id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2023:1906
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream",
"cpe:/a:redhat:rhel_eus:8.6::crb"
] | null | 3.7 | null | null | null |
CVE-2020-7786
|
Command Injection
|
This affects all versions of package macfromip. The injection point is located in line 66 in macfromip.js.
|
[
"cpe:2.3:a:macfromip_project:macfromip:*:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null | null |
CVE-2024-56583
|
sched/deadline: Fix warning in migrate_enable for boosted tasks
|
In the Linux kernel, the following vulnerability has been resolved:
sched/deadline: Fix warning in migrate_enable for boosted tasks
When running the following command:
while true; do
stress-ng --cyclic 30 --timeout 30s --minimize --quiet
done
a warning is eventually triggered:
WARNING: CPU: 43 PID: 2848 at kernel/sched/deadline.c:794
setup_new_dl_entity+0x13e/0x180
...
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? enqueue_dl_entity+0x631/0x6e0
? setup_new_dl_entity+0x13e/0x180
? __warn+0x7e/0xd0
? report_bug+0x11a/0x1a0
? handle_bug+0x3c/0x70
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
enqueue_dl_entity+0x631/0x6e0
enqueue_task_dl+0x7d/0x120
__do_set_cpus_allowed+0xe3/0x280
__set_cpus_allowed_ptr_locked+0x140/0x1d0
__set_cpus_allowed_ptr+0x54/0xa0
migrate_enable+0x7e/0x150
rt_spin_unlock+0x1c/0x90
group_send_sig_info+0xf7/0x1a0
? kill_pid_info+0x1f/0x1d0
kill_pid_info+0x78/0x1d0
kill_proc_info+0x5b/0x110
__x64_sys_kill+0x93/0xc0
do_syscall_64+0x5c/0xf0
entry_SYSCALL_64_after_hwframe+0x6e/0x76
RIP: 0033:0x7f0dab31f92b
This warning occurs because set_cpus_allowed dequeues and enqueues tasks
with the ENQUEUE_RESTORE flag set. If the task is boosted, the warning
is triggered. A boosted task already had its parameters set by
rt_mutex_setprio, and a new call to setup_new_dl_entity is unnecessary,
hence the WARN_ON call.
Check if we are requeueing a boosted task and avoid calling
setup_new_dl_entity if that's the case.
|
[] | null | null | null | null | null |
CVE-2024-47146
|
Ruijie Reyee OS Resource Leak
|
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal.
|
[
"cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*"
] | 7.1 | 6.5 | null | null | null |
CVE-2019-19126
|
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
|
[
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 | null |
|
CVE-2021-23330
|
Command Injection
|
All versions of package launchpad are vulnerable to Command Injection via stop.
|
[
"cpe:2.3:a:bitovi:launchpad:0.1.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.2.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.2.1:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.3.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.1:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.2:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.3:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.4:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.5:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.6:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.7:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.8:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.4.9:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.5.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.5.1:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.5.2:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.5.3:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.5.4:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.6.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.0:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.1:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.2:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.3:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.4:*:*:*:*:node.js:*:*",
"cpe:2.3:a:bitovi:launchpad:0.7.5:*:*:*:*:node.js:*:*"
] | null | 9.8 | null | null | null |
GHSA-4r6g-xhx7-fm36
|
Contao Core directory traversal vulnerability
|
Directory traversal vulnerability in Contao before 3.2.19, and 3.4.x before 3.4.4 allows remote authenticated backend users to view files outside their file mounts or the document root via unspecified vectors.
|
[] | null | null | 4.3 | null | null |
CVE-2016-7431
|
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
|
[
"cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
RHSA-2023:0113
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Extension scripts replace objects not belonging to the extension.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.1 | null | null | null |
CVE-2005-3904
|
Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
|
[
"cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-34695
|
WOWS Karma vulnerable to a post submission bounce/timing attack
|
WOWS Karma is a reputation system for Wargaming's World of Warships. A user is able to click multiple times on "create" on a post creation prompt before the modal closes, which triggers sending several post creation API requests at once. Due to timing, sending multiple posts simultaneously requests bypasses the cooldown validation, however are not refreshing a user's metrics more than once, due to concurrent karma updates. This issue is fixed in 0.17.4.1.
|
[] | null | 6.3 | null | null | null |
CVE-2024-53045
|
ASoC: dapm: fix bounds checker error in dapm_widget_list_create
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: dapm: fix bounds checker error in dapm_widget_list_create
The widgets array in the snd_soc_dapm_widget_list has a __counted_by
attribute attached to it, which points to the num_widgets variable. This
attribute is used in bounds checking, and if it is not set before the
array is filled, then the bounds sanitizer will issue a warning or a
kernel panic if CONFIG_UBSAN_TRAP is set.
