id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-f8c7-6vm5-4jrm
|
Stack consumption vulnerability in Internet Explorer The JavaScript settimeout function in Internet Explorer allows remote attackers to cause a denial of service (crash) via the JavaScript settimeout function. NOTE: the vendor could not reproduce the problem.
|
[] | null | null | null | null | null |
|
CVE-2024-22292
|
WordPress WP To Do Plugin <= 1.2.8 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Delower WP To Do allows Stored XSS.This issue affects WP To Do: from n/a through 1.2.8.
|
[
"cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-rhjh-rphp-w26x
|
IBM FileNet Workplace 4.0.2 before 4.0.2.14 LA012 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[] | null | null | 8.1 | null | null |
|
GHSA-99hf-385j-mp2j
|
Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0, contain a Use of Hard-coded Cryptographic Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.
|
[] | null | 8.4 | null | null | null |
|
CVE-2021-29210
|
A remote dom xss, crlf injection vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78.
|
[
"cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10_g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:simplivity_380_gen10_h:-:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 | null |
|
GHSA-4rm2-h745-5rf8
|
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
|
[] | null | null | null | null | null |
|
CVE-2024-27135
|
Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution
|
Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true".
This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0.
2.10 Pulsar Function Worker users should upgrade to at least 2.10.6.
2.11 Pulsar Function Worker users should upgrade to at least 2.11.4.
3.0 Pulsar Function Worker users should upgrade to at least 3.0.3.
3.1 Pulsar Function Worker users should upgrade to at least 3.1.3.
3.2 Pulsar Function Worker users should upgrade to at least 3.2.1.
Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
|
[
"cpe:2.3:a:apache:pulsar:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:2.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:3.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:3.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:pulsar:3.2.0:-:*:*:*:*:*:*"
] | null | 8.5 | null | null | null |
CVE-2011-1663
|
SQL injection vulnerability in the Translation Management module 6.x before 6.x-1.21 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:icanlocalize:translation_management:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-12313
|
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
|
[
"cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 5.8 | null |
|
CVE-2001-0648
|
Directory traversal vulnerability in PHProjekt 2.1 and earlier allows a remote attacker to conduct unauthorized activities via a dot dot (..) attack on the file module.
|
[
"cpe:2.3:a:phprojekt:phprojekt:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phprojekt:phprojekt:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phprojekt:phprojekt:2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-269x-pg5c-5xgm
|
Apache Airflow Execution with Unnecessary Privileges
|
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0.This issue affects Apache Airflow: before 2.6.0.
|
[] | 8.7 | 8.8 | null | null | null |
GHSA-m3ch-223f-43c6
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
|
[] | null | null | null | null | null |
|
GHSA-9mfm-jpv6-46g5
|
A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.
|
[] | null | 5.3 | null | null | null |
|
RHSA-2019:3207
|
Red Hat Security Advisory: Ansible security and bug fix update
|
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
|
[
"cpe:/a:redhat:ansible_engine:2::el7",
"cpe:/a:redhat:ansible_engine:2::el8"
] | null | 5 | 6.4 | null | null |
RHSA-2024:2966
|
Red Hat Security Advisory: ghostscript security update
|
ghostscript: Divide by zero in eps_print_page in gdevepsn.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null | null |
GHSA-7mch-783h-q63m
|
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
|
[] | null | null | null | null | null |
|
cisco-sa-ftd-snort3-8U4HHxH8
|
Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
|
A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart.
