8983314b RDX: 0000000000000000 RSI: ffffffff898331b0 RDI: 0000000000000004 RBP: 00000000005d6000 R08: 0000000000000004 R09: 0000000000017e67 R10: 0000000000003e80 R11: 0000000000000000 R12: 0000000000003e80 R13: ffff888031d9b440 R14: 0000000000017e67 R15: 00000000002eb000 FS: 00007feb5d7f16c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007feb5d8adbb8 CR3: 0000000074e4c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> __tcp_cleanup_rbuf+0x3e7/0x4b0 net/ipv4/tcp.c:1493 mptcp_rcv_space_adjust net/mptcp/protocol.c:2085 [inline] mptcp_recvmsg+0x2156/0x2600 net/mptcp/protocol.c:2289 inet_recvmsg+0x469/0x6a0 net/ipv4/af_inet.c:885 sock_recvmsg_nosec net/socket.c:1051 [inline] sock_recvmsg+0x1b2/0x250 net/socket.c:1073 __sys_recvfrom+0x1a5/0x2e0 net/socket.c:2265 __do_sys_recvfrom net/socket.c:2283 [inline] __se_sys_recvfrom net/socket.c:2279 [inline] __x64_sys_recvfrom+0xe0/0x1c0 net/socket.c:2279 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7feb5d857559 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007feb5d7f1208 EFLAGS: 00000246 ORIG_RAX: 000000000000002d RAX: ffffffffffffffda RBX: 00007feb5d8e1318 RCX: 00007feb5d857559 RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007feb5d8e1310 R08: 0000000000000000 R09: ffffffff81000000 R10: 0000000000000100 R11: 0000000000000246 R12: 00007feb5d8e131c R13: 00007feb5d8ae074 R14: 000000800000000e R15: 00000000fffffdefand provided a nice reproducer.The root cause is the current bad handling of racing disconnect. After the blamed commit below, sk_wait_data() can return (with error) with the underlying socket disconnected and a zero rcv_mss.Catch the error and return without performing any additional operations on the current socket.
[]
null
5.5
null
null
null
GHSA-w83m-rghh-frxj
Cross site scripting in yetiforce/yetiforce-crm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[]
null
5.4
null
null
null
CVE-2025-31468
WordPress WP_Identicon plugin <= 2.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP_Identicon allows Reflected XSS. This issue affects WP_Identicon: from n/a through 2.0.
[]
null
7.1
null
null
null
CVE-2019-6703
Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, leading to site takeover. These attackers can send requests to wp-admin/admin-ajax.php to call the miglaA_update_me action to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
[ "cpe:2.3:a:calmar-webmedia:total_donations:*:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
null
CVE-2003-1586
Cross-site scripting (XSS) vulnerability in WebExpert allows remote attackers to inject arbitrary web script or HTML via a crafted User-Agent HTTP header.
[ "cpe:2.3:a:iplanet:webexpert:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2016-0353
IBM Security Privileged Identity Manager 2.0 before 2.0.2 FP8, when Virtual Appliance is used, does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
[ "cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*" ]
null
null
3.7
4.3
null
CVE-2020-9089
There is an information vulnerability in Huawei smartphones. A function in a module can be called without verifying the caller's access. Attackers with user access can exploit this vulnerability to obtain some information. This can lead to information leak. (Vulnerability ID: HWPSIRT-2019-12141) This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9089.
[ "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-ppf9-f28m-8wvh
A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155.
