id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-f8c7-6vm5-4jrm
Stack consumption vulnerability in Internet Explorer The JavaScript settimeout function in Internet Explorer allows remote attackers to cause a denial of service (crash) via the JavaScript settimeout function. NOTE: the vendor could not reproduce the problem.
[]
null
null
null
null
null
CVE-2024-22292
WordPress WP To Do Plugin <= 1.2.8 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Delower WP To Do allows Stored XSS.This issue affects WP To Do: from n/a through 1.2.8.
[ "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
GHSA-rhjh-rphp-w26x
IBM FileNet Workplace 4.0.2 before 4.0.2.14 LA012 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
null
null
8.1
null
null
GHSA-99hf-385j-mp2j
Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0, contain a Use of Hard-coded Cryptographic Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.
[]
null
8.4
null
null
null
CVE-2021-29210
A remote dom xss, crlf injection vulnerability was discovered in HPE Integrated Lights-Out 4 (iLO 4); HPE SimpliVity 380 Gen9; HPE Integrated Lights-Out 5 (iLO 5) for HPE Gen10 Servers; HPE SimpliVity 380 Gen10; HPE SimpliVity 2600; HPE SimpliVity 380 Gen10 G; HPE SimpliVity 325; HPE SimpliVity 380 Gen10 H version(s): Prior to version 2.78.
[ "cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_380_gen9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:integrated_lights-out_5:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_2600:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_325:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_380_gen10:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_380_gen10_g:-:*:*:*:*:*:*:*", "cpe:2.3:h:hp:simplivity_380_gen10_h:-:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
GHSA-4rm2-h745-5rf8
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
[]
null
null
null
null
null
CVE-2024-27135
Apache Pulsar: Improper Input Validation in Pulsar Function Worker allows Remote Code Execution
Improper input validation in the Pulsar Function Worker allows a malicious authenticated user to execute arbitrary Java code on the Pulsar Function worker, outside of the sandboxes designated for running user-provided functions. This vulnerability also applies to the Pulsar Broker when it is configured with "functionsWorkerEnabled=true". This issue affects Apache Pulsar versions from 2.4.0 to 2.10.5, from 2.11.0 to 2.11.3, from 3.0.0 to 3.0.2, from 3.1.0 to 3.1.2, and 3.2.0. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.6. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.4. 3.0 Pulsar Function Worker users should upgrade to at least 3.0.3. 3.1 Pulsar Function Worker users should upgrade to at least 3.1.3. 3.2 Pulsar Function Worker users should upgrade to at least 3.2.1. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
[ "cpe:2.3:a:apache:pulsar:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:pulsar:2.11.0:-:*:*:*:*:*:*", "cpe:2.3:a:apache:pulsar:3.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:apache:pulsar:3.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:apache:pulsar:3.2.0:-:*:*:*:*:*:*" ]
null
8.5
null
null
null
CVE-2011-1663
SQL injection vulnerability in the Translation Management module 6.x before 6.x-1.21 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.20:*:*:*:*:*:*:*", "cpe:2.3:a:icanlocalize:translation_management:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-12313
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
[ "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*" ]
null
8.8
null
5.8
null
CVE-2001-0648
Directory traversal vulnerability in PHProjekt 2.1 and earlier allows a remote attacker to conduct unauthorized activities via a dot dot (..) attack on the file module.
[ "cpe:2.3:a:phprojekt:phprojekt:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phprojekt:phprojekt:2.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-269x-pg5c-5xgm
Apache Airflow Execution with Unnecessary Privileges
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0.This issue affects Apache Airflow: before 2.6.0.
[]
8.7
8.8
null
null
null
GHSA-m3ch-223f-43c6
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
[]
null
null
null
null
null
GHSA-9mfm-jpv6-46g5
A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.
[]
null
5.3
null
null
null
RHSA-2019:3207
Red Hat Security Advisory: Ansible security and bug fix update
ansible: secrets disclosed on logs when no_log enabled ansible: Incomplete fix for CVE-2019-10206 ansible: sub parameters marked as no_log are not masked in certain failure scenarios
[ "cpe:/a:redhat:ansible_engine:2::el7", "cpe:/a:redhat:ansible_engine:2::el8" ]
null
5
6.4
null
null
RHSA-2024:2966
Red Hat Security Advisory: ghostscript security update
ghostscript: Divide by zero in eps_print_page in gdevepsn.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.5
null
null
null
GHSA-7mch-783h-q63m
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
[]
null
null
null
null
null
cisco-sa-ftd-snort3-8U4HHxH8
Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. See the Details ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-smb-3nfhJtr#details"] section of this advisory for more information. The Snort detection engine will restart automatically. No manual intervention is required. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is part of the November 2023 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2023 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74985"].
