id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-828p-3mr9-7cff
|
Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature.
|
[] | null | null | null | null | null |
|
GHSA-pp7w-98jh-p48w
|
Improper input validation in SMU may allow an attacker with privileges and a compromised physical function (PF) to modify the PCIe® lane count and speed, potentially leading to a loss of availability.
|
[] | null | 2.3 | null | null | null |
|
CVE-2024-6708
|
Profile Builder <= 3.12.0 - Admin+ Stored Cross Site Scripting
|
The User Profile Builder WordPress plugin before 3.12.2 does not sanitise and escape some parameters before outputting its content on the admin area, which allows Admin+ users to perform Cross-Site Scripting attacks.
|
[] | null | 4.8 | null | null | null |
GHSA-wvxh-xchr-m6p5
|
In getLaunchedFromUid and getLaunchedFromPackage of ActivityClientController.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-191954233
|
[] | null | null | null | null | null |
|
GHSA-jwg9-q35h-9vwx
|
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
|
[] | null | null | 7.8 | null | null |
|
RHSA-2022:7077
|
Red Hat Security Advisory: Red Hat Certificate System 9.7 CVE bug fix update
|
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
|
[
"cpe:/a:redhat:certificate_system:9.7::el7"
] | null | 7.6 | null | null | null |
GHSA-fmr6-8ggw-wc56
|
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
|
[] | null | null | null | null | null |
|
CVE-2018-6288
|
Cross-site Request Forgery leading to Administrative account takeover in Kaspersky Secure Mail Gateway version 1.1.
|
[
"cpe:2.3:a:kaspersky:secure_mail_gateway:1.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-gmmm-vrfh-pfj9
|
Unspecified vulnerability in the WebLogic Portal component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2020-14655
|
Vulnerability in the Oracle Security Service product of Oracle Fusion Middleware (component: SSL API). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Security Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Security Service accessible data as well as unauthorized update, insert or delete access to some of Oracle Security Service accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:security_service:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2023-1071
|
An issue has been discovered in GitLab affecting all versions from 15.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. Due to improper permissions checks it was possible for an unauthorised user to remove an issue from an epic.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*"
] | null | 3.1 | null | null | null |
|
GHSA-phvg-gc27-gjwp
|
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
|
[] | null | 9.8 | null | null | null |
|
GHSA-wqqm-m4pg-m35f
|
The barcode scanner (aka tw.com.books.android.plus) application 2.3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2018-17502
|
The Receptionist for iPad could allow a local attacker to obtain sensitive information, caused by an error in the contact.json file. An attacker could exploit this vulnerability to obtain the contact names, phone numbers and emails.
|
[
"cpe:2.3:a:thereceptionist:the_receptionist_for_ipad:4.0.4:*:*:*:*:*:*:*"
] | null | null | 4 | null | null |
|
CVE-2021-33026
|
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
|
[
"cpe:2.3:a:flask-caching_project:flask-caching:*:*:*:*:*:flask:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2021-20543
|
IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 198929.
|
[
"cpe:2.3:a:ibm:jazz_team_server:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_team_server:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
RHSA-2022:5232
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: race condition in perf_event_open leads to privilege escalation kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write) kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 7.8 | null | null | null |
CVE-2007-3120
|
Cross-site scripting (XSS) vulnerability in public/code/cp_dpage.php in All In One Control Panel (AIOCP) before 1.3.017 allows remote attackers to inject arbitrary web script or HTML via the aiocp_dp parameter. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:aiocp:aiocp:1.3.000:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.001:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.002:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.003:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.004:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.005:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.006:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.007:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.008:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.009:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.010:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.011:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.012:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.013:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.014:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.015:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.016:*:*:*:*:*:*:*",
"cpe:2.3:a:aiocp:aiocp:1.3.017:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-v29c-h5f4-7c2v
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H).
|
[] | null | 4 | null | null | null |
|
CVE-2024-28979
|
Dell OpenManage Enterprise, versions 4.1.0 and older, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection.
