id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2024-54256
WordPress Easy Blocks pro plugin <= 1.0.21 - Broken Access Control vulnerability
Missing Authorization vulnerability in Seerox Easy Blocks pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Easy Blocks pro: from n/a through 1.0.21.
[]
null
7.1
null
null
null
RHSA-2005:069
Red Hat Security Advisory: perl security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
CVE-2024-29105
WordPress WP Popups – WordPress Popup builder plugin <= 2.1.5.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Timersys WP Popups allows Stored XSS.This issue affects WP Popups: from n/a through 2.1.5.5.
[]
null
5.9
null
null
null
PYSEC-2022-271
null
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository ikus060/rdiffweb prior to 2.4.2.
[]
null
null
null
null
null
CVE-2012-1238
Session fixation vulnerability in SENCHA SNS before 1.0.2 allows remote attackers to hijack web sessions via unspecified vectors.
[ "cpe:2.3:a:icz:sencha_sns:*:*:*:*:*:*:*:*", "cpe:2.3:a:icz:sencha_sns:1.0.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-47565
scsi: mpt3sas: Fix kernel panic during drive powercycle test
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix kernel panic during drive powercycle test While looping over shost's sdev list it is possible that one of the drives is getting removed and its sas_target object is freed but its sdev object remains intact. Consequently, a kernel panic can occur while the driver is trying to access the sas_address field of sas_target object without also checking the sas_target object for NULL.
[]
null
null
null
null
null
CVE-2019-0601
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory, aka 'HID Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0600.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
4.7
1.9
null
GHSA-3crh-x73c-cq7r
In the Linux kernel, the following vulnerability has been resolved:io_uring/rsrc: validate buffer count with offset for cloningsyzbot reports that it can trigger a WARN_ON() for kmalloc() attempt that's too big:WARNING: CPU: 0 PID: 6488 at mm/slub.c:5024 __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 Modules linked in: CPU: 0 UID: 0 PID: 6488 Comm: syz-executor312 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 lr : __do_kmalloc_node mm/slub.c:-1 [inline] lr : __kvmalloc_node_noprof+0x3b4/0x640 mm/slub.c:5012 sp : ffff80009cfd7a90 x29: ffff80009cfd7ac0 x28: ffff0000dd52a120 x27: 0000000000412dc0 x26: 0000000000000178 x25: ffff7000139faf70 x24: 0000000000000000 x23: ffff800082f4cea8 x22: 00000000ffffffff x21: 000000010cd004a8 x20: ffff0000d75816c0 x19: ffff0000dd52a000 x18: 00000000ffffffff x17: ffff800092f39000 x16: ffff80008adbe9e4 x15: 0000000000000005 x14: 1ffff000139faf1c x13: 0000000000000000 x12: 0000000000000000 x11: ffff7000139faf21 x10: 0000000000000003 x9 : ffff80008f27b938 x8 : 0000000000000002 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 00000000ffffffff x4 : 0000000000400dc0 x3 : 0000000200000000 x2 : 000000010cd004a8 x1 : ffff80008b3ebc40 x0 : 0000000000000001 Call trace: __kvmalloc_node_noprof+0x520/0x640 mm/slub.c:5024 (P) kvmalloc_array_node_noprof include/linux/slab.h:1065 [inline] io_rsrc_data_alloc io_uring/rsrc.c:206 [inline] io_clone_buffers io_uring/rsrc.c:1178 [inline] io_register_clone_buffers+0x484/0xa14 io_uring/rsrc.c:1287 __io_uring_register io_uring/register.c:815 [inline] __do_sys_io_uring_register io_uring/register.c:926 [inline] __se_sys_io_uring_register io_uring/register.c:903 [inline] __arm64_sys_io_uring_register+0x42c/0xea8 io_uring/register.c:903 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600which is due to offset + buffer_count being too large. The registration code checks only the total count of buffers, but given that the indexing is an array, it should also check offset + count. That can't exceed IORING_MAX_REG_BUFFERS either, as there's no way to reach buffers beyond that limit.There's no issue with registrering a table this large, outside of the fact that it's pointless to register buffers that cannot be reached, and that it can trigger this kmalloc() warning for attempting an allocation that is too large.