[]
null
null
2.4
null
null
CVE-2021-4177
Generation of Error Message Containing Sensitive Information in livehelperchat/livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information
[ "cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*" ]
null
null
4.3
null
null
CVE-2024-35995
ACPI: CPPC: Use access_width over bit_width for system memory accesses
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Use access_width over bit_width for system memory accesses To align with ACPI 6.3+, since bit_width can be any 8-bit value, it cannot be depended on to be always on a clean 8b boundary. This was uncovered on the Cobalt 100 platform. SError Interrupt on CPU26, code 0xbe000011 -- SError CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : cppc_get_perf_caps+0xec/0x410 lr : cppc_get_perf_caps+0xe8/0x410 sp : ffff8000155ab730 x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078 x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000 x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008 x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006 x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028 x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000 Kernel panic - not syncing: Asynchronous SError Interrupt CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION Call trace: dump_backtrace+0x0/0x1e0 show_stack+0x24/0x30 dump_stack_lvl+0x8c/0xb8 dump_stack+0x18/0x34 panic+0x16c/0x384 add_taint+0x0/0xc0 arm64_serror_panic+0x7c/0x90 arm64_is_fatal_ras_serror+0x34/0xa4 do_serror+0x50/0x6c el1h_64_error_handler+0x40/0x74 el1h_64_error+0x7c/0x80 cppc_get_perf_caps+0xec/0x410 cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq] cpufreq_online+0x2dc/0xa30 cpufreq_add_dev+0xc0/0xd4 subsys_interface_register+0x134/0x14c cpufreq_register_driver+0x1b0/0x354 cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq] do_one_initcall+0x50/0x250 do_init_module+0x60/0x27c load_module+0x2300/0x2570 __do_sys_finit_module+0xa8/0x114 __arm64_sys_finit_module+0x2c/0x3c invoke_syscall+0x78/0x100 el0_svc_common.constprop.0+0x180/0x1a0 do_el0_svc+0x84/0xa0 el0_svc+0x2c/0xc0 el0t_64_sync_handler+0xa4/0x12c el0t_64_sync+0x1a4/0x1a8 Instead, use access_width to determine the size and use the offset and width to shift and mask the bits to read/write out. Make sure to add a check for system memory since pcc redefines the access_width to subspace id. If access_width is not set, then fall back to using bit_width. [ rjw: Subject and changelog edits, comment adjustments ]
[]
null
null
null
null
null
GHSA-x49h-w39r-5qq6
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
[]
null
7.5
null
null
null
CVE-2023-4554
XML External Entity (XXE) Processing
Improper Restriction of XML External Entity Reference vulnerability in OpenText AppBuilder on Windows, Linux allows Server Side Request Forgery, Probe System Files. AppBuilder's XML processor is vulnerable to XML External Entity Processing (XXE), allowing an authenticated user to upload specially crafted XML files to induce server-side request forgery, disclose files local to the server that processes them. This issue affects AppBuilder: from 21.2 before 23.2.
[ "cpe:2.3:a:opentext:appbuilder:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
4.9
null
null
null
GHSA-cqr9-wvm8-ffrj
A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
null
CVE-2024-42604
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
[ "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2017-18611
The magic-fields plugin before 1.7.2 for WordPress has XSS via the RCCWP_CreateCustomFieldPage.php custom-field-css parameter.
[ "cpe:2.3:a:magicfields:magic_fields:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
CVE-2012-6105
blog/rsslib.php in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 continues to provide a blog RSS feed after blogging is disabled, which allows remote attackers to obtain sensitive information by reading this feed.
[ "cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2017-18106
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
[ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ]
null
null
7.5
6
null
GHSA-xm35-85mm-9382
A security bypass vulnerability exists in Symantec Norton App Lock 1.0.3.186 and earlier if application pinning is enabled, which could let a local malicious user bypass security restrictions.
[]
null
null
null
null
null
GHSA-5p6r-jp46-m2mc
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
[]
null
null
null
null
null
GHSA-p2w7-2677-hrr8
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
[]
null
null
null
null
null
GHSA-4p2m-q353-666c
An authentication issue was addressed with improved state management. This issue is fixed in watchOS 10. An Apple Watch Ultra may not lock when using the Depth app.
[]
null
5.5
null
null
null
RHSA-2024:0128
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.8
null
null
null
GHSA-98xh-f727-782v
Online Ticket Booking has XSS via the admin/manageownerlist.php contact parameter.
[]
null
null
4.8
null
null
GHSA-79wh-37j3-h783
Cisco Edge 300 software 1.0 and 1.1 on Edge 340 devices allows local users to obtain root privileges via unspecified commands, aka Bug ID CSCur18132.