[]
null
4
null
null
null
CVE-2019-8747
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in watchOS 6.1. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
GHSA-gqvm-7mf4-cx8m
An integer overflow leading to use after free in PDFium in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
[]
null
null
8.8
null
null
CVE-2002-0005
Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote attackers to execute arbitrary code via a long argument in a game request (AddGame).
[ "cpe:2.3:a:aol:instant_messenger:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.3.2229:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.7.2480:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.8.2616:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2017-12976
git-annex before 6.20170818 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, as demonstrated by an ssh://-eProxyCommand= URL, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-1000116, and CVE-2017-1000117.
[ "cpe:2.3:a:git-annex_project:git-annex:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-rqjf-f44q-4mvw
The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS.
[]
null
null
null
null
null
GHSA-h7f6-hc46-frrv
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure.
[]
null
7.4
null
null
null
CVE-2017-14563
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .xps file, related to a "Read Access Violation on Block Data Move starting at STDUXPSFile!DllUnregisterServer+0x0000000000005311."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
null
RHSA-2012:1211
Red Hat Security Advisory: thunderbird security update
Mozilla: Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7) (MFSA 2012-57) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Multiple Use-after-free issues (MFSA 2012-58) Mozilla: Memory corruption with bitmap format images with negative height (MFSA 2012-61) Mozilla: WebGL use-after-free and memory corruption (MFSA 2012-62) Mozilla: WebGL use-after-free and memory corruption (MFSA 2012-62) Mozilla: SVG buffer overflow and use-after-free issues (MFSA 2012-63) Mozilla: SVG buffer overflow and use-after-free issues (MFSA 2012-63) Mozilla: Out-of-bounds read in format-number in XSLT (MFSA 2012-65) Mozilla: Location object security checks bypassed by chrome code (MFSA 2012-70) Mozilla: Web console eval capable of executing chrome-privileged code (MFSA 2012-72)
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2025-38577
f2fs: fix to avoid panic in f2fs_evict_inode
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid panic in f2fs_evict_inode As syzbot [1] reported as below: R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450 R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520 </TASK> ---[ end trace 0000000000000000 ]--- ================================================================== BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62 Read of size 8 at addr ffff88812d962278 by task syz-executor/564 CPU: 1 PID: 564 Comm: syz-executor Tainted: G W 6.1.129-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> __dump_stack+0x21/0x24 lib/dump_stack.c:88 dump_stack_lvl+0xee/0x158 lib/dump_stack.c:106 print_address_description+0x71/0x210 mm/kasan/report.c:316 print_report+0x4a/0x60 mm/kasan/report.c:427 kasan_report+0x122/0x150 mm/kasan/report.c:531 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351 __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62 __list_del_entry include/linux/list.h:134 [inline] list_del_init include/linux/list.h:206 [inline] f2fs_inode_synced+0xf7/0x2e0 fs/f2fs/super.c:1531 f2fs_update_inode+0x74/0x1c40 fs/f2fs/inode.c:585 f2fs_update_inode_page+0x137/0x170 fs/f2fs/inode.c:703 f2fs_write_inode+0x4ec/0x770 fs/f2fs/inode.c:731 write_inode fs/fs-writeback.c:1460 [inline] __writeback_single_inode+0x4a0/0xab0 fs/fs-writeback.c:1677 writeback_single_inode+0x221/0x8b0 fs/fs-writeback.c:1733 sync_inode_metadata+0xb6/0x110 fs/fs-writeback.c:2789 f2fs_sync_inode_meta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159 block_operations fs/f2fs/checkpoint.c:1269 [inline] f2fs_write_checkpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658 kill_f2fs_super+0x231/0x390 fs/f2fs/super.c:4668 deactivate_locked_super+0x98/0x100 fs/super.c:332 deactivate_super+0xaf/0xe0 fs/super.c:363 cleanup_mnt+0x45f/0x4e0 fs/namespace.c:1186 __cleanup_mnt+0x19/0x20 fs/namespace.c:1193 task_work_run+0x1c6/0x230 kernel/task_work.c:203 exit_task_work include/linux/task_work.h:39 [inline] do_exit+0x9fb/0x2410 kernel/exit.c:871 do_group_exit+0x210/0x2d0 kernel/exit.c:1021 __do_sys_exit_group kernel/exit.c:1032 [inline] __se_sys_exit_group kernel/exit.c:1030 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1030 x64_sys_call+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f28b1b8e169 Code: Unable to access opcode bytes at 0x7f28b1b8e13f. RSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360 R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360 R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520 </TASK> Allocated by task 569: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505 __kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:328 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook+0x4f/0x2c0 mm/slab.h:737 slab_alloc_node mm/slub.c:3398 [inline] slab_alloc mm/slub.c:3406 [inline] __kmem_cache_alloc_lru mm/slub.c:3413 [inline] kmem_cache_alloc_lru+0x104/0x220 mm/slub.c:3429 alloc_inode_sb include/linux/fs.h:3245 [inline] f2fs_alloc_inode+0x2d/0x340 fs/f2fs/super.c:1419 alloc_inode fs/inode.c:261 [inline] iget_locked+0x186/0x880 fs/inode.c:1373 f2fs_iget+0x55/0x4c60 fs/f2fs/inode.c:483 f2fs_lookup+0x366/0xab0 fs/f2fs/namei.c:487 __lookup_slow+0x2a3/0x3d0 fs/namei.c:1690 lookup_slow+0x57/0x70 fs/namei.c:1707 walk_component+0x2e6/0x410 fs/namei ---truncated---