[]
null
null
null
null
null
CVE-2005-4511
Format string vulnerability in TN3270 Resource Gateway 1.1.0 allows local users to cause a denial of service and possibly execute arbitrary code via format string specifiers in syslog function calls.
[ "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:curtis_hawthorne:tn3270_resource_gateway:1.1.0:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-c6fw-9pjp-59cm
A vulnerability has been identified in SIPORT MP (All versions < 3.1.4). Vulnerable versions of the device allow the creation of special accounts ("service users") with administrative privileges that could enable a remote authenticated attacker to perform actions that are not visible to other users of the system, such as granting persons access to a secured area.
[]
null
null
null
null
null
GHSA-gr2m-j2m7-6qm7
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Picture-Planet GmbH Verowa Connect allows Reflected XSS. This issue affects Verowa Connect: from n/a through 3.0.4.
[]
null
7.1
null
null
null
GHSA-rhm6-355p-2674
Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.
[]
null
8.5
null
null
null
RHSA-2022:4829
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
kernel: security regression for CVE-2018-13405 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies kernel: buffer overflow in IPsec ESP transformation code
[ "cpe:/a:redhat:rhel_eus:8.4::crb", "cpe:/o:redhat:rhel_eus:8.4::baseos" ]
null
7.8
null
null
null
CVE-2006-4234
PHP remote file inclusion vulnerability in classes/query.class.php in dotProject 2.0.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the baseDir parameter.
[ "cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotproject:dotproject:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:dotproject:dotproject:2.0.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2010:0360
Red Hat Security Advisory: wireshark security update
Wireshark: various flaws in a) RADIUS, b) Bluetooth L2CAP, c) MIOP dissectors (DoS) Wireshark: Integer overflow in the AFS dissector Wireshark: Null-ptr dereference in the InfiniBand dissector Wireshark: NULL pointer dereference in the DCERPC over SMB packet disassembly wireshark: unsigned integer wrap vulnerability in ERF reader (VU#676492) wireshark: invalid pointer dereference in SMB/SMB2 dissectors wireshark: crash in LWRES dissector
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
CVE-2008-3144
Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
[ "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2022-36289
Protection mechanism failure in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable denial of service via local access.
[ "cpe:2.3:a:intel:media_software_development_kit:*:*:*:*:*:*:*:*" ]
null
2.8
null
null
null
GHSA-r6ww-5963-7r95
Denial of Service via reachable assertion
A grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This was due to incorrect logic when handling `GOAWAY` frames.The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, dropping all in flight connections and requests.The issue was discovered by automated fuzz testing and is resolved by fixing the relevant state handling code.
[]
null
7.5
null
null
null
GHSA-hfhj-x3c5-7mgv
D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter.
