id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
CVE-2022-1491
|
Use after free in Bookmarks in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via specific and direct user interaction.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-c27x-344g-xx8m
|
In apply_minlock_constraint of dvfs.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-23709
|
WordPress WPJAM Basic Plugin <= 6.2.1 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Denis WPJAM Basic plugin <= 6.2.1 versions.
|
[
"cpe:2.3:a:wpjam_basic_project:wpjam_basic:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-696c-c795-h6h9
|
The mintToken function of a smart contract implementation for VICETOKEN_ICO_IS_A_SCAM, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
CVE-2016-4494
|
Cross-site request forgery (CSRF) vulnerability on KMC Controls BAC-5051E devices with firmware before E0.2.0.2 allows remote attackers to hijack the authentication of unspecified victims for requests that disclose the contents of a configuration file.
|
[
"cpe:2.3:h:kmc_controls:bac-5051e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:kmc_controls:bac-5051e_firmware:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2025-38341
|
eth: fbnic: avoid double free when failing to DMA-map FW msg
|
In the Linux kernel, the following vulnerability has been resolved:
eth: fbnic: avoid double free when failing to DMA-map FW msg
The semantics are that caller of fbnic_mbx_map_msg() retains
the ownership of the message on error. All existing callers
dutifully free the page.
|
[] | null | null | null | null | null |
CVE-2021-28143
|
/jsonrpc on D-Link DIR-841 3.03 and 3.04 devices allows authenticated command injection via ping, ping6, or traceroute (under System Tools).
|
[
"cpe:2.3:o:dlink:dir-841_firmware:3.03:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-841_firmware:3.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-841:-:*:*:*:*:*:*:*"
] | null | 8 | null | 7.7 | null |
|
CVE-2022-27052
|
FreeFtpd version 1.0.13 and below contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges.
|
[
"cpe:2.3:a:freesshd:freeftpd:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2024-47486
|
There is an XSS vulnerability in some HikCentral Master Lite versions. If exploited, an attacker could inject scripts into certain pages by building malicious data.
|
[
"cpe:2.3:a:hikvision:hikcentral_master:*:*:*:*:lite:*:*:*"
] | 2.1 | null | null | null | null |
|
CVE-2008-3310
|
SQL injection vulnerability in default.asp in Pre Survey Poll allows remote attackers to execute arbitrary SQL commands via the catid parameter.
|
[
"cpe:2.3:a:preproject:pre_survey_poll:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-4135
|
An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "IOFireWireFamily" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
PYSEC-2021-712
| null |
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling `ComputePaddingHeightWidth`(https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90). Since users can craft special models which will have `params->stride_{height,width}` be zero, this will result in a division by zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-jfw7-rc67-m9q7
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in XootiX Side Cart Woocommerce (Ajax) plugin <= 2.2 versions.
|
[] | null | 5.9 | null | null | null |
|
GHSA-vp9w-cxrw-6j78
|
The Sitecore Rocks plugin before 2.1.149 for Sitecore allows an unauthenticated threat actor to inject malicious commands and code via the Sitecore Rocks Hard Rocks Service.
|
[] | null | null | 9.8 | null | null |
|
CVE-2012-3261
|
Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1463.
|
[
"cpe:2.3:a:hp:sitescope:11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:sitescope:11.12:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-2480
|
An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. iCloud before 6.2 on Windows is affected. iTunes before 12.6 on Windows is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2020-22392
|
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
|
[
"cpe:2.3:a:intelliants:subrion_cms:4.2.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-1999-0358
|
Digital Unix 4.0 has a buffer overflow in the inc program of the mh package.
|
[
"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2015-7937
|
Stack-based buffer overflow in the GoAhead Web Server on Schneider Electric Modicon M340 PLC BMXNOx and BMXPx devices allows remote attackers to execute arbitrary code via a long password in HTTP Basic Authentication data.
|
[
"cpe:2.3:h:schneider-electric:bmxnoc0401:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnoe0100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnoe0100h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnoe0110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnoe0110h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnor0200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxnor0200h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:bmxpra0100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302h:-:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-9360
|
WebsiteBaker v2.10.0 has a SQL injection vulnerability in /account/details.php.