[]
null
null
null
null
null
CVE-2016-2795
The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
[ "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2021-30577
Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2025-38450
wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload() Add a NULL check for msta->vif before accessing its members to prevent a kernel panic in AP mode deployment. This also fix the issue reported in [1]. The crash occurs when this function is triggered before the station is fully initialized. The call trace shows a page fault at mt7925_sta_set_decap_offload() due to accessing resources when msta->vif is NULL. Fix this by adding an early return if msta->vif is NULL and also check wcid.sta is ready. This ensures we only proceed with decap offload configuration when the station's state is properly initialized. [14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0 [14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G [14739.821394] Tainted: [C]=CRAP, [O]=OOT_MODULE [14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT) [14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [14739.838538] pc : mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common] [14739.845271] lr : mt7925_sta_set_decap_offload+0x58/0x1b8 [mt7925_common] [14739.851985] sp : ffffffc085efb500 [14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158 [14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001 [14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88 [14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000 [14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080 [14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000 [14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0 [14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100 [14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000 [14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8 [14739.926686] Call trace: [14739.929130] mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common] [14739.935505] ieee80211_check_fast_rx+0x19c/0x510 [mac80211] [14739.941344] _sta_info_move_state+0xe4/0x510 [mac80211] [14739.946860] sta_info_move_state+0x1c/0x30 [mac80211] [14739.952116] sta_apply_auth_flags.constprop.0+0x90/0x1b0 [mac80211] [14739.958708] sta_apply_parameters+0x234/0x5e0 [mac80211] [14739.964332] ieee80211_add_station+0xdc/0x190 [mac80211] [14739.969950] nl80211_new_station+0x46c/0x670 [cfg80211] [14739.975516] genl_family_rcv_msg_doit+0xdc/0x150 [14739.980158] genl_rcv_msg+0x218/0x298 [14739.983830] netlink_rcv_skb+0x64/0x138 [14739.987670] genl_rcv+0x40/0x60 [14739.990816] netlink_unicast+0x314/0x380 [14739.994742] netlink_sendmsg+0x198/0x3f0 [14739.998664] __sock_sendmsg+0x64/0xc0 [14740.002324] ____sys_sendmsg+0x260/0x298 [14740.006242] ___sys_sendmsg+0xb4/0x110
[]
null
null
null
null
null
GHSA-gr63-v8qw-4wjf
Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php.
[]
null
null
null
null
null
GHSA-hv5f-73mr-7vvj
Cross-site Scripting in Mattermost
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
[]
null
6.1
null
null
null
GHSA-954m-ccf6-5rvp
Polycom RealPresence Web Suite before 2.2.0 does not block a user's video for a few seconds upon joining a meeting (when the user has explicitly chosen to turn off the video using a specific option). During those seconds, a meeting invitee may unknowingly be on camera with other participants able to view.
[]
null
null
7.5
null
null
GHSA-hw5v-vjxm-9hpj
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the delid parameter at viewtreatmentrecord.php.
[]
null
9.8
null
null
null
GHSA-j24m-m7v4-wr84
Quest KACE Systems Management Appliance Server Center 9.1.317 is vulnerable to SQL injection. An authenticated user has the ability to execute arbitrary commands against the database. The affected component is /common/user_profile.php. The affected parameter is sort_column.
[]
null
null
null
null
null
GHSA-4c75-9mvv-68jv
Multiple cross-site scripting (XSS) vulnerabilities in Portix-PHP 0.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) titre or (2) auteur field in a forum post.
[]
null
null
null
null
null
GHSA-jgwv-g855-m766
Cross-site scripting (XSS) vulnerability in password.asp in DUWare DUportal Pro 3.4.3 allows remote attackers to inject arbitrary web script or HTML via the result parameter.