[]
null
7.1
null
null
null
GHSA-q54v-7fv8-p57r
In the Linux kernel, the following vulnerability has been resolved:bnx2x: Fix multiple UBSAN array-index-out-of-boundsFix UBSAN warnings that occur when using a system with 32 physical cpu cores or more, or when the user defines a number of Ethernet queues greater than or equal to FP_SB_MAX_E1x using the num_queues module parameter.Currently there is a read/write out of bounds that occurs on the array "struct stats_query_entry query" present inside the "bnx2x_fw_stats_req" struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h". Looking at the definition of the "struct stats_query_entry query" array:struct stats_query_entry query[FP_SB_MAX_E1x+ BNX2X_FIRST_QUEUE_QUERY_IDX];FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3 meaning the array has a total size of 19. Since accesses to "struct stats_query_entry query" are offset-ted by BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet queues should not exceed FP_SB_MAX_E1x (16). However one of these queues is reserved for FCOE and thus the number of Ethernet queues should be set to [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if it is not.This is also described in a comment in the source code in drivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition of FP_SB_MAX_E1x. Below is the part of this explanation that it important for this patch/*The total number of L2 queues, MSIX vectors and HW contexts (CIDs) iscontrol by the number of fast-path status blocks supported by thedevice (HW/FW). Each fast-path status block (FP-SB) aka non-defaultstatus block represents an independent interrupts context that canserve a regular L2 networking queue. However special L2 queues suchas the FCoE queue do not require a FP-SB and other components likethe CNIC may consume FP-SB reducing the number of possible L2 queuesIf the maximum number of FP-SB available is X then:a. If CNIC is supported it consumes 1 FP-SB thus the max number ofregular L2 queues is Y=X-1b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)c. If the FCoE L2 queue is supported the actual number of L2 queuesis Y+1d. The number of irqs (MSIX vectors) is either Y+1 (one extra forslow-path interrupts) or Y+2 if CNIC is supported (one additionalFP interrupt context for the CNIC).e. The number of HW context (CID count) is always X or X+1 if FCoEL2 queue is supported. The cid for the FCoE L2 queue is always X. */However this driver also supports NICs that use the E2 controller which can handle more queues due to having more FP-SB represented by FP_SB_MAX_E2. Looking at the commits when the E2 support was added, it was originally using the E1x parameters: commit f2e0899f0f27 ("bnx2x: Add 57712 support"). Back then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver was later updated to take full advantage of the E2 instead of having it be limited to the capabilities of the E1x. But as far as we can tell, the array "stats_query_entry query" was still limited to using the FP-SB available to the E1x cards as part of an oversignt when the driver was updated to take full advantage of the E2, and now with the driver being aware of the greater queue size supported by E2 NICs, it causes the UBSAN warnings seen in the stack traces below.This patch increases the size of the "stats_query_entry query" array by replacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle both types of NICs.Stack traces:UBSAN: array-index-out-of-bounds in drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11 index 20 is out of range for type 'stats_query_entry [19]' CPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic #202405052133 Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360 ---truncated---
[]
null
7.8
null
null
null
GHSA-p8j9-f8ph-95mf
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a HL7 Sensor. When creating this sensor, the user can set the HL7 message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system.
[]
null
5.4
null
null
null
CVE-2025-30648
Junos OS and Junos OS Evolved: Receipt of a specifically malformed DHCP packet causes jdhcpd process to crash
An Improper Input Validation vulnerability in the Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS). When a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which will lead to the unavailability of the DHCP service and thereby resulting in a sustained DoS. The DHCP process will restart automatically to recover the service. This issue will occur when dhcp-security is enabled.  This issue affects Junos OS:  * All versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S6,  * from 22.4 before 22.4R3-S6,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S4,  * from 24.2 before 24.2R2;  Junos OS Evolved:  * from 22.4 before 22.4R3-S6-EVO,  * from 23.2 before 23.2R2-S3-EVO,  * from 23.4 before 23.4R2-S4-EVO,  * from 24.2 before 24.2R2-EVO. .
[]
7.1
7.4
null
null
null
GHSA-q53g-qg59-mcmj
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
[]
null
7.3
null
null
null
GHSA-hv2j-vg36-9f85
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
[]
null
null
null
null
null
CVE-2016-9913
Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:2.8.0:rc1:*:*:*:*:*:*" ]
null
6.5
null
4.9
null
CVE-2023-27787
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
[ "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2020-35947
An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. Nearly all of the AJAX action endpoints lacked permission checks, allowing these actions to be executed by anyone authenticated on the site. This happened because nonces were used as a means of authorization, but a nonce was present in a publicly viewable page. The greatest impact was the pagelayer_save_content function that allowed pages to be modified and allowed XSS to occur.
[ "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*" ]
null
7.4
null
null
null
CVE-2017-15959
Adult Script Pro 2.2.4 allows SQL Injection via the PATH_INFO to a /download URI, a different vulnerability than CVE-2007-6576.