|
[
"cpe:2.3:a:dell:openmanage_enterprise:*:*:*:*:*:*:*:*"
] | null | 5.1 | null | null | null |
|
GHSA-w2hv-rcqr-2h7r
|
View name validation bypass in Jenkins
|
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name. When a form to create a view is submitted, the name is included twice in the submission. One instance is validated, but the other instance is used to create the value.This allows attackers with View/Create permission to create views with invalid or already-used names.Jenkins 2.287, LTS 2.277.2 uses the same submitted value for validation and view creation.
|
[] | null | 4.3 | null | null | null |
GHSA-f84x-5jrq-4c3p
|
Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
|
[] | null | null | null | null | null |
|
CVE-2024-29232
|
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Alert.Enum webapi component in Synology Surveillance Station before 9.2.0-11289 and 9.2.0-9289 allows remote authenticated users to read database containing non-sensitive information and conduct limited denial-of-service attacks via unspecified vectors.
|
[] | null | 5.4 | null | null | null |
|
GHSA-244v-h48v-v63v
|
In ihevcd_parse_slice_header of ihevcd_parse_slice_header.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143826590
|
[] | null | null | null | null | null |
|
CVE-2010-0723
|
SQL injection vulnerability in news.php in Ero Auktion 2.0 and 2010 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:mhproducts:ero_auktion:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mhproducts:ero_auktion:2010:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-qrx9-x75w-xwj4
|
The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype.
|
[] | null | 9.8 | null | null | null |
|
PYSEC-2022-24
| null |
Flask-AppBuilder is an application development framework, built on top of the Flask web framework. In affected versions there exists a user enumeration vulnerability. This vulnerability allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. Users are advised to upgrade to version 3.4.4 as soon as possible. There are no known workarounds for this issue.
|
[] | null | null | null | null | null |
CVE-2021-25121
|
Rating by BestWebSoft < 1.6 - Rating Denial of Service
|
The Rating by BestWebSoft WordPress plugin before 1.6 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating
|
[
"cpe:2.3:a:bestwebsoft:rating:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | 4 | null |
GHSA-xw6r-x75r-2fh4
|
The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
|
[] | null | null | null | null | null |
|
RHSA-2018:3000
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) OpenJDK: Improper field access checks (Hotspot, 8199226) OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) libpng: Integer overflow and resultant divide-by-zero in pngrutil.c:png_check_chunk_length() allows for denial of service
|
[
"cpe:/a:redhat:rhel_extras_oracle_java:6"
] | null | null | 6.5 | null | null |
RHSA-2002:297
|
Red Hat Security Advisory: : : : Updated vim packages fix modeline vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:6.2",
"cpe:/o:redhat:linux:7.0",
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null | null |
GHSA-5rgh-m6wh-gr8g
|
Cross-site scripting (XSS) vulnerability in index.php in Elaine Aquino Online Zone Journals (OZJournals) 1.5 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-mc5p-m3mj-r7g7
|
Cross-site scripting (XSS) vulnerability in the web mail module for Usermin 1.070 allows remote attackers to insert arbitrary HTML and script via e-mail messages.
|
[] | null | null | null | null | null |
|
CVE-2015-2020
|
The MyScript SDK before 1.3 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
|
[
"cpe:2.3:a:myscript:myscript:*:*:*:*:*:android:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2018-2364
|
SAP CRM WebClient UI 7.01, 7.31, 7.46, 7.47, 7.48, 8.00, 8.01, S4FND 1.02, does not sufficiently validate and/or encode hidden fields, resulting in Cross-Site Scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.46:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.47:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:7.48:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4fnd:1.02:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
PYSEC-2021-353
| null |
furlongm openvpn-monitor through 1.1.3 allows %0a command injection via the OpenVPN management interface socket. This can shut down the server via signal%20SIGTERM.
|
[] | null | null | null | null | null |
CVE-2006-4021
|
The cryptographic module in ScatterChat 1.0.x allows attackers to identify patterns in large numbers of messages by identifying collisions using a birthday attack on the custom padding mechanism for ECB mode encryption.
|
[
"cpe:2.3:a:scatterchat:scatterchat:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-7gg7-9cpw-h9r9
|
GTK+ library allows local users to specify arbitrary modules via the GTK_MODULES environmental variable, which could allow local users to gain privileges if GTK+ is used by a setuid/setgid program.