This patch sets the size of the widgets list calculated with
list_for_each as the initial value for num_widgets as it is used for
allocating memory for the array. It is updated with the actual number of
added elements after the array is filled.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-56fh-6xpm-28x9
|
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the user/update_profile.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hmvw-rwmj-gphw
|
Uncontrolled Search Path Element vulnerability in OpenText Secure Content Manager on Windows allows DLL Side-Loading.This issue affects Secure Content Manager: 23.4.End-users can potentially exploit the vulnerability to execute malicious code in the trusted context of the thick-client application.
|
[] | 7 | null | null | null | null |
|
GHSA-2wjp-9ppx-q29x
|
A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /pages/payment_add.php. The manipulation of the argument cid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
GHSA-ggmv-6q9p-9gm6
|
Cross-site Scripting in django-unicorn
|
The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.
|
[] | 5.3 | 6.1 | null | null | null |
CVE-2022-3338
|
XXE in Trellix ePO server
|
An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API.
|
[
"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
GHSA-qw6q-fffq-cj36
|
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-46545
|
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWsc.
|
[
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2024-42742
|
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenticated Attackers can send malicious packet to execute arbitrary commands.
|
[
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-9qq8-mmh8-945v
|
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘opmode’ parameter of the setWiFiApConfig interface of the cstecgi .cgi.
|
[] | null | 9.8 | null | null | null |
|
CVE-2005-4789
|
resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, does not properly enforce class-specific exclude rules in some situations, which allows local users to bypass intended access restrictions for USB devices that set their class ID at the interface level.
|
[
"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-63w7-j324-fm92
|
Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
|
[] | null | null | null | null | null |
|
CVE-2024-28134
|
PHOENIX CONTACT: MitM attack gains privileges of the current logged in user in CHARX Series
|
An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based
management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected.
|
[
"cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
GHSA-7q9x-mv26-g233
|
Open redirect vulnerability in the web interface in Cisco Secure Access Control System (ACS) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an unspecified parameter, aka Bug ID CSCuq74150.
|
[] | null | null | null | null | null |
|
RHSA-2024:7461
|
Red Hat Security Advisory: cups-filters security update
|
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 7.5 | null | null | null |
CVE-2006-7004
|
Cross-site scripting (XSS) vulnerability in email_request.php in PSY Auction allows remote attackers to inject arbitrary web script or HTML via the user_id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:php_script_tools:psy_auction:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2023-44839
|
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[
"cpe:2.3:o:dlink:dir-823g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-823g:a1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2007-2768
|
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
|
[
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-fr3q-v98q-fwq5
|
In the Linux kernel, the following vulnerability has been resolved:drm/sched: fix null-ptr-deref in init entityThe bug can be triggered by sending an amdgpu_cs_wait_ioctl
to the AMDGPU DRM driver on any ASICs with valid context.
The bug was reported by Joonkyo Jung <joonkyoj@yonsei.ac.kr>.
For example the following code:The ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that
the error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa
modified the logic and allowed to have sched_rq equal to NULL.As a result when there is no job the ioctl AMDGPU_WAIT_CS returns success.
The change fixes null-ptr-deref in init entity and the stack below demonstrates
the error condition:[ +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028
[ +0.007086] #PF: supervisor read access in kernel mode
[ +0.005234] #PF: error_code(0x0000) - not-present page
[ +0.005232] PGD 0 P4D 0
[ +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G B W L 6.7.0+ #4
[ +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c
[ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282
[ +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa
[ +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0
[ +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c
[ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010
[ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000
[ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000
[ +0.008236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0
[ +0.007175] Call Trace:
[ +0.002561] <TASK>
[ +0.002141] ? show_regs+0x6a/0x80
[ +0.003473] ? __die+0x25/0x70
[ +0.003124] ? page_fault_oops+0x214/0x720
[ +0.004179] ? preempt_count_sub+0x18/0xc0
[ +0.004093] ? __pfx_page_fault_oops+0x10/0x10
[ +0.004590] ? srso_return_thunk+0x5/0x5f
[ +0.004000] ? vprintk_default+0x1d/0x30
[ +0.004063] ? srso_return_thunk+0x5/0x5f
[ +0.004087] ? vprintk+0x5c/0x90
[ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.005807] ? srso_return_thunk+0x5/0x5f
[ +0.004090] ? _printk+0xb3/0xe0
[ +0.003293] ? __pfx__printk+0x10/0x10
[ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ +0.005482] ? do_user_addr_fault+0x345/0x770
[ +0.004361] ? exc_page_fault+0x64/0xf0
[ +0.003972] ? asm_exc_page_fault+0x27/0x30
[ +0.004271] ? add_taint+0x2a/0xa0
[ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu]
[ +0.009530] ? finish_task_switch.isra.0+0x129/0x470
[ +0.005068] ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu]
[ +0.010063] ? __kasan_check_write+0x14/0x20
[ +0.004356] ? srso_return_thunk+0x5/0x5f
[ +0.004001] ? mutex_unlock+0x81/0xd0
[ +0.003802] ? srso_return_thunk+0x5/0x5f
[ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu]
[ +0.009355] ? __pfx_
---truncated---
|
[] | null | 5.5 | null | null | null |
|
CVE-2014-3798
|
The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame.