|
[
"cpe:2.3:a:websitebaker:websitebaker:2.10.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2012-4251
|
Multiple cross-site scripting (XSS) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter to index.php, (2) phase parameter to install.php, (3) tablename or (4) dbid parameter to sql.php, or (5) filename parameter to restore.php in learn/cubemail/.
|
[
"cpe:2.3:a:mysqldumper:mysqldumper:1.24.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vr33-mfmp-mhw3
|
Implicit intent hijacking vulnerability in UPHelper library prior to version 3.0.12 allows attackers to access sensitive information via implicit intent.
|
[] | null | 3.3 | null | null | null |
|
GHSA-hh96-73jp-6mhv
|
SQL injection vulnerability in search.php in WSN Guest 1.23 allows remote attackers to execute arbitrary SQL commands via the search parameter in an advanced action.
|
[] | null | null | null | null | null |
|
GHSA-3f5j-mfg2-hxvj
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.8.1.
|
[] | null | 9.3 | null | null | null |
|
RHSA-2022:6766
|
Red Hat Security Advisory: rh-python38-python security update
|
python: mailcap: findmatch() function does not sanitize the second argument python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 7.4 | null | null | null |
CVE-2019-6011
|
Cross-site scripting vulnerability in wpDataTables Lite Version 2.0.11 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:tms-outsource:wpdatatables_lite:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 | null |
|
GHSA-rgjx-66v9-vq5r
|
Directory traversal vulnerability in logreader/uploadreader.jsp in CapaSystems Performance Guard before 6.2.102 allows remote attackers to read arbitrary files via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2020-14756
|
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:coherence:3.7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-326w-5g95-5244
|
A command injection vulnerability exists in the cgibin binary in DIR-845L router firmware <= v1.01KRb03.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-32793
|
Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5, watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6. An app may be able to disclose kernel memory.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-2fj7-x5rw-vhgp
|
u'Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P
|
[] | null | 7.8 | null | null | null |
|
CVE-2013-1352
|
Verax NMS prior to 2.1.0 uses an encryption key that is hardcoded in a JAR archive.
|
[
"cpe:2.3:a:veraxsystems:network_management_system:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-836x-hw9m-wqxh
|
Stack-based buffer overflow in GetGo Download Manager 4.9.0.1982, 4.8.2.1346, 4.4.5.502, and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long HTTP Response Header.
|
[] | null | null | null | null | null |
|
CVE-2017-3637
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: X Plugin). Supported versions that are affected are 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 3.5 | null |
|
GHSA-73j6-752c-7hrj
|
Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.
|
[] | null | null | null | null | null |
|
CVE-2023-36761
|
Microsoft Word Information Disclosure Vulnerability
|
Microsoft Word Information Disclosure Vulnerability
|
[
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x86:*"
] | null | 6.5 | null | null | null |
CVE-2022-38211
|
Server Side Request Forgery (SSRF) vulnerability in Portal for ArcGIS (10.9.1, 10.8.1 and 10.7.1 only)
|
Protections against potential Server-Side Request Forgery (SSRF) vulnerabilities in Esri Portal for ArcGIS versions 10.9.1 and below were not fully honored and may allow a remote, unauthenticated attacker to forge requests to arbitrary URLs from the system, potentially leading to network enumeration or reading from hosts inside the network perimeter, a different issue than CVE-2022-38211 and CVE-2022-38212.
|
[
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-726g-cgcq-4xw8
|
Dolibarr Cross-Site Scripting (XSS) vulnerability
|
Dolibarr ERP/CRM is affected by multiple reflected Cross-Site Scripting (XSS) vulnerabilities in versions before 5.0.4: index.php (leftmenu parameter), core/ajax/box.php (PATH_INFO), product/stats/card.php (type parameter), holiday/list.php (month_create, month_start, and month_end parameters), and don/card.php (societe, lastname, firstname, address, zipcode, town, and email parameters).