|
[] | null | null | null | null | null |
|
GHSA-238j-pxjv-rh2p
|
Zoho ManageEngine ADSelfService Plus before 6218 allows anyone to conduct a Denial-of-Service attack via the Mobile App Authentication API.
|
[] | null | 7.5 | null | null | null |
|
ICSA-24-074-10
|
Siemens Siveillance Control
|
The affected product does not properly check the list of access groups that are assigned to an individual user. This could enable a locally logged on user to gain write privileges for objects where they only have read privileges.
|
[] | null | 5.5 | null | null | null |
CVE-2024-53295
|
Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
|
[] | null | 7.8 | null | null | null |
|
GHSA-c856-w373-jm6c
|
In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page
|
[] | null | 4.6 | null | null | null |
|
CVE-2018-20171
|
An issue was discovered in Nagios XI before 5.5.8. The url parameter of rss_dashlet/magpierss/scripts/magpie_simple.php is not filtered, resulting in an XSS vulnerability.
|
[
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2021-47004
|
f2fs: fix to avoid touching checkpointed data in get_victim()
|
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid touching checkpointed data in get_victim()
In CP disabling mode, there are two issues when using LFS or SSR | AT_SSR
mode to select victim:
1. LFS is set to find source section during GC, the victim should have
no checkpointed data, since after GC, section could not be set free for
reuse.
Previously, we only check valid chpt blocks in current segment rather
than section, fix it.
2. SSR | AT_SSR are set to find target segment for writes which can be
fully filled by checkpointed and newly written blocks, we should never
select such segment, otherwise it can cause panic or data corruption
during allocation, potential case is described as below:
a) target segment has 'n' (n < 512) ckpt valid blocks
b) GC migrates 'n' valid blocks to other segment (segment is still
in dirty list)
c) GC migrates '512 - n' blocks to target segment (segment has 'n'
cp_vblocks and '512 - n' vblocks)
d) If GC selects target segment via {AT,}SSR allocator, however there
is no free space in targe segment.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
GHSA-58qx-pwx2-gqm9
|
In the Linux kernel, the following vulnerability has been resolved:mptcp: error out earlier on disconnectEric reported a division by zero splat in the MPTCP protocol:Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 6094 Comm: syz-executor317 Not tainted
6.12.0-rc5-syzkaller-00291-g05b92660cdfe #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 09/13/2024
RIP: 0010:__tcp_select_window+0x5b4/0x1310 net/ipv4/tcp_output.c:3163
Code: f6 44 01 e3 89 df e8 9b 75 09 f8 44 39 f3 0f 8d 11 ff ff ff e8
0d 74 09 f8 45 89 f4 e9 04 ff ff ff e8 00 74 09 f8 44 89 f0 99 <f7> 7c
24 14 41 29 d6 45 89 f4 e9 ec fe ff ff e8 e8 73 09 f8 48 89
RSP: 0018:ffffc900041f7930 EFLAGS: 00010293
RAX: 0000000000017e67 RBX: 0000000000017e67 RCX: ffffffff8983314b
RDX: 0000000000000000 RSI: ffffffff898331b0 RDI: 0000000000000004
RBP: 00000000005d6000 R08: 0000000000000004 R09: 0000000000017e67
R10: 0000000000003e80 R11: 0000000000000000 R12: 0000000000003e80
R13: ffff888031d9b440 R14: 0000000000017e67 R15: 00000000002eb000
FS: 00007feb5d7f16c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007feb5d8adbb8 CR3: 0000000074e4c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__tcp_cleanup_rbuf+0x3e7/0x4b0 net/ipv4/tcp.c:1493
mptcp_rcv_space_adjust net/mptcp/protocol.c:2085 [inline]
mptcp_recvmsg+0x2156/0x2600 net/mptcp/protocol.c:2289
inet_recvmsg+0x469/0x6a0 net/ipv4/af_inet.c:885
sock_recvmsg_nosec net/socket.c:1051 [inline]
sock_recvmsg+0x1b2/0x250 net/socket.c:1073
__sys_recvfrom+0x1a5/0x2e0 net/socket.c:2265
__do_sys_recvfrom net/socket.c:2283 [inline]
__se_sys_recvfrom net/socket.c:2279 [inline]
__x64_sys_recvfrom+0xe0/0x1c0 net/socket.c:2279
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7feb5d857559
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d
01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007feb5d7f1208 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
RAX: ffffffffffffffda RBX: 00007feb5d8e1318 RCX: 00007feb5d857559
RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007feb5d8e1310 R08: 0000000000000000 R09: ffffffff81000000
R10: 0000000000000100 R11: 0000000000000246 R12: 00007feb5d8e131c
R13: 00007feb5d8ae074 R14: 000000800000000e R15: 00000000fffffdefand provided a nice reproducer.The root cause is the current bad handling of racing disconnect.