|
[
"cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.1 | null |
|
RHSA-2023:1109
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
|
[
"cpe:/o:redhat:rhel_aus:8.2::baseos",
"cpe:/o:redhat:rhel_e4s:8.2::baseos",
"cpe:/o:redhat:rhel_tus:8.2::baseos"
] | null | 7.8 | null | null | null |
GHSA-j622-gh32-g6wm
|
Buffer overflow in the Mach-O input file loader in Hex-Rays IDA Pro 5.7 and 6.0 allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Macho-O file.
|
[] | null | null | null | null | null |
|
CVE-2014-2650
|
Unify OpenStage / OpenScape Desk Phone IP before V3 R3.11.0 SIP has an OS command injection vulnerability in the web based management interface
|
[
"cpe:2.3:o:atos:openstage_80_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_80_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_80_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_60_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_60_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_60_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_40_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_40_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_40_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_e_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20_e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_20_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_20_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_15_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_15_g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_15_g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openstage_5_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openstage_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_35g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_35g_eco_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*",
"cpe:2.3:o:atos:openscape_desk_phone_ip_55g_firmware:v3:r3.11.0:*:*:*:*:*:*",
"cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2021-38545
|
Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.
|
[
"cpe:2.3:o:raspberrypi:raspberry_pi_4_model_b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:raspberrypi:raspberry_pi_4_model_b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:raspberrypi:raspberry_pi_3_model_b\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:raspberrypi:raspberry_pi_3_model_b\\+:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 | null |
|
CVE-2020-10207
|
Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.
|
[
"cpe:2.3:o:amino:ak45x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak45x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak5xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak5xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak65x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria6xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria6xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria7xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria7xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:kami7b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:kami7b:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-47877
|
Extract has insufficient checks allowing attacker to create symlinks outside the extraction directory.
|
Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. This vulnerability is fixed in 4.0.0. If you're using the Extractor.FS interface, then upgrading to /v4 will require to implement the new methods that have been added.
|
[
"cpe:2.3:a:codeclysm:extract:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codeclysm:extract:*:*:*:*:*:go:*:*"
] | 6.9 | null | null | null | null |
GHSA-hfq3-j248-m7rx
|
The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
|
[] | null | null | null | null | null |
|
GHSA-4wm8-fjv7-j774
|
RubyGems Escape sequence injection in errors
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
|
[] | null | 7.5 | null | null | null |
CVE-2025-5828
|
Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability
|
Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.
|
[] | null | null | 6.8 | null | null |
GHSA-wwwg-6r7f-9c9h
|
Malicious Package in file-logging
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
|
[] | null | 9.8 | null | null | null |
CVE-2013-0670
|
CRLF injection vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
|
[
"cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-pwvw-rggj-f74r
|
An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL.
|
[] | null | 3.7 | null | null | null |
|
GHSA-wp6p-mq3v-vxf9
|
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
GHSA-3r8p-3x67-72v8
|
Unitronics Vision Series PLCs and HMIs use default administrative passwords. An unauthenticated attacker with network access to a PLC or HMI can take administrative control of the system.
|
[] | null | 9.8 | null | null | null |
|
CVE-2005-4719
|
Multiple SQL injection vulnerabilities in Sysbotz Systems Panel 1.0.6 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the cid parameter in knowledgebase/index.php, (2) the aid parameter in knowledgebase/view.php, (3) the cid parameter in contact/update.php, (4) the letter parameter in links/index.php, (5) the mid parameter in messageboard/view.php, and (6) the tid parameter in tickets/view.php.
