id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-43262
|
WordPress Busiprof theme <= 2.4.8 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in webriti Busiprof allows Stored XSS.This issue affects Busiprof: from n/a through 2.4.8.
|
[] | null | 6.5 | null | null | null |
CVE-2022-42825
|
This issue was addressed by removing additional entitlements. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1, macOS Big Sur 11.7.1. An app may be able to modify protected parts of the file system.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
GHSA-m6mx-rh5g-59hg
|
The Organization chart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title_input’ and 'node_description' parameter in all versions up to, and including, 1.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure charts can be extended to subscribers.
|
[] | null | 4.9 | null | null | null |
|
CVE-2008-1416
|
Multiple PHP remote file inclusion vulnerabilities in PHPauction GPL 2.51 allow remote attackers to execute arbitrary PHP code via a URL in the include_path parameter to (1) converter.inc.php, (2) messages.inc.php, and (3) settings.inc.php in includes/.
|
[
"cpe:2.3:a:phpauction:phpauction_gpl:2.51:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-21614
|
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
|
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-cv39-r3v5-92vv
|
Software installed and run as a non-privileged user may conduct improper GPU system calls to achieve unauthorised reads and writes of physical memory from the GPU HW.
|
[] | null | 8.1 | null | null | null |
|
GHSA-x577-gcc9-9xjj
|
Concrete CMS Stored XSS in Layout Preset Name
|
Concrete CMS before 8.5.14 and 9 before 9.2.3 is vulnerable to an admin adding a stored XSS payload via the Layout Preset name.
|
[] | null | 4.8 | null | null | null |
CVE-2008-7254
|
Directory traversal vulnerability in includes/template-loader.php in Irmin CMS (formerly Pepsi CMS) 0.5 and 0.6 BETA2, when register_globals is enabled, allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the _Root_Path parameter. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ermenegildo_fiorito:irmin_cms:0.6:beta2:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-4h79-7wcj-h2h9
|
Cross-site scripting (XSS) vulnerability in the Custom Search module 6.x-1.x before 6.x-1.12 and 7.x-1.x before 7.x-1.14 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the "Label text" field to the results configuration page.
|
[] | null | null | null | null | null |
|
CVE-1999-0067
|
phf CGI program allows remote command execution through shell metacharacters.
|
[
"cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ncsa:ncsa_httpd:1.5a:*:export:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-676c-p5xh-7hfr
|
An issue in uverif v.2.0 allows a remote attacker to obtain sensitive information.
|
[] | null | 5.3 | null | null | null |
|
GHSA-jcmr-v7r5-m28x
|
A vulnerability, which was classified as critical, has been found in SourceCodester Accounts Manager App 1.0. This issue affects some unknown processing of the file /endpoint/delete-account.php. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2008-1757
|
Cross-site scripting (XSS) vulnerability in index.php in the ConcoursPhoto module for KwsPHP 1.0 allows remote attackers to inject arbitrary web script or HTML via the VIEW parameter.
|
[
"cpe:2.3:a:kwsphp:kwsphp:1.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-qf9q-q4hh-qph3
|
SQL injection in blazer
|
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
|
[] | null | 7.5 | null | null | null |
GHSA-ccvf-fmjm-6rwv
|
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1451.
|
[] | null | 5.4 | null | null | null |
|
CVE-2010-4073
|
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp3:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
|
CVE-2015-3041
|
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-fqxp-2976-7m7f
|
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 223022.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-27463
|
A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.3). The audit log form of affected applications is vulnerable to SQL injection. This could allow authenticated remote attackers to execute arbitrary SQL queries on the server database.
|
[
"cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-v2m5-q8w7-pr85
|
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows remote attackers to execute arbitrary commands as root by leveraging local network access and connecting to the syseventd server, as demonstrated by copying configuration data into a readable filesystem.
|
[] | null | null | 9.8 | null | null |
|
GHSA-cv9w-qrcq-w6xh
|
Auth. Stored Cross-Site Scripting (XSS) vulnerability in iFeature Slider plugin <= 1.2 on WordPress.
|
[] | null | 5.4 | null | null | null |
|
GHSA-438j-26hg-98wc
|
SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages depending on whether the guess is correct or not.
|
[] | null | null | null | null | null |
|
CVE-2022-23318
|
A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact.