After the blamed commit below, sk_wait_data() can return (with
error) with the underlying socket disconnected and a zero rcv_mss.Catch the error and return without performing any additional
operations on the current socket.
|
[] | null | 5.5 | null | null | null |
|
GHSA-w83m-rghh-frxj
|
Cross site scripting in yetiforce/yetiforce-crm
|
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
|
[] | null | 5.4 | null | null | null |
CVE-2025-31468
|
WordPress WP_Identicon plugin <= 2.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP_Identicon allows Reflected XSS. This issue affects WP_Identicon: from n/a through 2.0.
|
[] | null | 7.1 | null | null | null |
CVE-2019-6703
|
Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, leading to site takeover. These attackers can send requests to wp-admin/admin-ajax.php to call the miglaA_update_me action to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
|
[
"cpe:2.3:a:calmar-webmedia:total_donations:*:*:*:*:*:wordpress:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2003-1586
|
Cross-site scripting (XSS) vulnerability in WebExpert allows remote attackers to inject arbitrary web script or HTML via a crafted User-Agent HTTP header.
|
[
"cpe:2.3:a:iplanet:webexpert:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2016-0353
|
IBM Security Privileged Identity Manager 2.0 before 2.0.2 FP8, when Virtual Appliance is used, does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
|
[
"cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*"
] | null | null | 3.7 | 4.3 | null |
|
CVE-2020-9089
|
There is an information vulnerability in Huawei smartphones. A function in a module can be called without verifying the caller's access. Attackers with user access can exploit this vulnerability to obtain some information. This can lead to information leak. (Vulnerability ID: HWPSIRT-2019-12141)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9089.
|
[
"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-ppf9-f28m-8wvh
|
A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155.
|
[] | null | null | 2.4 | null | null |
|
CVE-2021-4177
|
Generation of Error Message Containing Sensitive Information in livehelperchat/livehelperchat
|
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information
|
[
"cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
CVE-2024-35995
|
ACPI: CPPC: Use access_width over bit_width for system memory accesses
|
In the Linux kernel, the following vulnerability has been resolved:
ACPI: CPPC: Use access_width over bit_width for system memory accesses
To align with ACPI 6.3+, since bit_width can be any 8-bit value, it
cannot be depended on to be always on a clean 8b boundary. This was
uncovered on the Cobalt 100 platform.