|
[
"cpe:2.3:a:sysbotz:systems_panel:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2016-10258
|
Unrestricted file upload vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A malicious appliance administrator can upload arbitrary malicious files to the management console and trick another administrator user into downloading and executing malicious code.
|
[
"cpe:2.3:a:broadcom:advanced_secure_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 6 | null |
|
GHSA-8h2j-cgx8-6xv7
|
Cross-Site Request Forgery (CSRF) in FastAPI
|
ImpactFastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack.In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`).So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted.But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application.PatchesThis is fixed in FastAPI `0.65.2`.The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`.WorkaroundsIt's best to upgrade to the latest FastAPI.But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type.References[CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)[This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531)[OWASP CSRF](https://owasp.org/www-community/attacks/csrf)Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118)For more informationIf you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com)
|
[] | 8.8 | 8.2 | null | null | null |
CVE-2024-3308
|
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid widget's attributes in all versions up to, and including, 2.4.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2013:0757
|
Red Hat Security Advisory: java-1.7.0-oracle security update
|
OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified JavaFX buffer overflow leading to JVM compromise (CanSecWest 2013, JavaFX) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) JDK: unspecified vulnerability fixed in 7u21 (Deployment) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) JDK: unspecified vulnerability fixed in 7u21 (Install) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
GHSA-f9w6-p4q8-xh77
|
NovaTech Orion Substation Automation Platform OrionLX DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier and Orion5/Orion5r DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier allow physically proximate attackers to cause a denial of service (driver crash and process restart) via crafted input over a serial line.
|
[] | null | null | null | null | null |
|
CVE-2021-2062
|
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Web Server). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:business_intelligence_publisher:5.5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
] | null | 7.6 | null | null | null |
|
GHSA-c88g-cp9r-j36m
|
Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.
|
[] | null | null | null | null | null |
|
CVE-2009-3882
|
Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
|
[
"cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update9:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-4486
|
Meteor Slides < 1.5.7 - Contributor+ Stored XSS
|
The Meteor Slides WordPress plugin before 1.5.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
[
"cpe:2.3:a:meteor_slides_project:meteor_slides:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2023-7239
|
wp-dashboard-notes < 1.0.11 - Contributor+ Arbitrary Private Notes Update via IDOR
|
The WP Dashboard Notes WordPress plugin before 1.0.11 does not validate that the user has access to the post_id parameter in its wpdn_update_note AJAX action. This allows users with a role of contributor and above to update notes created by other users.
|
[] | null | 7.5 | null | null | null |
RHSA-2011:0143
|
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.3 - End Of Life
|
This is the End Of Life notification for Red Hat Enterprise Linux Extended
Update Support Add-On (EUS) 5.3.
|
[
"cpe:/o:redhat:rhel_eus:5.3"
] | null | null | null | null | null |
GHSA-97qf-jfmw-g24f
|
Cross-domain vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to change the location property of a frame via the String data type, and use a frame from a different domain to observe domain-independent events, as demonstrated by observing onkeydown events with caballero-listener. NOTE: according to Microsoft, this is a duplicate of CVE-2008-2947, possibly a different attack vector.
|
[] | null | null | null | null | null |
|
GHSA-r9vw-9gvx-7g72
|
Avahi 0.8 allows a local denial of service (NULL pointer dereference and daemon crash) against avahi-daemon via the D-Bus interface or a "ping .local" command.
|
[] | null | null | null | null | null |
|
CVE-2023-40635
|
In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
|
[
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2023-46550
|
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDelDevice.
|
[
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
RHSA-2020:1792
|
Red Hat Security Advisory: curl security update
|
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function curl: double free due to subsequent call of realloc() curl: heap buffer overflow in function tftp_receive_packet()
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7 | 6.3 | null | null |
GHSA-xr5q-pj6q-cgc5
|
Cross-site scripting (XSS) vulnerability in auth.php in Just For Fun Network Management System (JFFNMS) 0.8.3 allows remote attackers to inject arbitrary web script or HTML via the user parameter.
|
[] | null | null | null | null | null |
|
CVE-2024-10281
|
Tenda RX9/RX9 Pro SetStaticRouteCfg sub_42EEE0 stack-based overflow
|
A vulnerability classified as critical has been found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected is the function sub_42EEE0 of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:tenda:rx9:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
GHSA-j3j5-ggrm-j5h2
|
NeoModus Direct Connect 1.0 build 9, and possibly other versions, allows remote attackers to cause a denial of service (connection and possibly memory exhaustion) via a flood of ConnectToMe requests containing arbitrary IP addresses and ports.