|
[
"cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:pcf2bdf_project:pcf2bdf:1.05:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.8 | null |
|
CVE-2025-1464
|
Baiyi Cloud Asset Management System admin.house.collect.php sql injection
|
A vulnerability, which was classified as critical, has been found in Baiyi Cloud Asset Management System up to 20250204. This issue affects some unknown processing of the file /wuser/admin.house.collect.php. The manipulation of the argument project_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2002-1899
|
Cross-site scripting (XSS) vulnerability in IceWarp Web Mail 3.3.3 and 3.4.5 allows remote attackers to inject arbitrary web script or HTML via the "Full Name" (addressname) parameter.
|
[
"cpe:2.3:a:icewarp:web_mail:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:icewarp:web_mail:3.3.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2018-20451
|
The process_file function in reader.c in libdoc through 2017-10-23 has a heap-based buffer over-read that allows attackers to cause a denial of service (application crash) via a crafted file.
|
[
"cpe:2.3:a:libdoc_project:libdoc:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-2vc6-9c9h-vvhf
|
IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program.
|
[] | null | 6.7 | null | null | null |
|
CVE-2020-35427
|
SQL injection vulnerability in PHPGurukul Employee Record Management System 1.1 allows remote attackers to execute arbitrary SQL commands and bypass authentication.
|
[
"cpe:2.3:a:phpgurukul:employee_record_management_system:1.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-q9hj-m4q6-fcrh
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: L2CAP: Fix user-after-freeThis uses l2cap_chan_hold_unless_zero() after calling
__l2cap_get_chan_blah() to prevent the following trace:Bluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref
*kref)
Bluetooth: chan 0000000023c4974d
Bluetooth: parent 00000000ae861c08BUG: KASAN: use-after-free in __mutex_waiter_is_first
kernel/locking/mutex.c:191 [inline]
BUG: KASAN: use-after-free in __mutex_lock_common
kernel/locking/mutex.c:671 [inline]
BUG: KASAN: use-after-free in __mutex_lock+0x278/0x400
kernel/locking/mutex.c:729
Read of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389
|
[] | null | null | null | null | null |
|
CVE-2019-2935
|
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-xpc2-5p94-w7qx
|
Multiple SQL injection vulnerabilities in the Web Services web server in SolarWinds Storage Resource Monitor (SRM) Profiler (formerly Storage Manager (STM)) before 6.2.3 allow remote attackers to execute arbitrary SQL commands via the (1) ScriptSchedule parameter in the ScriptServlet servlet; the (2) winEventId or (3) winEventLog parameter in the WindowsEventLogsServlet servlet; the (4) processOS parameter in the ProcessesServlet servlet; the (5) group, (6) groupName, or (7) clientName parameter in the BackupExceptionsServlet servlet; the (8) valDB or (9) valFS parameter in the BackupAssociationServlet servlet; the (10) orderBy or (11) orderDir parameter in the HostStorageServlet servlet; the (12) fileName, (13) sortField, or (14) sortDirection parameter in the DuplicateFilesServlet servlet; the (15) orderFld or (16) orderDir parameter in the QuantumMonitorServlet servlet; the (17) exitCode parameter in the NbuErrorMessageServlet servlet; the (18) udfName, (19) displayName, (20) udfDescription, (21) udfDataValue, (22) udfSectionName, or (23) udfId parameter in the UserDefinedFieldConfigServlet servlet; the (24) sortField or (25) sortDirection parameter in the XiotechMonitorServlet servlet; the (26) sortField or (27) sortDirection parameter in the BexDriveUsageSummaryServlet servlet; the (28) state parameter in the ScriptServlet servlet; the (29) assignedNames parameter in the FileActionAssignmentServlet servlet; the (30) winEventSource parameter in the WindowsEventLogsServlet servlet; or the (31) name, (32) ipOne, (33) ipTwo, or (34) ipThree parameter in the XiotechMonitorServlet servlet.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-13378
|
GravityForms 2.9.0.1 - 2.9.1.3 - Unauthenticated Stored Cross-Site Scripting via 'style_settings' parameter
|
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style_settings’ parameter in versions 2.9.0.1 up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The attack is only successful in the Chrome web browser, and requires directly browsing the media file via the attachment post.
|
[] | null | 5.4 | null | null | null |
CVE-2018-13474
|
The mintToken function of a smart contract implementation for FansChainToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:fanschaintoken_project:fanschaintoken:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-20368
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-57802
|
netrom: check buffer length before accessing it
|
In the Linux kernel, the following vulnerability has been resolved:
netrom: check buffer length before accessing it
Syzkaller reports an uninit value read from ax25cmp when sending raw message
through ieee802154 implementation.