This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. See the Details ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr#details"] section of this advisory for more information. The Snort detection engine will restart automatically. No manual intervention is required.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985"].
|
[] | null | 4 | null | null | null |
CVE-2019-8747
|
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in watchOS 6.1. An application may be able to execute arbitrary code with kernel privileges.
|
[
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
GHSA-gqvm-7mf4-cx8m
|
An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
|
[] | null | null | 8.8 | null | null |
|
CVE-2002-0005
|
Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote attackers to execute arbitrary code via a long argument in a game request (AddGame).
|
[
"cpe:2.3:a:aol:instant_messenger:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.3.2229:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.7.2480:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:4.8.2616:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2017-12976
|
git-annex before 6.20170818 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, as demonstrated by an ssh://-eProxyCommand= URL, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-1000116, and CVE-2017-1000117.
|
[
"cpe:2.3:a:git-annex_project:git-annex:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-rqjf-f44q-4mvw
|
The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS.
|
[] | null | null | null | null | null |
|
GHSA-h7f6-hc46-frrv
|
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure.
|
[] | null | 7.4 | null | null | null |
|
CVE-2017-14563
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a "Read Access Violation on Block Data Move starting at STDUXPSFile!DllUnregisterServer+0x0000000000005311."
|
[
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 | null |
|
RHSA-2012:1211
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7) (MFSA 2012-57) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Memory corruption with bitmap format images with negative height (MFSA 2012-61) Mozilla: WebGL use-after-free and memory corruption (MFSA 2012-62) Mozilla: WebGL use-after-free and memory corruption (MFSA 2012-62) Mozilla: SVG buffer overflow and use-after-free issues (MFSA 2012-63) Mozilla: SVG buffer overflow and use-after-free issues (MFSA 2012-63) Mozilla: Out-of-bounds read in format-number in XSLT (MFSA 2012-65) Mozilla: Location object security checks bypassed by chrome code (MFSA 2012-70) Mozilla: Web console eval capable of executing chrome-privileged code (MFSA 2012-72)
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2025-38577
|
f2fs: fix to avoid panic in f2fs_evict_inode
|
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid panic in f2fs_evict_inode
As syzbot [1] reported as below:
R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450
R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520
</TASK>
---[ end trace 0000000000000000 ]---
==================================================================
BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62
Read of size 8 at addr ffff88812d962278 by task syz-executor/564
CPU: 1 PID: 564 Comm: syz-executor Tainted: G W 6.1.129-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
<TASK>
__dump_stack+0x21/0x24 lib/dump_stack.c:88
dump_stack_lvl+0xee/0x158 lib/dump_stack.c:106
print_address_description+0x71/0x210 mm/kasan/report.c:316
print_report+0x4a/0x60 mm/kasan/report.c:427
kasan_report+0x122/0x150 mm/kasan/report.c:531
__asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351
__list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62
__list_del_entry include/linux/list.h:134 [inline]
list_del_init include/linux/list.h:206 [inline]
f2fs_inode_synced+0xf7/0x2e0 fs/f2fs/super.c:1531
f2fs_update_inode+0x74/0x1c40 fs/f2fs/inode.c:585
f2fs_update_inode_page+0x137/0x170 fs/f2fs/inode.c:703
f2fs_write_inode+0x4ec/0x770 fs/f2fs/inode.c:731
write_inode fs/fs-writeback.c:1460 [inline]
__writeback_single_inode+0x4a0/0xab0 fs/fs-writeback.c:1677
writeback_single_inode+0x221/0x8b0 fs/fs-writeback.c:1733
sync_inode_metadata+0xb6/0x110 fs/fs-writeback.c:2789
f2fs_sync_inode_meta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159
block_operations fs/f2fs/checkpoint.c:1269 [inline]
f2fs_write_checkpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658
kill_f2fs_super+0x231/0x390 fs/f2fs/super.c:4668
deactivate_locked_super+0x98/0x100 fs/super.c:332
deactivate_super+0xaf/0xe0 fs/super.c:363
cleanup_mnt+0x45f/0x4e0 fs/namespace.c:1186
__cleanup_mnt+0x19/0x20 fs/namespace.c:1193
task_work_run+0x1c6/0x230 kernel/task_work.c:203
exit_task_work include/linux/task_work.h:39 [inline]
do_exit+0x9fb/0x2410 kernel/exit.c:871
do_group_exit+0x210/0x2d0 kernel/exit.c:1021
__do_sys_exit_group kernel/exit.c:1032 [inline]
__se_sys_exit_group kernel/exit.c:1030 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1030
x64_sys_call+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f28b1b8e169
Code: Unable to access opcode bytes at 0x7f28b1b8e13f.
RSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360
R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360
R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520
</TASK>
Allocated by task 569:
kasan_save_stack mm/kasan/common.c:45 [inline]
kasan_set_track+0x4b/0x70 mm/kasan/common.c:52
kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505
__kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:328
kasan_slab_alloc include/linux/kasan.h:201 [inline]
slab_post_alloc_hook+0x4f/0x2c0 mm/slab.h:737
slab_alloc_node mm/slub.c:3398 [inline]
slab_alloc mm/slub.c:3406 [inline]
__kmem_cache_alloc_lru mm/slub.c:3413 [inline]
kmem_cache_alloc_lru+0x104/0x220 mm/slub.c:3429
alloc_inode_sb include/linux/fs.h:3245 [inline]
f2fs_alloc_inode+0x2d/0x340 fs/f2fs/super.c:1419
alloc_inode fs/inode.c:261 [inline]
iget_locked+0x186/0x880 fs/inode.c:1373
f2fs_iget+0x55/0x4c60 fs/f2fs/inode.c:483
f2fs_lookup+0x366/0xab0 fs/f2fs/namei.c:487
__lookup_slow+0x2a3/0x3d0 fs/namei.c:1690
lookup_slow+0x57/0x70 fs/namei.c:1707
walk_component+0x2e6/0x410 fs/namei
---truncated---
|
[] | null | null | null | null | null |
CVE-2024-50355
|
LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints
|
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0.
|
[
"cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null |
CVE-2011-2382
|
Microsoft Internet Explorer 8 and earlier, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue.
|
[
"cpe:2.3:a:microsoft:ie:9:beta:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.40.308:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.40.520:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.70.1155:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.70.1158:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.70.1215:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.70.1300:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.71.544:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.71.1008.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.71.1712.6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.72.2106.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.72.3110.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.72.3612.1713:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.0518.10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.0910.1309:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2014.0216:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2314.1003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2516.1900:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2614.3500:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2919.800:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2919.3800:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2919.6307:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.2920.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3103.1000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3105.0106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3314.2101:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3315.1000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3502.1000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.00.3700.1000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:preview:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.3825.1300:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4030.2400:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4134.0100:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4134.0600:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4308.2900:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4522.1800:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.50.4807.2300:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-pffp-cxqq-7pcw
|
A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet.
|
[] | null | 8.6 | null | null | null |
|
GHSA-xjcx-58p2-6mm5
|
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ attribute of the Posts Slider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-q3f5-cm95-p5vp
|
There is a buffer overflow vulnerability in some ZTE mobile internet producsts. Due to insufficient validation of tcp port parameter, an authenticated attacker could use the vulnerability to perform a denial of service attack.
|
[] | null | 5.9 | null | null | null |
|
GHSA-9wvh-ff5f-xjpj
|
Missing Authorization in Harbor
|
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API. This is fixed in 1.9.0-rc1.
|
[] | null | 6.5 | null | null | null |
CVE-2018-8849
|
Medtronic N'Vision Clinician Programmer Missing Encryption of Sensitive Data
|
Medtronic N'Vision Clinician Programmer 8840 N'Vision Clinician Programme and 8870 N'Vision removable Application Card do not encrypt PII and PHI while at rest.
|
[
"cpe:2.3:o:medtronic:n\\'vision_8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:n\\'vision_8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:n\\'vision_8870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:n\\'vision_8870:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null | null |
RHSA-2024:1492
|
Red Hat Security Advisory: thunderbird security update
|
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.5 | null | null | null |
GHSA-qx55-87x4-r7qf
|
A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924.