[ "cpe:2.3:a:adultscriptpro:adultscriptpro:2.2.4:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2007-4703
The Application Firewall in Apple Mac OS X 10.5 does not prevent a root process from accepting incoming connections, even when "Block incoming connections" has been set for its associated executable, which might allow remote attackers or local root processes to bypass intended access restrictions.
[ "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-h2g8-2825-prfr
NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The directory of the device is listed openly without authentication.
[]
null
null
7.5
null
null
CVE-2015-5493
The Entityform Block module 7.x-1.x before 7.x-1.3 for Drupal does not properly check permissions when a form is locked to a role, which allows remote attackers to obtain access to certain entityforms via unspecified vectors.
[ "cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.2:*:*:*:*:drupal:*:*", "cpe:2.3:a:entityform_block_project:entityform_block:7.x-1.x-dev:*:*:*:*:drupal:*:*" ]
null
null
null
5
null
GHSA-54qq-9chj-rxhv
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
[]
null
5.4
null
null
null
GHSA-jhp8-52c5-gjpr
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob Scott Eazy Under Construction allows Reflected XSS. This issue affects Eazy Under Construction: from n/a through 1.0.
[]
null
7.1
null
null
null
GHSA-248g-g9j5-m344
An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31695439. References: QC-CR#1086123, QC-CR#1100695.
[]
null
null
7
null
null
CVE-2020-28612
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->svertices_begin().
[ "cpe:2.3:a:cgal:computational_geometry_algorithms_library:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
null
10
null
null
CVE-2018-5889
While processing a compressed kernel image, a buffer overflow can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
GHSA-w499-gpr6-v77v
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
null
6.5
null
null
null
CVE-2025-43200
This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
[]
null
4.8
null
null
null
GHSA-vpph-4gj9-3q58
Adobe InCopy version 17.3 (and earlier) and 16.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
GHSA-xhph-vfmh-3pw9
Cross-site scripting (XSS) vulnerability in the management screen in myLittleTools myLittleAdmin for SQL Server 2000 allows remote attackers to inject arbitrary web script or HTML via vectors that trigger a crafted database entry.
[]
null
null
null
null
null
CVE-2019-5787
Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
8.8
null
9.3
null
RHSA-2019:3889
Red Hat Security Advisory: kernel security update
hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
8.8
null
null
GHSA-4cxm-9rxq-69rw
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Usta" AYBS allows SQL Injection.This issue affects AYBS: before 1.0.3.
[]
null
8.8
null
null
null
GHSA-w67q-6x4j-95rh
Cross-site scripting (XSS) vulnerability in signup.asp in Pre Classified Listings 1.0 allows remote attackers to inject arbitrary web script or HTML via the address parameter.
[]
null
null
null
null
null
GHSA-2xmw-23qh-mjvr
X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys.
[]
null
null
null
null
null
CVE-2021-24278
Redirection for Contact Form 7 < 2.3.4 - Unauthenticated Arbitrary Nonce Generation
In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, unauthenticated users can use the wpcf7r_get_nonce AJAX action to retrieve a valid nonce for any WordPress action/function.
[ "cpe:2.3:a:querysol:redirection_for_contact_form_7:*:*:*:*:*:wordpress:*:*" ]
null
7.5
null
5
null
CVE-2017-9709
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a privilege escalation vulnerability exists in telephony.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-2vhv-xj4g-f2fq
Cross-site scripting vulnerability in Modern Events Calendar Lite versions prior to 6.3.0 allows remote an authenticated attacker to inject an arbitrary script via unspecified vectors.