|
[] | null | null | 5.4 | null | null |
GHSA-vmwq-xc6v-xj4j
|
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
|
[] | null | 9.9 | null | null | null |
|
CVE-2024-53687
|
riscv: Fix IPIs usage in kfence_protect_page()
|
In the Linux kernel, the following vulnerability has been resolved:
riscv: Fix IPIs usage in kfence_protect_page()
flush_tlb_kernel_range() may use IPIs to flush the TLBs of all the
cores, which triggers the following warning when the irqs are disabled:
[ 3.455330] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520
[ 3.456647] Modules linked in:
[ 3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7-00010-g91d3de7240b8 #1
[ 3.457416] Hardware name: QEMU QEMU Virtual Machine, BIOS
[ 3.457633] epc : smp_call_function_many_cond+0x452/0x520
[ 3.457736] ra : on_each_cpu_cond_mask+0x1e/0x30
[ 3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50
[ 3.457824] gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f
[ 3.457859] t1 : ffffffff815221e0 t2 : 000000000000000f s0 : ff2000000000bc10
[ 3.457920] s1 : 0000000000000040 a0 : ffffffff815221e0 a1 : 0000000000000001
[ 3.457953] a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000
[ 3.458006] a5 : 0000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000
[ 3.458042] s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0
[ 3.458076] s5 : ff600001ff950d00 s6 : 0000000200000120 s7 : 0000000000000001
[ 3.458109] s8 : 0000000000000001 s9 : ff60000080841ef0 s10: 0000000000000001
[ 3.458141] s11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0
[ 3.458172] t5 : 0000000000000000 t6 : ff200000000236d0
[ 3.458203] status: 0000000200000100 badaddr: ffffffff800b669a cause: 0000000000000003
[ 3.458373] [<ffffffff800b669a>] smp_call_function_many_cond+0x452/0x520
[ 3.458593] [<ffffffff800b67c2>] on_each_cpu_cond_mask+0x1e/0x30
[ 3.458625] [<ffffffff8000e4ca>] __flush_tlb_range+0x118/0x1ca
[ 3.458656] [<ffffffff8000e6b2>] flush_tlb_kernel_range+0x1e/0x26
[ 3.458683] [<ffffffff801ea56a>] kfence_protect+0xc0/0xce
[ 3.458717] [<ffffffff801e9456>] kfence_guarded_free+0xc6/0x1c0
[ 3.458742] [<ffffffff801e9d6c>] __kfence_free+0x62/0xc6
[ 3.458764] [<ffffffff801c57d8>] kfree+0x106/0x32c
[ 3.458786] [<ffffffff80588cf2>] detach_buf_split+0x188/0x1a8
[ 3.458816] [<ffffffff8058708c>] virtqueue_get_buf_ctx+0xb6/0x1f6
[ 3.458839] [<ffffffff805871da>] virtqueue_get_buf+0xe/0x16
[ 3.458880] [<ffffffff80613d6a>] virtblk_done+0x5c/0xe2
[ 3.458908] [<ffffffff8058766e>] vring_interrupt+0x6a/0x74
[ 3.458930] [<ffffffff800747d8>] __handle_irq_event_percpu+0x7c/0xe2
[ 3.458956] [<ffffffff800748f0>] handle_irq_event+0x3c/0x86
[ 3.458978] [<ffffffff800786cc>] handle_simple_irq+0x9e/0xbe
[ 3.459004] [<ffffffff80073934>] generic_handle_domain_irq+0x1c/0x2a
[ 3.459027] [<ffffffff804bf87c>] imsic_handle_irq+0xba/0x120
[ 3.459056] [<ffffffff80073934>] generic_handle_domain_irq+0x1c/0x2a
[ 3.459080] [<ffffffff804bdb76>] riscv_intc_aia_irq+0x24/0x34
[ 3.459103] [<ffffffff809d0452>] handle_riscv_irq+0x2e/0x4c
[ 3.459133] [<ffffffff809d923e>] call_on_irq_stack+0x32/0x40
So only flush the local TLB and let the lazy kfence page fault handling
deal with the faults which could happen when a core has an old protected
pte version cached in its TLB. That leads to potential inaccuracies which
can be tolerated when using kfence.
|
[] | null | null | null | null | null |
GHSA-9gjm-wj3f-w47v
|
In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002006.
|
[] | null | null | 7.8 | null | null |
|
CVE-2024-26943
|
nouveau/dmem: handle kcalloc() allocation failure
|
In the Linux kernel, the following vulnerability has been resolved:
nouveau/dmem: handle kcalloc() allocation failure
The kcalloc() in nouveau_dmem_evict_chunk() will return null if
the physical memory has run out. As a result, if we dereference
src_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs
will happen.