[]
null
null
null
null
null
CVE-2024-50355
LibreNMS has a Persistent XSS from Insecure Input Sanitization Affects Multiple Endpoints
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0.
[ "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
null
CVE-2011-2382
Microsoft Internet Explorer 8 and earlier, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue.
[ "cpe:2.3:a:microsoft:ie:9:beta:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.40.308:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.40.520:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.70.1155:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.70.1158:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.70.1215:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.70.1300:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.71.544:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.71.1008.3:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.71.1712.6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.72.2106.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.72.3110.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.72.3612.1713:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.0518.10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.0910.1309:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2014.0216:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2314.1003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2516.1900:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2614.3500:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2919.800:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2919.3800:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2919.6307:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.2920.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3103.1000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3105.0106:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3314.2101:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3315.1000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3502.1000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.00.3700.1000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:preview:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.3825.1300:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4030.2400:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4134.0100:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4134.0600:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4308.2900:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4522.1800:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.50.4807.2300:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2462.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2479.0006:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2600:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2600.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2800:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2800.1106:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.2900.2180:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3663.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3718.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.0000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.1830:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.00.3790.3959:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:beta:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-pffp-cxqq-7pcw
A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet.
[]
null
8.6
null
null
null
GHSA-xjcx-58p2-6mm5
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ attribute of the Posts Slider widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-q3f5-cm95-p5vp
There is a buffer overflow vulnerability in some ZTE mobile internet producsts. Due to insufficient validation of tcp port parameter, an authenticated attacker could use the vulnerability to perform a denial of service attack.
[]
null
5.9
null
null
null
GHSA-9wvh-ff5f-xjpj
Missing Authorization in Harbor
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API. This is fixed in 1.9.0-rc1.
[]
null
6.5
null
null
null
CVE-2018-8849
Medtronic N'Vision Clinician Programmer Missing Encryption of Sensitive Data
Medtronic N'Vision Clinician Programmer 8840 N'Vision Clinician Programme and 8870 N'Vision removable Application Card do not encrypt PII and PHI while at rest.
[ "cpe:2.3:o:medtronic:n\\'vision_8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronic:n\\'vision_8840:-:*:*:*:*:*:*:*", "cpe:2.3:o:medtronic:n\\'vision_8870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:medtronic:n\\'vision_8870:-:*:*:*:*:*:*:*" ]
null
4.6
null
null
null
RHSA-2024:1492
Red Hat Security Advisory: thunderbird security update
nss: timing attack against RSA decryption Mozilla: Crash in NSS TLS method Mozilla: Leaking of encrypted email subjects to other conversations Mozilla: JIT code failed to save return registers on Armv7-A Mozilla: Integer overflow could have led to out of bounds write Mozilla: Improper handling of html and body tags enabled CSP nonce leakage Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions Mozilla: Self referencing object could have potentially led to a use-after-free Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.5
null
null
null
GHSA-qx55-87x4-r7qf
A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924.