|
[] | null | null | 4.7 | null | null |
|
GHSA-r6j7-f2g3-33m3
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
[] | null | 8.8 | null | null | null |
|
GHSA-9hvf-pfq3-7pp6
|
CSRF vulnerability in Jenkins Amazon EC2 Plugin
|
Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.This vulnerability might also allow attackers to capture credentials stored in Jenkins. We have not been able to confirm that this is possible.Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability.Amazon EC2 Plugin 1.48 requires POST requests and Overall/Administer permission for the affected form validation methods.
|
[] | null | 3.1 | null | null | null |
RHSA-2023:2810
|
Red Hat Security Advisory: poppler security update
|
poppler: integer overflow in JBIG2 decoder using malformed files
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.8 | null | null | null |
GHSA-3qjf-f83f-x2pm
|
XML external entity (XXE) vulnerability in bkr/server/jobs.py in Beaker before 20.1 allows remote authenticated users to obtain sensitive information via submitting job XML to the server containing entity references which reference files from the Beaker server's file system.
|
[] | null | null | 4.3 | null | null |
|
CVE-2024-47195
|
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
|
[
"cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*"
] | 5.4 | 6.7 | null | null | null |
|
GHSA-8j5h-cxpp-7g62
|
7-Zip through 24.09 does not report an error for certain invalid xz files, involving stream flags and reserved bits.
|
[] | null | 2.5 | null | null | null |
|
GHSA-vj54-cjrx-x696
|
Observable Discrepancy in Argo
|
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.Specific Go Packages Affectedgithub.com/argoproj/argo-cd/util/session
github.com/argoproj/argo-cd/server/session
|
[] | null | 5.3 | null | null | null |
ICSA-25-226-06
|
Siemens Opcenter Quality
|
The affected application does not enforce mandatory authorization on some functionality level at server side. This could allow an authenticated attacker to gain complete access of the application. The affected application do not encrypt the communication in LDAP interface by default. This could allow an authenticated attacker to gain unauthorized access to sensitive information. The affected application does not have adequate encryption of sensitive information. This could allow an authenticated attacker to gain access of sensitive information. The affected application displays SQL statement in the error messages encountered during the generation of reports using Cockpit tool. The affected application improperly handles error while accessing an inaccessible resource leading to exposing the system applications. The affected application does not expire the session without logout. This could allow an attacker to get unauthorized access if the session is left idle. The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.
|
[] | null | 6.4 | null | null | null |
GHSA-4j79-4m6q-77vf
|
Subrion CMS PHP Object Injection
|
`includes/classes/ia.core.users.php` in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request.
|
[] | null | null | 9.8 | null | null |
CVE-2025-46454
|
WordPress Meta Keywords & Description <= 0.8 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in svil4ok Meta Keywords & Description allows PHP Local File Inclusion. This issue affects Meta Keywords & Description: from n/a through 0.8.
|
[] | null | 7.5 | null | null | null |
GHSA-f52f-87gv-xwq9
|
An issue was discovered in Papaya Viewer 4a42701. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application
|
[] | null | 6.1 | null | null | null |
|
GHSA-6m45-rhxg-8qpr
|
Ashlar-Vellum Cobalt AR File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of AR files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20408.
|
[] | null | null | 7.8 | null | null |
|
CVE-2011-1126
|
VMware vmrun, as used in VIX API 1.x before 1.10.3 and VMware Workstation 6.5.x and 7.x before 7.1.4 build 385536 on Linux, might allow local users to gain privileges via a Trojan horse shared library in an unspecified directory.
|
[
"cpe:2.3:a:vmware:vix_api:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vix_api:1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-2m7j-prfm-384p
|
Buffer overflow in mah-jong 1.5.6 and earlier allows remote attackers to execute arbitrary code.
|
[] | null | null | null | null | null |
|
CVE-2024-5279
|
Qiwen Netdisk File Rename cross site scripting
|
A vulnerability was found in Qiwen Netdisk up to 1.4.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component File Rename Handler. The manipulation with the input <img src="" onerror="alert(document.cookie)"> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266083.