SError Interrupt on CPU26, code 0xbe000011 -- SError
CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1
Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : cppc_get_perf_caps+0xec/0x410
lr : cppc_get_perf_caps+0xe8/0x410
sp : ffff8000155ab730
x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078
x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff
x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000
x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff
x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008
x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006
x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec
x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028
x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff
x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000
Kernel panic - not syncing: Asynchronous SError Interrupt
CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted
5.15.2.1-13 #1
Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
Call trace:
dump_backtrace+0x0/0x1e0
show_stack+0x24/0x30
dump_stack_lvl+0x8c/0xb8
dump_stack+0x18/0x34
panic+0x16c/0x384
add_taint+0x0/0xc0
arm64_serror_panic+0x7c/0x90
arm64_is_fatal_ras_serror+0x34/0xa4
do_serror+0x50/0x6c
el1h_64_error_handler+0x40/0x74
el1h_64_error+0x7c/0x80
cppc_get_perf_caps+0xec/0x410
cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]
cpufreq_online+0x2dc/0xa30
cpufreq_add_dev+0xc0/0xd4
subsys_interface_register+0x134/0x14c
cpufreq_register_driver+0x1b0/0x354
cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]
do_one_initcall+0x50/0x250
do_init_module+0x60/0x27c
load_module+0x2300/0x2570
__do_sys_finit_module+0xa8/0x114
__arm64_sys_finit_module+0x2c/0x3c
invoke_syscall+0x78/0x100
el0_svc_common.constprop.0+0x180/0x1a0
do_el0_svc+0x84/0xa0
el0_svc+0x2c/0xc0
el0t_64_sync_handler+0xa4/0x12c
el0t_64_sync+0x1a4/0x1a8
Instead, use access_width to determine the size and use the offset and
width to shift and mask the bits to read/write out. Make sure to add a
check for system memory since pcc redefines the access_width to
subspace id.
If access_width is not set, then fall back to using bit_width.
[ rjw: Subject and changelog edits, comment adjustments ]
|
[] | null | null | null | null | null |
GHSA-x49h-w39r-5qq6
|
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-4554
|
XML External Entity (XXE) Processing
|
Improper Restriction of XML External Entity Reference vulnerability in OpenText AppBuilder on Windows, Linux allows Server Side Request Forgery, Probe System Files.
AppBuilder's XML processor is vulnerable to XML External Entity Processing (XXE), allowing an authenticated user to upload specially crafted XML files to induce server-side request forgery, disclose files local to the server that processes them.
This issue affects AppBuilder: from 21.2 before 23.2.
|
[
"cpe:2.3:a:opentext:appbuilder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
GHSA-cqr9-wvm8-ffrj
|
A vulnerability was found in PHPGurukul Boat Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file status.php of the component Check Booking Status Page. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2024-42604
|
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_group.php?mode=delete&group_id=3
|
[
"cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2017-18611
|
The magic-fields plugin before 1.7.2 for WordPress has XSS via the RCCWP_CreateCustomFieldPage.php custom-field-css parameter.
|
[
"cpe:2.3:a:magicfields:magic_fields:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2012-6105
|
blog/rsslib.php in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 continues to provide a blog RSS feed after blogging is disabled, which allows remote attackers to obtain sensitive information by reading this feed.
|
[
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2017-18106
|
The identifier_hash for a session token in Atlassian Crowd before version 2.9.1 could potentially collide with an identifier_hash for another user or a user in a different directory, this allows remote attackers who can authenticate to Crowd or an application using Crowd for authentication to gain access to another user's session provided they can make their identifier hash collide with another user's session identifier hash.
|
[
"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6 | null |
|
GHSA-xm35-85mm-9382
|
A security bypass vulnerability exists in Symantec Norton App Lock 1.0.3.186 and earlier if application pinning is enabled, which could let a local malicious user bypass security restrictions.
|
[] | null | null | null | null | null |
|
GHSA-5p6r-jp46-m2mc
|
Cuppa CMS v1.0 was discovered to contain an arbitrary file deletion vulnerability via the unlink() function.
|
[] | null | null | null | null | null |
|
GHSA-p2w7-2677-hrr8
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
|
[] | null | null | null | null | null |
|
GHSA-4p2m-q353-666c
|
An authentication issue was addressed with improved state management. This issue is fixed in watchOS 10. An Apple Watch Ultra may not lock when using the Depth app.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2024:0128
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.8 | null | null | null |
GHSA-98xh-f727-782v
|
Online Ticket Booking has XSS via the admin/manageownerlist.php contact parameter.
|
[] | null | null | 4.8 | null | null |
|
GHSA-79wh-37j3-h783
|
Cisco Edge 300 software 1.0 and 1.1 on Edge 340 devices allows local users to obtain root privileges via unspecified commands, aka Bug ID CSCur18132.
|
[] | null | null | null | null | null |
|
CVE-2016-2795
|
The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
|
[
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2021-30577
|
Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2025-38450
|
wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()
Add a NULL check for msta->vif before accessing its members to prevent
a kernel panic in AP mode deployment. This also fix the issue reported
in [1].