[]
null
null
4.7
null
null
GHSA-r6j7-f2g3-33m3
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
GHSA-9hvf-pfq3-7pp6
CSRF vulnerability in Jenkins Amazon EC2 Plugin
Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.This vulnerability might also allow attackers to capture credentials stored in Jenkins. We have not been able to confirm that this is possible.Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability.Amazon EC2 Plugin 1.48 requires POST requests and Overall/Administer permission for the affected form validation methods.
[]
null
3.1
null
null
null
RHSA-2023:2810
Red Hat Security Advisory: poppler security update
poppler: integer overflow in JBIG2 decoder using malformed files
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
7.8
null
null
null
GHSA-3qjf-f83f-x2pm
XML external entity (XXE) vulnerability in bkr/server/jobs.py in Beaker before 20.1 allows remote authenticated users to obtain sensitive information via submitting job XML to the server containing entity references which reference files from the Beaker server's file system.
[]
null
null
4.3
null
null
CVE-2024-47195
A vulnerability has been identified in ModelSim (All versions < V2024.3), Questa (All versions < V2024.3). gdb.exe in affected applications allows a specific executable file to be loaded from the current working directory. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges in installations where administrators or processes with elevated privileges launch gdb.exe from a user-writable directory.
[ "cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*" ]
5.4
6.7
null
null
null
GHSA-8j5h-cxpp-7g62
7-Zip through 24.09 does not report an error for certain invalid xz files, involving stream flags and reserved bits.
[]
null
2.5
null
null
null
GHSA-vj54-cjrx-x696
Observable Discrepancy in Argo
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts because /api/v1/session returned 401 for an existing username and 404 otherwise.Specific Go Packages Affectedgithub.com/argoproj/argo-cd/util/session github.com/argoproj/argo-cd/server/session
[]
null
5.3
null
null
null
ICSA-25-226-06
Siemens Opcenter Quality
The affected application does not enforce mandatory authorization on some functionality level at server side. This could allow an authenticated attacker to gain complete access of the application. The affected application do not encrypt the communication in LDAP interface by default. This could allow an authenticated attacker to gain unauthorized access to sensitive information. The affected application does not have adequate encryption of sensitive information. This could allow an authenticated attacker to gain access of sensitive information. The affected application displays SQL statement in the error messages encountered during the generation of reports using Cockpit tool. The affected application improperly handles error while accessing an inaccessible resource leading to exposing the system applications. The affected application does not expire the session without logout. This could allow an attacker to get unauthorized access if the session is left idle. The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.
[]
null
6.4
null
null
null
GHSA-4j79-4m6q-77vf
Subrion CMS PHP Object Injection
`includes/classes/ia.core.users.php` in Subrion CMS 4.0.5 allows remote attackers to conduct PHP Object Injection attacks via crafted serialized data in a salt cookie in a login request.
[]
null
null
9.8
null
null
CVE-2025-46454
WordPress Meta Keywords & Description <= 0.8 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in svil4ok Meta Keywords &amp; Description allows PHP Local File Inclusion. This issue affects Meta Keywords &amp; Description: from n/a through 0.8.
[]
null
7.5
null
null
null
GHSA-f52f-87gv-xwq9
An issue was discovered in Papaya Viewer 4a42701. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application
[]
null
6.1
null
null
null
GHSA-6m45-rhxg-8qpr
Ashlar-Vellum Cobalt AR File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of AR files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20408.
[]
null
null
7.8
null
null
CVE-2011-1126
VMware vmrun, as used in VIX API 1.x before 1.10.3 and VMware Workstation 6.5.x and 7.x before 7.1.4 build 385536 on Linux, might allow local users to gain privileges via a Trojan horse shared library in an unspecified directory.
[ "cpe:2.3:a:vmware:vix_api:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vix_api:1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:7.1.3:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-2m7j-prfm-384p
Buffer overflow in mah-jong 1.5.6 and earlier allows remote attackers to execute arbitrary code.
[]
null
null
null
null
null
CVE-2024-5279
Qiwen Netdisk File Rename cross site scripting
A vulnerability was found in Qiwen Netdisk up to 1.4.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component File Rename Handler. The manipulation with the input <img src="" onerror="alert(document.cookie)"> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266083.