[]
null
5.4
null
null
null
RHSA-2022:4771
Red Hat Security Advisory: postgresql security update
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
8.8
null
null
null
CVE-2008-4969
ltp-network-test 20060918 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/vsftpd.conf, (b) /tmp/udp/2/*, (c) /tmp/tcp/2/*, (d) /tmp/udp/3/*, (e) /tmp/tcp/3/*, (f) /tmp/nfs_fsstress.udp.2.log, (g) /tmp/nfs_fsstress.udp.3.log, (h) /tmp/nfs_fsstress.tcp.2.log, (i) /tmp/nfs_fsstress.tcp.3.log, and (j) /tmp/nfs_fsstress.sardata temporary files, related to the (1) ftp_setup_vsftp_conf and (2) nfs_fsstress.sh scripts.
[ "cpe:2.3:a:alastair_mckinstry:ltp-network-test:20060918:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-v68f-x6fc-xjfh
Microsoft Internet Explorer 6.0 SP1 and possibly other versions allows remote attackers to cause a denial of service and possibly execute arbitrary code by instantiating COM objects as ActiveX controls, including (1) imskdic.dll (Microsoft IME), (2) chtskdic.dll (Microsoft IME), and (3) msoe.dll (Outlook), which leads to memory corruption. NOTE: it is not certain whether the issue is in Internet Explorer or the individual DLL files.
[]
null
null
null
null
null
GHSA-h2v5-5p47-rmq3
IBM DOORS Next Generation (DNG/RRC) 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 134064.
[]
null
null
5.4
null
null
GHSA-26pm-g3r3-95jw
Multiple SQL injection vulnerabilities in DevelopItEasy Events Calendar 1.2 allow remote attackers to execute arbitrary SQL commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
CVE-2015-1894
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[ "cpe:2.3:a:ibm:optim_workload_replay:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:optim_workload_replay:2.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:optim_workload_replay:2.1.0.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2020-2157
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.
[ "cpe:2.3:a:jenkins:skytap_cloud_ci:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4
null
GHSA-6537-hg9g-m5mp
A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.
[]
null
9.1
null
null
null
CVE-2005-1667
DataTrac Activity Console 1.1 allows remote attackers to cause a denial of service via a long HTTP GET request.
[ "cpe:2.3:a:datatrac:activity_console:1.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-jrhx-6rvp-6v57
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset.
[]
null
null
null
null
null
CVE-2020-10409
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-template.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
CVE-2024-22255
Information disclosure vulnerability
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.  
[]
null
7.1
null
null
null
GHSA-h4q7-599w-vqhv
XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x000000000032e849.
[]
null
null
null
null
null
GHSA-hw2f-h9gc-5p9j
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dhanendran Rajagopal Term Taxonomy Converter allows Reflected XSS. This issue affects Term Taxonomy Converter: from n/a through 1.2.
[]
null
7.1
null
null
null
GHSA-3h9q-4c3c-c78x
A vulnerability, which was classified as problematic, has been found in Campcodes School Management Software 1.0. This issue affects some unknown processing of the file /create-id-card of the component Create Id Card Page. The manipulation of the argument ID Card Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
2.4
null
null
null
GHSA-qj5r-f9mv-rffh
`CHECK`-fails when building invalid tensor shapes in Tensorflow
ImpactMultiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes.PatchesWe have patched the reported issues in multiple GitHub commits. It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
[]
7.1
6.5
null
null
null
GHSA-5wwq-px8f-22r4
The AXM-NET module in Accuenergy Acuvim II NET Firmware 3.08 and Acuvim IIR NET Firmware 3.08 allows remote attackers to discover settings via a direct request to an unspecified URL.
[]
null
null
8.6
null
null
GHSA-952w-jx2h-f8q6
A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1120.
[]
null
null
null
null
null
GHSA-7mh7-3x3q-qg62
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability."
[]
null
null
null
null
null
GHSA-48q8-4r5f-p5pf
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent. This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
[]
null
4.1
null
null
null
GHSA-5f4r-g29m-jw8q
Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.
[]
null
4.6
null
null
null
GHSA-99p6-6hvf-f2f2
Cross-site scripting (XSS) vulnerability in the search module in Inter Network Marketing (INM) CMS G3 allows remote attackers to inject arbitrary web script or HTML via the search_string parameter.