The crash occurs when this function is triggered before the station is
fully initialized. The call trace shows a page fault at
mt7925_sta_set_decap_offload() due to accessing resources when msta->vif
is NULL.
Fix this by adding an early return if msta->vif is NULL and also check
wcid.sta is ready. This ensures we only proceed with decap offload
configuration when the station's state is properly initialized.
[14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0
[14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G
[14739.821394] Tainted: [C]=CRAP, [O]=OOT_MODULE
[14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
[14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[14739.838538] pc : mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.845271] lr : mt7925_sta_set_decap_offload+0x58/0x1b8 [mt7925_common]
[14739.851985] sp : ffffffc085efb500
[14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158
[14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001
[14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88
[14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000
[14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080
[14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000
[14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0
[14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100
[14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000
[14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8
[14739.926686] Call trace:
[14739.929130] mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.935505] ieee80211_check_fast_rx+0x19c/0x510 [mac80211]
[14739.941344] _sta_info_move_state+0xe4/0x510 [mac80211]
[14739.946860] sta_info_move_state+0x1c/0x30 [mac80211]
[14739.952116] sta_apply_auth_flags.constprop.0+0x90/0x1b0 [mac80211]
[14739.958708] sta_apply_parameters+0x234/0x5e0 [mac80211]
[14739.964332] ieee80211_add_station+0xdc/0x190 [mac80211]
[14739.969950] nl80211_new_station+0x46c/0x670 [cfg80211]
[14739.975516] genl_family_rcv_msg_doit+0xdc/0x150
[14739.980158] genl_rcv_msg+0x218/0x298
[14739.983830] netlink_rcv_skb+0x64/0x138
[14739.987670] genl_rcv+0x40/0x60
[14739.990816] netlink_unicast+0x314/0x380
[14739.994742] netlink_sendmsg+0x198/0x3f0
[14739.998664] __sock_sendmsg+0x64/0xc0
[14740.002324] ____sys_sendmsg+0x260/0x298
[14740.006242] ___sys_sendmsg+0xb4/0x110
|
[] | null | null | null | null | null |
GHSA-gr63-v8qw-4wjf
|
Cross-site scripting (XSS) vulnerability in PHP-Nuke 5.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) uname parameter in user.php, (2) ttitle, letter and file parameters in modules.php, (3) subject, story and storyext parameters in submit.php, (4) upload parameter in admin.php and (5) fname parameter in friend.php.
|
[] | null | null | null | null | null |
|
GHSA-hv5f-73mr-7vvj
|
Cross-site Scripting in Mattermost
|
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
|
[] | null | 6.1 | null | null | null |
GHSA-954m-ccf6-5rvp
|
Polycom RealPresence Web Suite before 2.2.0 does not block a user's video for a few seconds upon joining a meeting (when the user has explicitly chosen to turn off the video using a specific option). During those seconds, a meeting invitee may unknowingly be on camera with other participants able to view.
|
[] | null | null | 7.5 | null | null |
|
GHSA-hw5v-vjxm-9hpj
|
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the delid parameter at viewtreatmentrecord.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-j24m-m7v4-wr84
|
Quest KACE Systems Management Appliance Server Center 9.1.317 is vulnerable to SQL injection. An authenticated user has the ability to execute arbitrary commands against the database. The affected component is /common/user_profile.php. The affected parameter is sort_column.
|
[] | null | null | null | null | null |
|
GHSA-4c75-9mvv-68jv
|
Multiple cross-site scripting (XSS) vulnerabilities in Portix-PHP 0.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) titre or (2) auteur field in a forum post.
|
[] | null | null | null | null | null |
|
GHSA-jgwv-g855-m766
|
Cross-site scripting (XSS) vulnerability in password.asp in DUWare DUportal Pro 3.4.3 allows remote attackers to inject arbitrary web script or HTML via the result parameter.