[ "cpe:2.3:a:qiwen:netdisk:*:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
GHSA-r299-gjv8-v58g
An incorrect configuration of the EZMall 2000 shopping cart CGI program "mall2000.cgi" could disclose private information.
[]
null
null
null
null
null
CVE-2024-43252
WordPress Crew HRM plugin <= 1.1.1 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in Crew HRM allows Object Injection.This issue affects Crew HRM: from n/a through 1.1.1.
[ "cpe:2.3:a:crewhrm:crewhrm:*:*:*:*:*:*:*:*" ]
null
9
null
null
null
CVE-2019-15952
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
[ "cpe:2.3:a:totaljs:total.js_cms:12.0.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
CVE-2023-52771
cxl/port: Fix delete_endpoint() vs parent unregistration race
In the Linux kernel, the following vulnerability has been resolved: cxl/port: Fix delete_endpoint() vs parent unregistration race The CXL subsystem, at cxl_mem ->probe() time, establishes a lineage of ports (struct cxl_port objects) between an endpoint and the root of a CXL topology. Each port including the endpoint port is attached to the cxl_port driver. Given that setup, it follows that when either any port in that lineage goes through a cxl_port ->remove() event, or the memdev goes through a cxl_mem ->remove() event. The hierarchy below the removed port, or the entire hierarchy if the memdev is removed needs to come down. The delete_endpoint() callback is careful to check whether it is being called to tear down the hierarchy, or if it is only being called to teardown the memdev because an ancestor port is going through ->remove(). That care needs to take the device_lock() of the endpoint's parent. Which requires 2 bugs to be fixed: 1/ A reference on the parent is needed to prevent use-after-free scenarios like this signature: BUG: spinlock bad magic on CPU#0, kworker/u56:0/11 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023 Workqueue: cxl_port detach_memdev [cxl_core] RIP: 0010:spin_bug+0x65/0xa0 Call Trace: do_raw_spin_lock+0x69/0xa0 __mutex_lock+0x695/0xb80 delete_endpoint+0xad/0x150 [cxl_core] devres_release_all+0xb8/0x110 device_unbind_cleanup+0xe/0x70 device_release_driver_internal+0x1d2/0x210 detach_memdev+0x15/0x20 [cxl_core] process_one_work+0x1e3/0x4c0 worker_thread+0x1dd/0x3d0 2/ In the case of RCH topologies, the parent device that needs to be locked is not always @port->dev as returned by cxl_mem_find_port(), use endpoint->dev.parent instead.
[]
null
4.4
null
null
null
GHSA-jjm5-5v9v-7hx2
org.xwiki.platform:xwiki-platform-security-authentication-default XSS with authenticate endpoints
ImpactIt was possible to inject some code using the URL of authenticate endpoints, e.g.:This vulnerability was present in recent versions of XWiki:13.10.8+14.4.3+14.6+PatchesThis problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThere is no easy workaround except to upgrade.Referenceshttps://jira.xwiki.org/browse/XWIKI-20335https://github.com/xwiki/xwiki-platform/commit/1943ea26c967ef868fb5f67c487d98d97cba0380For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira](https://jira.xwiki.org)Email us at [security mailing-list](mailto:security@xwiki.org)
[]
null
5.4
null
null
null
CVE-2021-33356
Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.
[ "cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
null
GHSA-jm4q-mm58-q7p6
The print_maps function in toolbox/lsof.c in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows user-assisted attackers to gain privileges via a crafted application that attempts to list a long name of a memory-mapped file, aka internal bug 28175237. NOTE: print_maps is not related to the Vic Abell lsof product.
[]
null
null
7
null
null
GHSA-w3r6-mw8w-3782
Stack-based buffer overflow in the login form in the management web server in HP Power Manager allows remote attackers to execute arbitrary code via the Login variable.
[]
null
null
null
null
null
GHSA-4449-hg37-77v8
Command injection in total.js
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
[]
null
8.6
null
null
null
CVE-2024-12334
WC Affiliate – A Complete WooCommerce Affiliate Plugin <= 2.4 - Reflected Cross-Site Scripting
The WC Affiliate – A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via any parameter in all versions up to, and including, 2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
CVE-2024-41773
IBM Global Configuration Management incorrect ownership assignment
IBM Global Configuration Management 7.0.2 and 7.0.3 could allow an authenticated user to archive a global baseline due to improper access controls.