[]
null
null
null
null
null
RHSA-2011:0839
Red Hat Security Advisory: gimp security update
Gimp: Stack-based buffer overflow in Lighting plug-in Gimp: Stack-based buffer overflow in SphereDesigner plug-in Gimp: Stack-based buffer overflow in Gfig plug-in Gimp: Heap-based buffer overflow in Paint Shop Pro (PSP) plug-in
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
null
CVE-2021-44225
In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property
[ "cpe:2.3:a:keepalived:keepalived:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
5.4
null
5.5
null
GHSA-j4g2-785h-m856
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in namithjawahar Wp-Insert plugin <= 2.5.0 versions.
[]
null
5.9
null
null
null
GHSA-v4r6-962q-6q53
A buffer overflow vulnerability in FTPDMIN 0.96 allows attackers to crash the server via a crafted packet.
[]
null
null
null
null
null
GHSA-553m-p4h3-3fm6
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded DSA SSH key for the root account.
[]
null
null
null
null
null
CVE-2014-2368
The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.
[ "cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-j4wf-9c2c-mqww
BeyondTrust Privilege Management for Windows and Mac (aka PMWM; formerly Avecto Defendpoint) 5.1 through 5.5 before 5.5 SR1 mishandles command-line arguments with PowerShell .ps1 file extensions present, leading to a DefendpointService.exe crash.
[]
null
null
null
null
null
CVE-2024-49234
WordPress Plexx Elementor Extension plugin <= 1.3.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in themeworm Plexx Elementor Extension allows Stored XSS.This issue affects Plexx Elementor Extension: from n/a through 1.3.4.
[ "cpe:2.3:a:themeworm:plexx_elementor_extension:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2015-6317
Cisco Identity Services Engine (ISE) before 2.0 allows remote authenticated users to bypass intended web-resource access restrictions via a direct request, aka Bug ID CSCuu45926.
[ "cpe:2.3:a:cisco:identity_services_engine_software:1.0.4.573:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.0_mr_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.1:p6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p8:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.2:p9:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.3:p7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1.4:p7:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(0.747\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(0.793\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(1.198\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(1.901\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2.0.899:p14:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2.1:p2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.2_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(0.722\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(0.876\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(106.146\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(120.135\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.109\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.181\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine_software:1.4\\(0.253\\):*:*:*:*:*:*:*" ]
null
null
6.5
6.8
null
GHSA-384c-q74f-g7hv
Missing authorization vulnerability exists in EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark? firmware version 1.0.1 and earlier. A successful exploitation may result in a specially crafted firmware update or unofficial firmware update being applied without user's consent via unspecified vector.
[]
null
null
null
null
null
GHSA-9r7v-c6vc-2x9c
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
[]
null
null
3.3
null
null
GHSA-m3fg-79jj-j423
The relevant plugin before 1.0.8 for WordPress has XSS.
[]
null
null
null
null
null
RHSA-2016:1594
Red Hat Security Advisory: python-django security update
django: XSS in admin's add/change related popup
[ "cpe:/a:redhat:openstack-optools:8::el7" ]
null
null
6.1
null
null
GHSA-r79w-4gmj-3cfw
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A shortcut may be able to use sensitive data with certain actions without prompting the user.
[]
null
5.5
null
null
null
GHSA-xwfw-c659-qjpj
ircu 2.10.12.01 through 2.10.12.04 does not remove ops privilege after a join from a server with an older timestamp (TS), which allows remote attackers to gain control of a channel during a split.
[]
null
null
null
null
null
CVE-2012-1475
Unspecified vulnerability in the YagattaTalk Messenger (com.iskoot.yagatta.yagattatalk) application 1.00.01.08 for Android has unknown impact and attack vectors.