|
[] | null | null | null | null | null |
|
RHSA-2025:8319
|
Red Hat Security Advisory: pcs security update
|
rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser
|
[
"cpe:/o:redhat:enterprise_linux:10.0"
] | null | 7.5 | null | null | null |
CVE-2016-2244
|
HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:h:hp:a2w75a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w76a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w77a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w78a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:a2w79a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b3g85a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l04a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l05a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:b5l07a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s11a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:c2s12a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ca251a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc522a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc523a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cc524a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd644a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd645a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cd646a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce989a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce990a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce991a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce992a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce993a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce994a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce995a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:ce996a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf066a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf067a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf068a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf069a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf081a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf082a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf083a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf116a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf117a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf118a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf235a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf236a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf238a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cf367a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz244a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz245a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz249a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz250a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz255a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz256a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz257a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:cz258a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l08a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l09a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d3l10a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p70a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:d7p71a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:j7x28a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:futuresmart_firmware:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 5 | null |
|
CVE-2024-33394
|
An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.
|
[
"cpe:2.3:a:kubevirt:kubevirt:-:*:*:*:*:kubernetes:*:*"
] | null | 5.9 | null | null | null |
|
CVE-2008-3890
|
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
|
[
"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:amd64:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-2pj6-5hqc-w5x9
|
CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials
|
WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[] | null | 4.2 | null | null | null |
GHSA-c5pj-hf7f-p4j3
|
A vulnerability has been reported in Suite Setups built with versions prior to InstallShield 2023 R2. This vulnerability may allow locally authenticated users to cause a Denial of Service (DoS) condition when handling move operations on local, temporary folders.
|
[] | null | 5.5 | null | null | null |
|
GHSA-xmqf-p7f5-83hr
|
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Telephony" component. It allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a Class 0 SMS message.
|
[] | null | null | 7.5 | null | null |
|
GHSA-7pwj-wph6-rxw9
|
An OS command injection vulnerability exists in the daretools binary functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
CVE-2010-4325
|
Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.
|
[
"cpe:2.3:a:novell:groupwise:*:hp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:4.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:5.57e:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp4:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp5:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5:sp6:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:groupwise:8.0.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2013-1374
|
Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0644 and CVE-2013-0649.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2023:3776
|
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
|
python: urllib.parse url blocklisting bypass
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 7.5 | null | null | null |
CVE-2017-16356
|
Reflected XSS in Kubik-Rubik SIGE (aka Simple Image Gallery Extended) before 3.3.0 allows attackers to execute JavaScript in a victim's browser by having them visit a plugins/content/sige/plugin_sige/print.php link with a crafted img, name, or caption parameter.
|
[
"cpe:2.3:a:kubik-rubik:simple_image_gallery_extended:*:*:*:*:*:joomla\\!:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2014-1949
|
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
|
[
"cpe:2.3:o:linuxmint:linux_mint:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu:14.04:*:*:*:lts:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2020-3251
|
Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Data
|
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director:6.7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
GHSA-9xcm-8x7r-552c
|
A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.
|
[] | null | 7.8 | null | null | null |
|
GHSA-4fj3-xj7w-f7cv
|
A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device.
|
[] | null | 7.5 | null | null | null |
|
GHSA-6x7c-ccx8-mqpg
|
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 126861.
|
[] | null | null | 6.5 | null | null |
|
GHSA-29vm-vjqm-q2mx
|
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
|
[] | null | 2.8 | null | null | null |
|
GHSA-xv93-mqjm-cvfq
|
In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.
|
[] | null | 5.5 | null | null | null |
|
GHSA-57fr-4f8x-2f8w
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jnwry vcOS allows Reflected XSS. This issue affects vcOS: from n/a through 1.4.0.
|
[] | null | 7.1 | null | null | null |
|
cisco-sa-20181107-ems-xml-xxe
|
Cisco Energy Management Suite XML External Entity Vulnerability
|
A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.
The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by convincing a user of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files within the affected application.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-xml-xxe ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-ems-xml-xxe"]
|
[] | null | null | 6.3 | null | null |
CVE-2014-6867
|
The Sortir en Alsace (aka com.axessweb.sortirenalsace) application 0.5b for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:sortir-en-alsace:sortir_en_alsace:0.5b:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.