=====================================================
BUG: KMSAN: uninit-value in ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
nr_dev_get+0x20e/0x450 net/netrom/nr_route.c:601
nr_route_frame+0x1a2/0xfc0 net/netrom/nr_route.c:774
nr_xmit+0x5a/0x1c0 net/netrom/nr_dev.c:144
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
raw_sendmsg+0x654/0xc10 net/ieee802154/socket.c:299
ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was created at:
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
__alloc_skb+0x318/0x740 net/core/skbuff.c:651
alloc_skb include/linux/skbuff.h:1286 [inline]
alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2780
sock_alloc_send_skb include/net/sock.h:1884 [inline]
raw_sendmsg+0x36d/0xc10 net/ieee802154/socket.c:282
ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
CPU: 0 PID: 5037 Comm: syz-executor166 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================
This issue occurs because the skb buffer is too small, and it's actual
allocation is aligned. This hides an actual issue, which is that nr_route_frame
does not validate the buffer size before using it.
Fix this issue by checking skb->len before accessing any fields in skb->data.
Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
|
[] | null | 5.5 | null | null | null |
CVE-2021-46382
|
Unauthenticated cross-site scripting (XSS) in Netgear WAC120 AC Access Point may lead to mulitple attacks like session hijacking even clipboard hijacking.
|
[
"cpe:2.3:o:netgear:wac120_ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac120_ac:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-vh8w-6548-fp72
|
Authentication bypass vulnerability in Amazing Little Poll affecting versions 1.3 and 1.4. This vulnerability could allow an unauthenticated user to access the admin panel without providing any credentials by simply accessing the "lp_admin.php?adminstep=" parameter.
|
[] | null | 9.4 | null | null | null |
|
GHSA-p5qx-8g2f-7jgh
|
In the Linux kernel, the following vulnerability has been resolved:mctp i3c: handle NULL header addressdaddr can be NULL if there is no neighbour table entry present,
in that case the tx packet should be dropped.saddr will usually be set by MCTP core, but check for NULL in case a
packet is transmitted by a different protocol.
|
[] | null | null | null | null | null |
|
CVE-2024-36202
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-frc7-r8x5-7jq8
|
In the Linux kernel, the following vulnerability has been resolved:scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()The function mpt3sas_transport_port_remove() called in
_scsih_expander_node_remove() frees the port field of the sas_expander
structure, leading to the following use-after-free splat from KASAN when
the ioc_info() call following that function is executed (e.g. when doing
rmmod of the driver module):[ 3479.371167] ==================================================================
[ 3479.378496] BUG: KASAN: use-after-free in _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.386936] Read of size 1 at addr ffff8881c037691c by task rmmod/1531
[ 3479.393524]
[ 3479.395035] CPU: 18 PID: 1531 Comm: rmmod Not tainted 5.17.0-rc8+ #1436
[ 3479.401712] Hardware name: Supermicro Super Server/H12SSL-NT, BIOS 2.1 06/02/2021
[ 3479.409263] Call Trace:
[ 3479.411743] <TASK>
[ 3479.413875] dump_stack_lvl+0x45/0x59
[ 3479.417582] print_address_description.constprop.0+0x1f/0x120
[ 3479.423389] ? _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.429469] kasan_report.cold+0x83/0xdf
[ 3479.433438] ? _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.439514] _scsih_expander_node_remove+0x710/0x750 [mpt3sas]
[ 3479.445411] ? _raw_spin_unlock_irqrestore+0x2d/0x40
[ 3479.452032] scsih_remove+0x525/0xc90 [mpt3sas]
[ 3479.458212] ? mpt3sas_expander_remove+0x1d0/0x1d0 [mpt3sas]
[ 3479.465529] ? down_write+0xde/0x150
[ 3479.470746] ? up_write+0x14d/0x460
[ 3479.475840] ? kernfs_find_ns+0x137/0x310
[ 3479.481438] pci_device_remove+0x65/0x110
[ 3479.487013] __device_release_driver+0x316/0x680
[ 3479.493180] driver_detach+0x1ec/0x2d0
[ 3479.498499] bus_remove_driver+0xe7/0x2d0
[ 3479.504081] pci_unregister_driver+0x26/0x250
[ 3479.510033] _mpt3sas_exit+0x2b/0x6cf [mpt3sas]
[ 3479.516144] __x64_sys_delete_module+0x2fd/0x510
[ 3479.522315] ? free_module+0xaa0/0xaa0
[ 3479.527593] ? __cond_resched+0x1c/0x90
[ 3479.532951] ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[ 3479.539607] ? syscall_enter_from_user_mode+0x21/0x70
[ 3479.546161] ? trace_hardirqs_on+0x1c/0x110
[ 3479.551828] do_syscall_64+0x35/0x80
[ 3479.556884] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3479.563402] RIP: 0033:0x7f1fc482483b
...