|
[
"cpe:2.3:a:qiwen:netdisk:*:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 | null |
GHSA-r299-gjv8-v58g
|
An incorrect configuration of the EZMall 2000 shopping cart CGI program "mall2000.cgi" could disclose private information.
|
[] | null | null | null | null | null |
|
CVE-2024-43252
|
WordPress Crew HRM plugin <= 1.1.1 - PHP Object Injection vulnerability
|
Deserialization of Untrusted Data vulnerability in Crew HRM allows Object Injection.This issue affects Crew HRM: from n/a through 1.1.1.
|
[
"cpe:2.3:a:crewhrm:crewhrm:*:*:*:*:*:*:*:*"
] | null | 9 | null | null | null |
CVE-2019-15952
|
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
|
[
"cpe:2.3:a:totaljs:total.js_cms:12.0.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2023-52771
|
cxl/port: Fix delete_endpoint() vs parent unregistration race
|
In the Linux kernel, the following vulnerability has been resolved:
cxl/port: Fix delete_endpoint() vs parent unregistration race
The CXL subsystem, at cxl_mem ->probe() time, establishes a lineage of
ports (struct cxl_port objects) between an endpoint and the root of a
CXL topology. Each port including the endpoint port is attached to the
cxl_port driver.
Given that setup, it follows that when either any port in that lineage
goes through a cxl_port ->remove() event, or the memdev goes through a
cxl_mem ->remove() event. The hierarchy below the removed port, or the
entire hierarchy if the memdev is removed needs to come down.
The delete_endpoint() callback is careful to check whether it is being
called to tear down the hierarchy, or if it is only being called to
teardown the memdev because an ancestor port is going through
->remove().
That care needs to take the device_lock() of the endpoint's parent.
Which requires 2 bugs to be fixed:
1/ A reference on the parent is needed to prevent use-after-free
scenarios like this signature:
BUG: spinlock bad magic on CPU#0, kworker/u56:0/11
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023
Workqueue: cxl_port detach_memdev [cxl_core]
RIP: 0010:spin_bug+0x65/0xa0
Call Trace:
do_raw_spin_lock+0x69/0xa0
__mutex_lock+0x695/0xb80
delete_endpoint+0xad/0x150 [cxl_core]
devres_release_all+0xb8/0x110
device_unbind_cleanup+0xe/0x70
device_release_driver_internal+0x1d2/0x210
detach_memdev+0x15/0x20 [cxl_core]
process_one_work+0x1e3/0x4c0
worker_thread+0x1dd/0x3d0
2/ In the case of RCH topologies, the parent device that needs to be
locked is not always @port->dev as returned by cxl_mem_find_port(), use
endpoint->dev.parent instead.
|
[] | null | 4.4 | null | null | null |
GHSA-jjm5-5v9v-7hx2
|
org.xwiki.platform:xwiki-platform-security-authentication-default XSS with authenticate endpoints
|
ImpactIt was possible to inject some code using the URL of authenticate endpoints, e.g.:This vulnerability was present in recent versions of XWiki:13.10.8+14.4.3+14.6+PatchesThis problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThere is no easy workaround except to upgrade.Referenceshttps://jira.xwiki.org/browse/XWIKI-20335https://github.com/xwiki/xwiki-platform/commit/1943ea26c967ef868fb5f67c487d98d97cba0380For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira](https://jira.xwiki.org)Email us at [security mailing-list](mailto:security@xwiki.org)
|
[] | null | 5.4 | null | null | null |
CVE-2021-33356
|
Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.
|
[
"cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 | null |
|
GHSA-jm4q-mm58-q7p6
|
The print_maps function in toolbox/lsof.c in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows user-assisted attackers to gain privileges via a crafted application that attempts to list a long name of a memory-mapped file, aka internal bug 28175237. NOTE: print_maps is not related to the Vic Abell lsof product.
|
[] | null | null | 7 | null | null |
|
GHSA-w3r6-mw8w-3782
|
Stack-based buffer overflow in the login form in the management web server in HP Power Manager allows remote attackers to execute arbitrary code via the Login variable.