[ "cpe:2.3:a:ibm:global_configuration_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:global_configuration_management:7.0.3:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-g8x8-2fjc-j776
akfingerd 0.5 allows local users to read arbitrary files as the akfingerd user (nobody) via a symlink attack on the .plan file.
[]
null
null
null
null
null
CVE-2025-27263
WordPress Doctor Appointment Booking Plugin <= 1.0.0 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Doctor Appointment Booking allows SQL Injection. This issue affects Doctor Appointment Booking: from n/a through 1.0.0.
[]
null
8.5
null
null
null
CVE-2022-26998
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[ "cpe:2.3:o:commscope:arris_tr3300_firmware:1.0.13:*:*:*:*:*:*:*", "cpe:2.3:h:commscope:arris_tr3300:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2021-33026
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision
[ "cpe:2.3:a:flask-caching_project:flask-caching:*:*:*:*:*:flask:*:*" ]
null
9.8
null
7.5
null
CVE-2017-12111
An exploitable out-of-bounds vulnerability exists in the xls_addCell function of libxls 1.4. A specially crafted XLS file with a formula record can cause memory corruption resulting in remote code execution. An attacker can send a malicious XLS file to trigger this vulnerability.
[ "cpe:2.3:a:libxls_project:libxls:1.4:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-33wf-4crm-2322
Improper Access Control in librenms
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
[]
null
null
7.1
null
null
CVE-2022-45928
A remote OScript execution issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). Multiple endpoints allow the user to pass the parameter htmlFile, which is included in the HTML output rendering pipeline of a request. Because the Content Server evaluates and executes Oscript code in HTML files, it is possible for an attacker to execute Oscript code. The Oscript scripting language allows the attacker (for example) to manipulate files on the filesystem, create new network connections, or execute OS commands.
[ "cpe:2.3:a:opentext:opentext_extended_ecm:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-gqjj-38mj-85wj
Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.
[]
null
5.7
null
null
null
GHSA-397g-4jpj-44xg
CSRF in baserCMS 3.0.10 and earlier
Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[]
null
8.8
null
null
null
GHSA-56gc-px8q-4v44
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/traceroute process. An authenticated remote attacker can cause a Denial of Service due via the loop counter variable.
[]
null
6.5
null
null
null
CVE-2023-6155
Quiz Maker < 6.4.9.5 - Unauthenticated Email Address Disclosure
The Quiz Maker WordPress plugin before 6.4.9.5 does not adequately authorize the `ays_quiz_author_user_search` AJAX action, allowing an unauthenticated attacker to perform a search for users of the system, ultimately leaking user email addresses.
[ "cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
null
GHSA-p589-cc26-33rw
Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash.
[]
null
5.3
null
null
null
GHSA-459f-w3jj-fv4r
The superheroquiz (aka com.davidhey.superheroquiz) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-rm9x-vwvj-8wv2
Symbian OS S60 3rd edition on the Nokia E90 Communicator 07.40.1.2 Ra-6 and Nseries N82 allows remote attackers to cause a denial of service (device crash) via multiple deauthentication (DeAuth) frames.
[]
null
null
null
null
null
GHSA-c3wg-pg32-p3wv
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
null
CVE-2024-1339
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
null
GHSA-78fv-f7vr-m89j
Multiple SQL injection vulnerabilities in DUware DUportal 3.1.2 and 3.1.2 SQL allow remote attackers to execute arbitrary SQL commands via the (1) iChannel parameter to channel.asp or search.asp, (2) iData parameter to detail.asp or inc_rating.asp, (3) iCat parameter to detail.asp or type.asp, (4) DAT_PARENT parameter to inc_poll_voting.asp, or (5) iRate parameter to inc_rating.asp, a different set of vulnerabilities than CVE-2005-1224.
[]
null
null
null
null
null
CVE-2016-3951
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*" ]
null
null
4.6
4.9
null
CVE-2019-14818
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
[ "cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_eus:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
CVE-2023-22869
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 5.0.0 through 5.0.7 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 244119.