[ 3479.943087] ==================================================================Fix this by introducing the local variable port_id to store the port ID
value before executing mpt3sas_transport_port_remove(). This local variable
is then used in the call to ioc_info() instead of dereferencing the freed
port structure.
|
[] | null | 7.8 | null | null | null |
|
CVE-2022-38619
|
SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /SVFE2/pages/feegroups/mcc_group.jsf.
|
[
"cpe:2.3:a:bpcbt:smartvista_front-end:2.2.22:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-w2jh-vqmr-h6gp
|
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /pages/receipt_credit.php. The manipulation of the argument sid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
RHSA-2011:0200
|
Red Hat Security Advisory: krb5 security update
|
krb5: kpropd unexpected termination on invalid input (MITKRB5-SA-2011-001) krb5: KDC hang when using LDAP backend caused by special principal name (MITKRB5-SA-2011-002) krb5: KDC crash when using LDAP backend caused by a special principal name (MITKRB5-SA-2011-002)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2021-4186
|
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
|
CVE-2008-1690
|
WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:seattle_lab_software:slmail_pro:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2008-6908
|
Services 5.x before 5.x-0.92 and 6.x before 6.x-0.13, a module for Drupal, uses an insecure hash when signing requests, which allows remote attackers to impersonate other users and gain privileges.
|
[
"cpe:2.3:a:marc_ingram:services:5.x-0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:5.x-0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:5.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:6.x-0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:6.x-0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:6.x-0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:marc_ingram:services:6.x-1.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2019-6646
|
On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2018-12230
|
An wrong logical check identified in the transferFrom function of a smart contract implementation for RemiCoin (RMC), an Ethereum ERC20 token, allows the attacker to steal tokens or conduct resultant integer underflow attacks.
|
[
"cpe:2.3:a:remicoin_project:remicoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2008-4161
|
SQL injection vulnerability in search_inv.php in Assetman 2.5b allows remote attackers to execute arbitrary SQL commands and conduct session fixation attacks via a combination of crafted order and order_by parameters in a search_all action.
|
[
"cpe:2.3:a:assetman:assetman:2.5b:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2017-14563
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a "Read Access Violation on Block Data Move starting at STDUXPSFile!DllUnregisterServer+0x0000000000005311."
|
[
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
CVE-2024-40404
|
Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered to contain an access control issue in the API endpoint where Web Sockets connections are established.
|
[
"cpe:2.3:a:cybelesoft:thinfinity_workspace:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-6xwm-63wf-q2q3
|
In the Linux kernel, the following vulnerability has been resolved:usb: musb: dsps: Fix the probe error pathCommit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after
initializing musb") has inverted the calls to
dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without
updating correctly the error path. dsps_create_musb_pdev() allocates and
registers a new platform device which must be unregistered and freed
with platform_device_unregister(), and this is missing upon
dsps_setup_optional_vbus_irq() error.While on the master branch it seems not to trigger any issue, I observed
a kernel crash because of a NULL pointer dereference with a v5.10.70
stable kernel where the patch mentioned above was backported. With this
kernel version, -EPROBE_DEFER is returned the first time
dsps_setup_optional_vbus_irq() is called which triggers the probe to
error out without unregistering the platform device. Unfortunately, on
the Beagle Bone Black Wireless, the platform device still living in the
system is being used by the USB Ethernet gadget driver, which during the
boot phase triggers the crash.My limited knowledge of the musb world prevents me to revert this commit
which was sent to silence a robot warning which, as far as I understand,
does not make sense. The goal of this patch was to prevent an IRQ to
fire before the platform device being registered. I think this cannot
ever happen due to the fact that enabling the interrupts is done by the
->enable() callback of the platform musb device, and this platform
device must be already registered in order for the core or any other
user to use this callback.Hence, I decided to fix the error path, which might prevent future
errors on mainline kernels while also fixing older ones.
|
[] | null | 5.5 | null | null | null |
|
CVE-2013-5715
|
Buffer overflow in Gretech GOM Media Player before 2.2.53.5169 has unspecified impact and attack vectors.