|
[] | null | null | null | null | null |
|
GHSA-4449-hg37-77v8
|
Command injection in total.js
|
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
|
[] | null | 8.6 | null | null | null |
CVE-2024-12334
|
WC Affiliate – A Complete WooCommerce Affiliate Plugin <= 2.4 - Reflected Cross-Site Scripting
|
The WC Affiliate – A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via any parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2024-41773
|
IBM Global Configuration Management incorrect ownership assignment
|
IBM Global Configuration Management 7.0.2 and 7.0.3 could allow an authenticated user to archive a global baseline due to improper access controls.
|
[
"cpe:2.3:a:ibm:global_configuration_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:global_configuration_management:7.0.3:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-g8x8-2fjc-j776
|
akfingerd 0.5 allows local users to read arbitrary files as the akfingerd user (nobody) via a symlink attack on the .plan file.
|
[] | null | null | null | null | null |
|
CVE-2025-27263
|
WordPress Doctor Appointment Booking Plugin <= 1.0.0 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Doctor Appointment Booking allows SQL Injection. This issue affects Doctor Appointment Booking: from n/a through 1.0.0.
|
[] | null | 8.5 | null | null | null |
CVE-2022-26998
|
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
|
[
"cpe:2.3:o:commscope:arris_tr3300_firmware:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:h:commscope:arris_tr3300:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2021-33026
|
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
|
[
"cpe:2.3:a:flask-caching_project:flask-caching:*:*:*:*:*:flask:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2017-12111
|
An exploitable out-of-bounds vulnerability exists in the xls_addCell function of libxls 1.4. A specially crafted XLS file with a formula record can cause memory corruption resulting in remote code execution. An attacker can send a malicious XLS file to trigger this vulnerability.
|
[
"cpe:2.3:a:libxls_project:libxls:1.4:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
GHSA-33wf-4crm-2322
|
Improper Access Control in librenms
|
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
|
[] | null | null | 7.1 | null | null |
CVE-2022-45928
|
A remote OScript execution issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). Multiple endpoints allow the user to pass the parameter htmlFile, which is included in the HTML output rendering pipeline of a request. Because the Content Server evaluates and executes Oscript code in HTML files, it is possible for an attacker to execute Oscript code. The Oscript scripting language allows the attacker (for example) to manipulate files on the filesystem, create new network connections, or execute OS commands.
|
[
"cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-gqjj-38mj-85wj
|
Vulnerability of bypassing the process to start SA and use related functions on distributed cameras
Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.
|
[] | null | 5.7 | null | null | null |
|
GHSA-397g-4jpj-44xg
|
CSRF in baserCMS 3.0.10 and earlier
|
Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
|
[] | null | 8.8 | null | null | null |
GHSA-56gc-px8q-4v44
|
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable.
|
[] | null | 6.5 | null | null | null |
|
CVE-2023-6155
|
Quiz Maker < 6.4.9.5 - Unauthenticated Email Address Disclosure
|
The Quiz Maker WordPress plugin before 6.4.9.5 does not adequately authorize the `ays_quiz_author_user_search` AJAX action, allowing an unauthenticated attacker to perform a search for users of the system, ultimately leaking user email addresses.
|
[
"cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null | null |
GHSA-p589-cc26-33rw
|
Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.
|
[] | null | 5.3 | null | null | null |
|
GHSA-459f-w3jj-fv4r
|
The superheroquiz (aka com.davidhey.superheroquiz) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-rm9x-vwvj-8wv2
|
Symbian OS S60 3rd edition on the Nokia E90 Communicator 07.40.1.2 Ra-6 and Nseries N82 allows remote attackers to cause a denial of service (device crash) via multiple deauthentication (DeAuth) frames.