Moreover, the GPU is going away. If the kcalloc() fails, we could not
evict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL
flag in kcalloc().
Finally, as there is no need to have physically contiguous memory,
this patch switches kcalloc() to kvcalloc() in order to avoid
failing allocations.
|
[] | null | null | null | null | null |
CVE-2025-49862
|
WordPress Ebook Store plugin <= 5.8008 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in motov.net Ebook Store allows Stored XSS. This issue affects Ebook Store: from n/a through 5.8008.
|
[] | null | 5.9 | null | null | null |
GHSA-55mm-5399-7r63
|
Reliance on Cookies without validation in OctoberCMS
|
ImpactPreviously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.Specifically, if your usage exposed a way for users to provide unfiltered user input and have it returned to them as an encrypted cookie (ex. storing a user provided search query in a cookie) they could then use the generated cookie in place of other more tightly controlled cookies; or if your usage exposed the plaintext version of an encrypted cookie at any point to the user they could theoretically provide encrypted content from your application back to it as an encrypted cookie and force the framework to decrypt it for them.PatchesIssue has been patched in Build 468 (v1.0.468).**NOTE**: If you are using the cookie session driver, all of your session data will be invalidated. All other session drivers should smoothly upgrade to the changes (although the backend authentication persist cookie will also be invalidated requiring users to login again once their current session expires).WorkaroundsApply https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c to your installation manually if unable to upgrade to Build 468.Referenceshttps://blog.laravel.com/laravel-cookie-security-releaseshttps://github.com/laravel/framework/compare/4c7d118181d6c7f1f883643702df807ced016c5e...a731824421f9ebc586728ea9c7cff231a249aaa9For more informationIf you have any questions or comments about this advisory:Email us at [hello@octobercms.com](mailto:hello@octobercms.com)Threat AssessmentAssessed as Low given that it is not directly exploitable within the core but requires other security vulnerabilities within the application to have an effect and the severity of its effect depends entirely on the severity of those other holes in the application's defences.AcknowledgementsThanks to [Takashi Terada of Mitsui Bussan Secure Directions, Inc.](https://www.linkedin.com/in/takeshi-terada-b570a6100/) for finding the original issue in Laravel and @taylorotwell for sharing the report with the October CMS team.
|
[] | null | 6.1 | null | null | null |
CVE-2021-1854
|
A call termination issue with was addressed with improved logic. This issue is fixed in iOS 14.5 and iPadOS 14.5. A legacy cellular network can automatically answer an incoming call when an ongoing call ends or drops. .
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
GHSA-jrv8-vff8-5jvw
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in the product image upload function of VirtueMart that bypasses the CSRF protection token. An attacker is able to craft a special CSRF request which will allow unrestricted file upload into the VirtueMart media manager.
|
[] | null | 8.3 | null | null | null |
|
CVE-2011-2845
|
Google Chrome before 15.0.874.102 does not properly handle history data, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-41564
|
Tad Honor - Improper Authorization
|
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.
|
[
"cpe:2.3:a:tad_honor_project:tad_honor:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-vqxc-596q-2m8g
|
IBM Security Identity Manager 7.0.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 171511.
|
[] | null | null | null | null | null |
|
CVE-2016-1123
|
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2018-10803
|
Cross-site scripting (XSS) vulnerability in the add credentials functionality in Zoho ManageEngine NetFlow Analyzer v12.3 before 12.3.125 (build 123125) allows remote attackers to inject arbitrary web script or HTML via a crafted description value. This can be exploited through CSRF.
|
[
"cpe:2.3:a:zohocorp:manageengine_netflow_analyzer:*:5610:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-xw9j-q9c9-cxm8
|
SQL injection vulnerability in general_functions.php in TankLogger 2.4 allows remote attackers to execute arbitrary SQL commands via the (1) livestock_id parameter to showInfo.php and (2) tank_id parameter, possibly to livestock.php.