[ "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-79hf-2h3j-xg27
Multiple vulnerabilities in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or upload arbitrary files as recordings. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
6.5
null
null
null
RHSA-2023:0295
Red Hat Security Advisory: firefox security update
Mozilla: libusrsctp library out of date Mozilla: Fullscreen notification bypass Mozilla: Arbitrary file read from GTK drag and drop on Linux Mozilla: Malicious command could be hidden in devtools output Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7
[ "cpe:/a:redhat:rhel_eus:8.4::appstream" ]
null
8.8
null
null
null
GHSA-qj2w-mw2r-pv39
RubyGems Deserialization of Untrusted Data vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack requires the victim to run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability is fixed in 2.7.6.
[]
null
null
7.8
null
null
CVE-2019-14414
In cPanel before 78.0.2, a Userdata cache temporary file can conflict with domains (SEC-478).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
null
GHSA-6wqg-77wv-92mv
In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs
[]
null
4.3
null
null
null
CVE-2012-5065
Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 6.1, 6.2, 6.3.x, 7, 7.0.1, 7.0.2, 7.0.3, 7.5, 7.6.1, 7.6.2, and 11.1.1.6.0 allows local users to affect integrity via unknown vectors related to ImagePicker.
[ "cpe:2.3:a:oracle:fusion_middleware:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-vf3x-8mv3-rv64
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
[]
null
null
null
null
null
CVE-2021-30601
Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2020-3628
Improper access due to socket opened by the logging application without specifying localhost address in Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, Rennell, SDX20
[ "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-rggf-g8fq-cf6h
Cross-site scripting (XSS) vulnerability in Sophos Anti-Virus for Windows 6.x before 6.5.8 and 7.x before 7.0.1 allows remote attackers to inject arbitrary web script or HTML via an archive with a file that matches a virus signature and has a crafted filename that is not properly handled by the print function in SavMain.exe.
[]
null
null
null
null
null
CVE-2012-5633
The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request.
[ "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-89mx-74w9-vr97
A local arbitrary file modification vulnerability was identified in HPE Moonshot Provisioning Manager prior to v1.24.
[]
null
null
5.5
null
null
GHSA-jfpr-v25w-hpmf
An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. CSRF exists via wp-admin/admin.php.
[]
null
null
8.8
null
null
CVE-2015-8646
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
[ "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
RHSA-2017:1561
Red Hat Security Advisory: thunderbird security update
Mozilla: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2 (MFSA 2017-16) Mozilla: Use-after-free using destroyed node when regenerating trees (MFSA 2017-16) Mozilla: Use-after-free during docshell reloading (MFSA 2017-16) Mozilla: Use-after-free with track elements (MFSA 2017-16) Mozilla: Use-after-free with content viewer listeners (MFSA 2017-16) Mozilla: Use-after-free with IME input (MFSA 2017-16) Mozilla: Out-of-bounds read in WebGL with ImageInfo object (MFSA 2017-16) Mozilla: Use-after-free and use-after-scope logging XHR header errors (MFSA 2017-16) Mozilla: Use-after-free in IndexedDB (MFSA 2017-16) Mozilla: Out-of-bounds read in Opus encoder (MFSA 2017-16) Mozilla: Domain spoofing with combination of Canadian Syllabics and other unicode blocks (MFSA 2017-16) graphite2: out of bounds read in "graphite2::Pass::readPass" graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772) graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor) graphite2: out of bounds read "graphite2::Silf::readGraphite" graphite2: assertion error "size() > n" graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph" graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph" Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
9.8
null
null
CVE-2018-3784
A code injection in cryo 0.0.6 allows an attacker to arbitrarily execute code due to insecure implementation of deserialization.
[ "cpe:2.3:o:cryo_project:cryo:0.0.6:*:*:*:*:node.js:*:*" ]
null
9.8
null
7.5
null
GHSA-3mrc-6j78-v932
A vulnerability, which was classified as problematic, has been found in Jianming Antivirus 16.2.2022.418. Affected by this issue is some unknown functionality in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.
[]
null
5.5
null
null
null
GHSA-4qc6-w2f8-x2pc
Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string.
[]
null
9.8
null
null
null
GHSA-9j54-wmcm-g7mf
Session fixation vulnerability in lib/user/sfBasicSecurityUser.class.php in SensioLabs Symfony before 1.4.18 allows remote attackers to hijack web sessions via vectors related to the regenerate method and unspecified "database backed session classes."
[]
null
null
null
null
null