[]
null
null
null
null
null
RHSA-2025:8319
Red Hat Security Advisory: pcs security update
rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser
[ "cpe:/o:redhat:enterprise_linux:10.0" ]
null
7.5
null
null
null
CVE-2016-2244
HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:h:hp:a2w75a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w76a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w77a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w78a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:a2w79a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b3g85a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l04a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l05a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:b5l07a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:c2s11a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:c2s12a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ca251a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc522a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc523a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cc524a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd644a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd645a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cd646a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce989a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce990a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce991a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce992a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce993a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce994a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce995a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:ce996a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf066a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf067a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf068a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf069a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf081a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf082a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf083a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf116a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf117a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf118a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf235a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf236a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf238a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cf367a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz244a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz245a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz249a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz250a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz255a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz256a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz257a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:cz258a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l08a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l09a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d3l10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7p70a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:d7p71a:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:j7x28a:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:futuresmart_firmware:*:*:*:*:*:*:*:*" ]
null
null
5.9
5
null
CVE-2024-33394
An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.
[ "cpe:2.3:a:kubevirt:kubevirt:-:*:*:*:*:kubernetes:*:*" ]
null
5.9
null
null
null
CVE-2008-3890
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
[ "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", "cpe:2.3:h:amd:amd64:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-2pj6-5hqc-w5x9
CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials
WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[]
null
4.2
null
null
null
GHSA-c5pj-hf7f-p4j3
A vulnerability has been reported in Suite Setups built with versions prior to InstallShield 2023 R2. This vulnerability may allow locally authenticated users to cause a Denial of Service (DoS) condition when handling move operations on local, temporary folders.
[]
null
5.5
null
null
null
GHSA-xmqf-p7f5-83hr
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Telephony" component. It allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a Class 0 SMS message.
[]
null
null
7.5
null
null
GHSA-7pwj-wph6-rxw9
An OS command injection vulnerability exists in the daretools binary functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.
[]
null
8.8
null
null
null
CVE-2010-4325
Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.
[ "cpe:2.3:a:novell:groupwise:*:hp1:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:4.1a:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:5.57e:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp4:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp5:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5:sp6:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:6.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:novell:groupwise:8.0.1:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2013-1374
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-0649.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*" ]
null
null
null
10
null
RHSA-2023:3776
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: urllib.parse url blocklisting bypass
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
7.5
null
null
null
CVE-2017-16356
Reflected XSS in Kubik-Rubik SIGE (aka Simple Image Gallery Extended) before 3.3.0 allows attackers to execute JavaScript in a victim's browser by having them visit a plugins/content/sige/plugin_sige/print.php link with a crafted img, name, or caption parameter.
[ "cpe:2.3:a:kubik-rubik:simple_image_gallery_extended:*:*:*:*:*:joomla\\!:*:*" ]
null
null
6.1
4.3
null
CVE-2014-1949
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
[ "cpe:2.3:o:linuxmint:linux_mint:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu:14.04:*:*:*:lts:*:*:*" ]
null
null
null
7.2
null
CVE-2020-3251
Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Data
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director:6.7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
null
GHSA-9xcm-8x7r-552c
A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.
[]
null
7.8
null
null
null
GHSA-4fj3-xj7w-f7cv
A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device.
[]
null
7.5
null
null
null
GHSA-6x7c-ccx8-mqpg
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 126861.
[]
null
null
6.5
null
null
GHSA-29vm-vjqm-q2mx
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
[]
null
2.8
null
null
null
GHSA-xv93-mqjm-cvfq
In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.
[]
null
5.5
null
null
null
GHSA-57fr-4f8x-2f8w
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jnwry vcOS allows Reflected XSS. This issue affects vcOS: from n/a through 1.4.0.
[]
null
7.1
null
null
null
cisco-sa-20181107-ems-xml-xxe
Cisco Energy Management Suite XML External Entity Vulnerability
A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by convincing a user of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files within the affected application. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-xml-xxe ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-xml-xxe"]
[]
null
null
6.3
null
null
CVE-2014-6867
The Sortir en Alsace (aka com.axessweb.sortirenalsace) application 0.5b for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:sortir-en-alsace:sortir_en_alsace:0.5b:*:*:*:*:android:*:*" ]
null
null
null
5.4
null