|
[] | null | null | null | null | null |
|
GHSA-3pg4-4j4q-43cp
|
In the Linux kernel, the following vulnerability has been resolved:irqchip/apple-aic: Fix refcount leak in aic_of_ic_initof_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
|
[] | null | 5.5 | null | null | null |
|
GHSA-wgqj-6qph-jqhq
|
In the Linux kernel, the following vulnerability has been resolved:wifi: carl9170: add a proper sanity check for endpointsSyzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
<TASK>
carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>[2] Related syzkaller crashes:
|
[] | null | null | null | null | null |
|
GHSA-4mcm-8fr8-677g
|
comix 3.6.4 allows attackers to execute arbitrary commands via a filename containing shell metacharacters that are not properly sanitized when executing the rar, unrar, or jpegtran programs.
|
[] | null | null | null | null | null |
|
GHSA-gpcw-f7pf-95mq
|
Multiple cross-application scripting (XAS) vulnerabilities in Google Picasa have unspecified attack vectors and impact. NOTE: this information is based upon a vague pre-advisory.
|
[] | null | null | null | null | null |
|
CVE-2016-9036
|
An exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.
|
[
"cpe:2.3:a:tarantool:msgpuck:1.0.3:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2007-2485
|
PHP remote file inclusion vulnerability in myflash-button.php in the myflash 1.00 and earlier plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the wpPATH parameter.
|
[
"cpe:2.3:a:ruben_boelinger:myflash:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-48730
|
dma-buf: heaps: Fix potential spectre v1 gadget
|
In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.
[sumits: added fixes and cc: stable tags]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-g9wf-6ppg-937x
|
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
GHSA-p734-hj82-4cvx
|
A remote code execution vulnerability exists when Microsoft .NET Framework processes input, aka '.NET Framework Remote Code Execution Vulnerability'.
|
[] | null | 7.8 | null | null | null |
|
GHSA-35gh-vgcm-m7v3
|
A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file add-admin.php. The manipulation of the argument txtpassword/txtfullname/txtemail leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 4.8 | 2.4 | null | null | null |
|
CVE-2025-48808
|
Windows Kernel Information Disclosure Vulnerability
|
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
|
[] | null | 5.5 | null | null | null |
CVE-2004-1784
|
Buffer overflow in the web server of Webcam Watchdog 3.63 allows remote attackers to execute arbitrary code via a long HTTP GET request.
|
[
"cpe:2.3:a:webcam_corp:webcam_watchdog:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:webcam_corp:webcam_watchdog:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webcam_corp:webcam_watchdog:3.63:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-3195
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF Packets Processing Memory Leak Vulnerability
|
A vulnerability in the Open Shortest Path First (OSPF) implementation in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. The vulnerability is due to incorrect processing of certain OSPF packets. An attacker could exploit this vulnerability by sending a series of crafted OSPF packets to be processed by an affected device. A successful exploit could allow the attacker to continuously consume memory on an affected device and eventually cause it to reload, resulting in a denial of service (DoS) condition.
|
[
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5510_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5520_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5540_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5550_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:9.12\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
CVE-2016-6271
|
The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
|
[
"cpe:2.3:a:bzrtp_project:bzrtp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bzrtp_project:bzrtp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bzrtp_project:bzrtp:1.0.3:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-p6r4-24w5-r764
|
Allround Automations PL/SQL Developer 11 before 11.0.6 relies on unverified HTTP data for updates, which allows man-in-the-middle attackers to execute arbitrary code by modifying fields in the client-server data stream.
|
[] | null | null | 8.1 | null | null |
|
CVE-2024-57223
|
Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_wps_gen_pincode function.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2024:3969
|
Red Hat Security Advisory: flatpak security update
|
flatpak: sandbox escape via RequestBackground portal
|
[
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/a:redhat:rhel_tus:8.6::appstream"
] | null | 8.4 | null | null | null |
CVE-2008-6499
|
security/xamppsecurity.php in XAMPP 1.6.8 performs an extract operation on the SERVER superglobal array, which allows remote attackers to spoof critical variables, as demonstrated by setting the REMOTE_ADDR variable to 127.0.0.1.
|
[
"cpe:2.3:a:apachefriends:xampp:1.6.8:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
CVE-2021-35646
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
GHSA-7j33-663j-fx7f
|
A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
|
[] | null | 6.7 | null | null | null |
|
CVE-2019-3727
|
OS command injection vulnerability
|
Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root.