|
[] | null | null | null | null | null |
|
GHSA-c3wg-pg32-p3wv
|
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
[] | null | 6.7 | null | null | null |
|
CVE-2024-1339
|
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null | null |
|
GHSA-78fv-f7vr-m89j
|
Multiple SQL injection vulnerabilities in DUware DUportal 3.1.2 and 3.1.2 SQL allow remote attackers to execute arbitrary SQL commands via the (1) iChannel parameter to channel.asp or search.asp, (2) iData parameter to detail.asp or inc_rating.asp, (3) iCat parameter to detail.asp or type.asp, (4) DAT_PARENT parameter to inc_poll_voting.asp, or (5) iRate parameter to inc_rating.asp, a different set of vulnerabilities than CVE-2005-1224.
|
[] | null | null | null | null | null |
|
CVE-2016-3951
|
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*"
] | null | null | 4.6 | 4.9 | null |
|
CVE-2019-14818
|
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
|
[
"cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_eus:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2023-22869
|
IBM Aspera Faspex information disclosure
|
IBM Aspera Faspex 5.0.0 through 5.0.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 244119.
|
[
"cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-79hf-2h3j-xg27
|
Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings.
For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2023:0295
|
Red Hat Security Advisory: firefox security update
|
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 8.8 | null | null | null |
GHSA-qj2w-mw2r-pv39
|
RubyGems Deserialization of Untrusted Data vulnerability
|
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack requires the victim to run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability is fixed in 2.7.6.
|
[] | null | null | 7.8 | null | null |
CVE-2019-14414
|
In cPanel before 78.0.2, a Userdata cache temporary file can conflict with domains (SEC-478).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 | null |
|
GHSA-6wqg-77wv-92mv
|
In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs
|
[] | null | 4.3 | null | null | null |
|
CVE-2012-5065
|
Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 6.1, 6.2, 6.3.x, 7, 7.0.1, 7.0.2, 7.0.3, 7.5, 7.6.1, 7.6.2, and 11.1.1.6.0 allows local users to affect integrity via unknown vectors related to ImagePicker.
|
[
"cpe:2.3:a:oracle:fusion_middleware:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-vf3x-8mv3-rv64
|
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
|
[] | null | null | null | null | null |
|
CVE-2021-30601
|
Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2020-3628
|
Improper access due to socket opened by the logging application without specifying localhost address in Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, Rennell, SDX20
|
[
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-rggf-g8fq-cf6h
|
Cross-site scripting (XSS) vulnerability in Sophos Anti-Virus for Windows 6.x before 6.5.8 and 7.x before 7.0.1 allows remote attackers to inject arbitrary web script or HTML via an archive with a file that matches a virus signature and has a crafted filename that is not properly handled by the print function in SavMain.exe.
|
[] | null | null | null | null | null |
|
CVE-2012-5633
|
The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.
|
[
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
GHSA-89mx-74w9-vr97
|
A local arbitrary file modification vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.
|
[] | null | null | 5.5 | null | null |
|
GHSA-jfpr-v25w-hpmf
|
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. CSRF exists via wp-admin/admin.php.
|
[] | null | null | 8.8 | null | null |
|
CVE-2015-8646
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
|
[
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 | null |
|
RHSA-2017:1561
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 9.8 | null | null |
CVE-2018-3784
|
A code injection in cryo 0.0.6 allows an attacker to arbitrarily execute code due to insecure implementation of deserialization.
|
[
"cpe:2.3:o:cryo_project:cryo:0.0.6:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-3mrc-6j78-v932
|
A vulnerability, which was classified as problematic, has been found in Jianming Antivirus 16.2.2022.418. Affected by this issue is some unknown functionality in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.
|
[] | null | 5.5 | null | null | null |
|
GHSA-4qc6-w2f8-x2pc
|
Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9j54-wmcm-g7mf
|
Session fixation vulnerability in lib/user/sfBasicSecurityUser.class.php in SensioLabs Symfony before 1.4.18 allows remote attackers to hijack web sessions via vectors related to the regenerate method and unspecified "database backed session classes."
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.