[ "cpe:2.3:a:qualcomm:yagattatalk_messenger:1.00.01.08:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-5p49-gvj5-jfx2
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
[]
null
null
null
null
null
CVE-2015-1984
IBM InfoSphere Master Data Management Collaborative Edition 9.1, 10.1, 11.0, 11.3, and 11.4 before FP03 allows remote authenticated users to bypass intended access restrictions and read arbitrary profiles via unspecified vectors, as demonstrated by discovering usernames for use in brute-force attacks.
[ "cpe:2.3:a:ibm:infosphere_master_data_management:9.1:*:*:*:collaborative:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management:10.1:*:*:*:collaborative:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management:11.0:*:*:*:collaborative:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management:11.3:*:*:*:collaborative:*:*:*", "cpe:2.3:a:ibm:infosphere_master_data_management:11.4:*:*:*:collaborative:*:*:*" ]
null
null
null
4
null
CVE-2022-34390
Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
[ "cpe:2.3:o:dell:alienware_area-51_r5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area-51_r5:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area-51_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area-51_r4:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2009-0812
Stack-based buffer overflow in BreakPoint Software Hex Workshop 4.23, 6.0.1.4603, and other 6.x and earlier versions allows remote attackers to execute arbitrary code via a crafted Intel Hex Code (.hex) file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:bpsoft:hex_workshop:*:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.50:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.52:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.53:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:2.54:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.10:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.20:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.21:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.22:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:4.23:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:bpsoft:hex_workshop:6.0.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-qrwx-969j-2cxc
A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
7.4
8.8
null
null
null
RHSA-2020:2305
Red Hat Security Advisory: OpenShift Container Platform 4.2.34 openshift-enterprise-apb-tools-container security update
openshift/apb-tools: /etc/passwd is given incorrect privileges
[ "cpe:/a:redhat:openshift:4.2::el7" ]
null
7
null
null
null
CVE-2023-38602
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-53r8-3f8w-9g8r
Unspecified vulnerability in Adobe Flash Player 9.0.47.0 and earlier, when running on Opera before 9.24 on Mac OS X, has unknown "Highly Severe" impact and unknown attack vectors.
[]
null
null
null
null
null
GHSA-qf6g-2vj6-4q65
The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes.
[]
null
6.1
null
null
null
GHSA-m6f7-q6m8-788v
The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
[]
null
null
5.5
null
null
GHSA-m95x-53px-rf76
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
4.4
null
null
null
CVE-2021-22980
In Edge Client version 7.2.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, and 7.1.x-7.1.8.x before 7.1.8.5, an untrusted search path vulnerability in the BIG-IP APM Client Troubleshooting Utility (CTU) for Windows could allow an attacker to load a malicious DLL library from its current directory. User interaction is required to exploit this vulnerability in that the victim must run this utility on the Windows system. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
[ "cpe:2.3:a:f5:access_policy_manager_clients:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.9
null
CVE-2013-2317
The Sleipnir Mobile application 2.9.1 and earlier and Sleipnir Mobile Black Edition application 2.9.1 and earlier for Android allow remote attackers to spoof the address bar via vectors involving the opening of a new window.
[ "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:*:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:alpha:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:beta_update1:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.0.0:rc:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.1.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.2.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.3.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.4.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.5.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.6.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:1.7.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.2:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.3:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.0.4:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.1.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.2:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.2.3:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.3.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.4.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.5.1:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.6.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.7.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.8.0:-:black:*:*:*:*:*", "cpe:2.3:a:fenrir-inc:sleipnir_mobile:2.9.0:-:black:*:*:*:*:*" ]
null
null
null
5.8
null
PYSEC-2021-214
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.AvgPool3DGrad` is vulnerable to a heap buffer overflow. The implementation(https://github.com/tensorflow/tensorflow/blob/d80ffba9702dc19d1fac74fc4b766b3fa1ee976b/tensorflow/core/kernels/pooling_ops_3d.cc#L376-L450) assumes that the `orig_input_shape` and `grad` tensors have similar first and last dimensions but does not check that this assumption is validated. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
null