|
[
"cpe:2.3:a:dell:emc_recoverpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*"
] | null | null | 6.4 | null | null |
GHSA-2f26-8mf8-c9rf
|
A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document, aka 'Microsoft Office Excel Security Feature Bypass'.
|
[] | null | null | null | null | null |
|
CVE-2021-1493
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Buffer Overflow Denial of Service Vulnerability
|
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a buffer overflow on an affected system. The vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a malicious HTTP request. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could disclose data fragments or cause the device to reload, resulting in a denial of service (DoS) condition.
|
[
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] | null | 8.5 | null | null | null |
GHSA-77vm-hfph-f8g6
|
The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The 'prayer request' and 'praise request' fields do not use proper input validation and can be used to store XSS payloads.
|
[] | null | null | null | null | null |
|
CVE-2021-33617
|
Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.
|
[
"cpe:2.3:a:zohocorp:manageengine_password_manager_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_password_manager_pro:11.2:-:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
RHSA-2021:3442
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: race condition in net/can/bcm.c leads to local privilege escalation kernel: use-after-free in route4_change() in net/sched/cls_route.c kernel: powerpc: KVM guest OS users can cause host OS memory corruption
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 7.8 | null | null | null |
GHSA-3xqm-x8h3-fh3m
|
Due to insufficient input validation, SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to send a crafted URL to a user, and by clicking the URL, the tricked user accesses SAP and might be directed with the response to somewhere out-side SAP and enter sensitive data. This could cause a limited impact on confidentiality and integrity of the application.
|
[] | null | 6.1 | null | null | null |
|
GHSA-gqfr-84mj-fvqr
|
zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file.
|
[] | null | 8.8 | null | null | null |
|
CVE-2017-1000231
|
A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.
|
[
"cpe:2.3:a:nlnetlabs:ldns:1.7.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-94wq-87g6-8h77
|
Magento Open Source allows Cross-Site Request Forgery (CSRF)
|
Adobe Commerce versions 2.4.2-p2 (and earlier), 2.4.3 (and earlier) and 2.3.7p1 (and earlier) are affected by a cross-site request forgery (CSRF) vulnerability via a Wishlist Share Link. Successful exploitation could lead to unauthorized addition to a customer's cart by an unauthenticated attacker. Access to the admin console is not required for successful exploitation.
|
[] | 4.9 | 6.5 | null | null | null |
CVE-2005-3366
|
PHP file inclusion vulnerability in index.php in PHP iCalendar 2.0a2 through 2.0.1 allows remote attackers to execute arbitrary PHP code and include arbitrary local files via the phpicalendar cookie. NOTE: this is not a cross-site scripting (XSS) issue as claimed by the original researcher.
|
[
"cpe:2.3:a:php_icalendar:php_icalendar:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:php_icalendar:php_icalendar:2.0c:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-q5wh-hr49-c2mq
|
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
|
[] | null | null | 9.8 | null | null |
|
GHSA-jqfh-7gh7-3q4c
|
Path traversal may lead to arbitrary file download. The score without
least privilege principle violation is as calculated below. In
combination with other issues it may facilitate further compromise of
the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
|
[] | 6.9 | 4.9 | null | null | null |
|
GHSA-c462-7vqc-j6jq
|
The PPTP-ALG component in CRS Carrier Grade Services Engine (CGSE) and ASR 9000 Integrated Service Module (ISM) in Cisco IOS XR allows remote attackers to cause a denial of service (module reset) via crafted packet streams, aka Bug ID CSCue91963.
|
[] | null | null | null | null | null |
|
CVE-2023-36728
|
Microsoft SQL Server Denial of Service Vulnerability
|
Microsoft SQL Server Denial of Service Vulnerability
|
[
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:odbc_driver_for_sql_server:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2014:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2016:sp3:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2017:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server:2022:*:*:*:*:*:x64:*"
] | null | 5.5 | null | null | null |
GHSA-9p5f-g2wv-w9w9
|
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413.