|
[
"cpe:2.3:a:gomlab:gom_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.9.3753:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.9.3754:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.14.4525:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.15.4610:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.16.4631:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.17.4710:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.18.4762:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.21.4846:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.25.5015:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.27.5031:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.28.5039:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.33.5071:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.37.5085:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.39.5101:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.40.5106:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.43.5119:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.47.5133:*:*:*:*:*:*:*",
"cpe:2.3:a:gomlab:gom_player:2.1.49.5139:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-x9q9-5gcc-4mvx
|
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. When there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries), a use-after-free can occur with resultant remote code execution (or an information leak).
|
[] | null | null | null | null | null |
|
CVE-2023-3942
|
Multiple SQLi in ZkTeco-based OEM devices
|
An 'SQL Injection' vulnerability, due to improper neutralization of special elements used in SQL commands, exists in ZKTeco-based OEM devices. This vulnerability allows an attacker to, in some cases, impersonate another user or perform unauthorized actions. In other instances, it enables the attacker to access user data and system parameters from the database.
This issue affects
ZkTeco-based OEM devices (ZkTeco ProFace X, Smartec ST-FR043, Smartec ST-FR041ME and possibly others)
with firmware
ZAM170-NF-1.8.25-7354-Ver1.0.0 and possibly other, Standalone service v. 2.1.6-20200907 and possibly others.
|
[
"cpe:2.3:h:zkteco:smartec_st_fr043:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zkteco:smartec_st_fr041me:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zkteco:facedepot_7b:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2025-21904
|
caif_virtio: fix wrong pointer check in cfv_probe()
|
In the Linux kernel, the following vulnerability has been resolved:
caif_virtio: fix wrong pointer check in cfv_probe()
del_vqs() frees virtqueues, therefore cfv->vq_tx pointer should be checked
for NULL before calling it, not cfv->vdev. Also the current implementation
is redundant because the pointer cfv->vdev is dereferenced before it is
checked for NULL.
Fix this by checking cfv->vq_tx for NULL instead of cfv->vdev before
calling del_vqs().
|
[] | null | 5.5 | null | null | null |
GHSA-7xrv-jv66-7q59
|
IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
|
[] | null | 7.8 | null | null | null |
|
GHSA-pr65-pvq8-rq7c
|
Possible race condition during async fastrpc session after sending RPC message due to the fastrpc ctx gets free during async session in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile
|
[] | null | null | null | null | null |
|
CVE-2023-26098
|
An issue was discovered in the Open Document feature in Telindus Apsal 3.14.2022.235 b. An attacker may upload a crafted file to execute arbitrary code.
|
[
"cpe:2.3:a:telindus:apsal:3.14.2022.235_b:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
|
GHSA-xxqx-377j-rrqc
|
In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WriteOneJNGImage in coders/png.c, which allows attackers to cause a denial of service (WriteJNGImage memory consumption) via a crafted file.
|
[] | null | null | 6.5 | null | null |
|
GHSA-c55w-vh5p-vrr3
|
SQL injection vulnerability in the SAV Filter Alphabetic (sav_filter_abc) extension before 1.0.9 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2018-15713
|
Nagios XI 5.5.6 allows persistent cross site scripting from remote authenticated attackers via the stored email address in admin/users.php.
|
[
"cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2021-37543
|
In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects.
|
[
"cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2023-35080
|
A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
|
[
"cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:secure_access_client:22.6:r1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2024-26795
|
riscv: Sparse-Memory/vmemmap out-of-bounds fix
|
In the Linux kernel, the following vulnerability has been resolved:
riscv: Sparse-Memory/vmemmap out-of-bounds fix
Offset vmemmap so that the first page of vmemmap will be mapped
to the first page of physical memory in order to ensure that
vmemmap’s bounds will be respected during
pfn_to_page()/page_to_pfn() operations.
The conversion macros will produce correct SV39/48/57 addresses
for every possible/valid DRAM_BASE inside the physical memory limits.
v2:Address Alex's comments
|
[] | null | 5.5 | null | null | null |
CVE-2012-1594
|
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*"
] | null | null | null | 3.3 | null |
|
CVE-2018-0862
|
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
|
[
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
CVE-2019-9390
|
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117551475
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-9889-rr58-7c63
|
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
|
[] | null | null | null | null | null |
|
CVE-2025-47618
|
WordPress BMI Adult & Kid Calculator plugin <= 1.2.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mortgage Calculator BMI Adult & Kid Calculator allows Reflected XSS. This issue affects BMI Adult & Kid Calculator: from n/a through 1.2.2.
|
[] | null | 7.1 | null | null | null |
GHSA-hj69-c76v-86wr
|
Out-of-bounds Read in Pillow
|
`libImaging/FliDecode.c` in Pillow before 6.2.2 has an FLI buffer overflow.
|
[] | 8.3 | 7.1 | null | null | null |
GHSA-hcfx-4jwp-9pgh
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in biplob018 Image Hover Effects for Elementor with Lightbox and Flipbox plugin <= 2.8 versions.
|
[] | null | 6.1 | null | null | null |
|
CVE-2025-46999
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2011-3901
|
Android SQLite Journal before 4.0.1 has an information disclosure vulnerability.
|
[
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2006-7098
|
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
|
[
"cpe:2.3:a:debian:apache:1.3.34.4:*:*:*:*:*:*:*"
] | null | null | null | 6.6 | null |
|
CVE-2017-18406
|
cPanel before 67.9999.103 allows SQL injection during eximstats processing (SEC-276).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-26002
|
PHOENIX CONTACT: File ownership manipulation in CHARX Series
|
An improper input validation in the Qualcom plctool allows a local attacker with low privileges to gain root access by changing the ownership of specific files.
|
[
"cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2012-0028
|
The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.27.61:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2022-33164
|
IBM Security Directory Server path traversal
|
IBM Security Directory Server 7.2.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view or write to arbitrary files on the system. IBM X-Force ID: 228579.
|
[
"cpe:2.3:a:ibm:security_directory_server:7.2.0:*:*:*:*:*:*:*"
] | null | 8.7 | null | null | null |
CVE-2018-9275
|
In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors).
|
[
"cpe:2.3:a:yubico:yubico_pam:*:*:*:*:*:yubico:*:*"
] | null | null | 8.2 | 6.4 | null |
|
CVE-2018-9145
|
In the DataBuf class in include/exiv2/types.hpp in Exiv2 0.26, an issue exists in the constructor with an initial buffer size. A large size value may lead to a SIGABRT during an attempt at memory allocation. NOTE: some third parties have been unable to reproduce the SIGABRT when using the 4-DataBuf-abort-1 PoC file.
|
[
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2007-6549
|
Unspecified vulnerability in RunCMS before 1.6.1 has unknown impact and attack vectors, related to "pagetype using."
|
[
"cpe:2.3:a:runcms:runcms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-6jm4-p692-pwq2
|
WordPress before 4.5.3 allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.
|
[] | null | null | 7.5 | null | null |
|
CVE-2017-9988
|
The readEncUInt30 function in util/read.c in libming 0.4.8 mishandles memory allocation. A crafted input will lead to a remote denial of service (NULL pointer dereference) attack against parser.c.
|
[
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2013-3580
|
The TrustGo Antivirus & Mobile Security application before 1.3.6 for Android allows attackers to cause a denial of service (application crash) via a crafted application that sends an intent to com.trustgo.mobile.security.USSDScannerActivity with zero arguments.
|
[
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.2.7:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.2.8:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.2.9:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.0:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.1:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.2:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.3:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.4:-:*:*:*:android:*:*",
"cpe:2.3:a:trustgo:antivirus_\\&_mobile_security:1.3.5:-:*:*:*:android:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2006-0846
|
Multiple cross-site scripting (XSS) vulnerabilities in Leif M. Wright's Blog 3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Referer and (2) User-Agent HTTP headers, which are stored in a log file and not sanitized when the administrator views the "Log" page, possibly using the ViewCommentsLog function.
|
[
"cpe:2.3:a:leif_m._wright:web_blog:3.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2024:7237
|
Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.13
|
go-retryablehttp: url might write sensitive information to log file
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 6 | null | null | null |
CVE-2024-5189
|
Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders <= 5.9.23 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘custom_js’ parameter in all versions up to, and including, 5.9.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-vj84-vh8m-pr8h
|
Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe CMS & Framework 3.1.13 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter to install.php.
|
[] | null | null | null | null | null |
|
CVE-2014-0405
|
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0407.
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-r65r-9cgr-5wq7
|
Cross-site request forgery (CSRF) vulnerability in actions.php in Positive Software H-Sphere WebShell 4.3.10 allows remote attackers to perform unauthorized actions as an administrator, including file deletion and creation, via a link or IMG tag to the (1) overkill, (2) futils, or (3) edit actions.
|
[] | null | null | null | null | null |
|
CVE-2017-5374
|
Memory safety bugs were reported in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 51.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.