|
[] | null | 6.7 | null | null | null |
|
CVE-2008-2808
|
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
|
[
"cpe:2.3:o:redhat:advanced_workstation_for_the_itanium_processor:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5_server:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:as_2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5_client:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5_client:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_amd64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_i386:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_powerpc:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_sparc:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:amd64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:i386:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:sparc:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:amd64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:i386:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:lpia:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:sparc:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2014:0801
|
Red Hat Security Advisory: kernel security update
|
kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command
|
[
"cpe:/o:redhat:rhel_mission_critical:5.6"
] | null | null | null | null | null |
GHSA-24qp-pvw9-442x
|
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via crafted serialized objects, as demonstrated by limit manipulations.
|
[] | null | null | null | null | null |
|
GHSA-vcqh-2q2g-pgc3
|
The “LANDesk(R) Management Agent” service exposes a socket and once connected, it is possible to launch commands only for signed executables. This is a security bug that allows a limited user to get escalated admin privileges on their system.
|
[] | null | 8.8 | null | null | null |
|
GHSA-836m-cmjj-qv5g
|
In the Linux kernel, the following vulnerability has been resolved:usb: common: usb-conn-gpio: fix NULL pointer dereference of chargerWhen power on system with OTG cable, IDDIG's interrupt arises before
the charger registration, it will cause a NULL pointer dereference,
fix the issue by registering the power supply before requesting
IDDIG/VBUS irq.
|
[] | null | 5.5 | null | null | null |
|
CVE-2018-21030
|
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
|
[
"cpe:2.3:a:jupyter:notebook:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-mppw-43vf-5v6h
|
Directory traversal vulnerability in modules.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to read arbitrary files via a .. (dot dot) in the startdir parameter.
|
[] | null | null | null | null | null |
|
ICSA-18-317-02
|
Siemens S7-400 CPUs (Update B)
|
Specially crafted packets sent to port 102/tcp via Ethernet interface, via
PROFIBUS, or via Multi Point Interfaces (MPI) could cause the affected
devices to go into defect mode. Manual reboot is required to resume normal
operation.
Successful exploitation requires an attacker to be able to send specially
crafted packets to port 102/tcp via Ethernet interface, via PROFIBUS or Multi
Point Interfaces (MPI). No user interaction and no user privileges are
required to exploit the security vulnerability. The vulnerability could allow
causing a denial of service condition of the core functionality of the CPU,
compromising the availability of the system. Sending of specially crafted packets to port 102/tcp via Ethernet interface
via PROFIBUS or Multi Point Interfaces (MPI) could cause a denial of service
condition on affected devices. Flashing with a firmware image may be required
to recover the CPU.
Successful exploitation requires an attacker to have network access to port
102/tcp via Ethernet interface or to be able to send messages via PROFIBUS or
Multi Point Interfaces (MPI) to the device. No user interaction is required.
If no access protection is configured, no privileges are required to exploit
the security vulnerability. The vulnerability could allow causing a
denial of service condition of the core functionality of the CPU,
compromising the availability of the system.
|
[] | null | 8.2 | null | null | null |
CVE-2024-31308
|
WordPress WP Import Export Lite & WP Import Export plugin <= 3.9.26 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in VJInfotech WP Import Export Lite.This issue affects WP Import Export Lite: from n/a through 3.9.26.
|
[] | null | 4.4 | null | null | null |
GHSA-p9qv-hhrp-m74q
|
In Xpdf 4.01.01, there is an out-of-bounds read vulnerability in the function SplashXPath::strokeAdjust() located at splash/SplashXPath.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure. This is related to CVE-2018-16368.
|
[] | null | null | 5.5 | null | null |
|
CVE-2022-28733
|
Integer underflow in grub_net_recv_ip4_packets
|
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
|
[
"cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2024-10758
|
code-projects/anirbandutta9 Content Management System/News-Buzz index.php sql injection
|
A vulnerability, which was classified as critical, was found in code-projects/anirbandutta9 Content Management System and News-Buzz 1.0. This affects an unknown part of the file /index.php. The manipulation of the argument user_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is distributed under two entirely different names.
|
[
"cpe:2.3:a:code-projects:content_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:code-projects:news-buzz:*:*:*:*:*:*:*:*",
"cpe:2.3:a:anirbandutta9:news-buzz:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.