|
[] | null | null | null | null | null |
|
GHSA-x4mf-ppgr-9fg2
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpjobportal WP Job Portal allows Blind SQL Injection. This issue affects WP Job Portal: from n/a through 2.3.2.
|
[] | null | 9.3 | null | null | null |
|
CVE-2016-7140
|
Multiple cross-site scripting (XSS) vulnerabilities in the ZMI page in Zope2 in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-mghj-97x2-4v8w
|
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.
|
[] | null | null | null | null | null |
|
GHSA-m5h8-m38m-3pw4
|
Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.
|
[] | null | null | 8.1 | null | null |
|
CVE-2024-1055
|
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's buttons in all versions up to, and including, 2.7.14 due to insufficient input sanitization and output escaping on user supplied URL values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-fwx5-5fqj-jv98
|
Cross-Site Scripting in morris.js
|
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.RecommendationA patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
|
[] | null | null | null | null | null |
CVE-2018-14806
|
Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker to execute arbitrary code.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2010-0117
|
RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows do not properly handle dimensions during YUV420 transformations, which might allow remote attackers to execute arbitrary code via crafted MP4 content.
|
[
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2003-0666
|
Buffer overflow in Microsoft Wordperfect Converter allows remote attackers to execute arbitrary code via modified data offset and data size parameters in a Corel WordPerfect file.
|
[
"cpe:2.3:a:microsoft:wordperfect_converter:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-83c5-hghm-jg6r
|
Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format
|
[] | null | 9.8 | null | null | null |
|
GHSA-gwgq-76m9-ffw6
|
An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.
|
[] | null | 7.5 | null | null | null |
|
GHSA-4jgr-5qw5-7m4m
|
Cross-site scripting (XSS) vulnerability in the ajaxswing webui in the Management Console server in the management server in Symantec Critical System Protection (SCSP) 5.2.9 through MP6 and Symantec Data Center Security: Server Advanced (SDCS:SA) 6.0.x through 6.0 MP1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-46193
|
SourceCodester Client Database Management System 1.0 is vulnerable to Remote code execution via Arbitrary file upload in user_proposal_update_order.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2014-8501
|
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
|
[
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2020-28119
|
Cross site scripting vulnerability in 53KF < 2.0.0.2 that allows for arbitrary code to be executed via crafted HTML statement inserted into chat window.
|
[
"cpe:2.3:a:53kf:53kf:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2024-55993
|
WordPress Job Board Manager plugin <= 2.1.60 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in PickPlugins Job Board Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Job Board Manager: from n/a through 2.1.60.
|
[] | null | 5.3 | null | null | null |
GHSA-5676-7chm-gxvm
|
An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2023:7712
|
Red Hat Security Advisory: tracker-miners security update
|
tracker-miners: sandbox escape
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null | null |
CVE-2024-20807
|
Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows local attacker to get sensitive information.
|
[
"cpe:2.3:a:samsung:email:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
|
GHSA-mcvw-344m-q7h7
|
Citrix EdgeSight 4.2 and 4.5 for Presentation Server, EdgeSight 4.2 and 4.5 for Endpoints, and EdgeSight for NetScaler 1.0 and 1.1 do not properly store database credentials in configuration files, which allows local users to obtain sensitive information.
|
[] | null | null | null | null | null |
|
GHSA-f7w3-5qrp-w366
|
SmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service.
|
[] | null | 9.8 | null | null | null |
|
CVE-2023-6253
|
Saved Uninstall Key in Digital Guardian Agent Uninstaller
|
A saved encryption key in the Uninstaller in Digital Guardian's Agent before version 7.9.4 allows a local attacker to retrieve the uninstall key and remove the software by extracting the uninstaller key from the memory of the uninstaller file.
|
[
"cpe:2.3:a:fortra:digital_guardian_agent:*:*:*:*:*:*:*:*"
] | null | 6 | null | null | null |
CVE-2023-0116
|
The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability.
|
[
"cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
GHSA-454q-7qq2-3pwv
|
IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001b3f3."
|
[] | null | null | 7.8 | null | null |
|
GHSA-wcwv-5qmw-xfpj
|
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a screensaver-locked session can be revealed. In some scenarios, the attacker can execute applications, such as by clicking with a mouse.
|
[] | null | null | 6.1 | null | null |
|
GHSA-qwfr-2j72-wc9f
|
vmx86.sys in VMware Workstation 10.0.1 build 1379776 and VMware Player 6.0.1 build 1379776 on Windows might allow local users to cause a denial of service (read access violation and system crash) via a crafted buffer in an IOCTL call. NOTE: the researcher reports "Vendor rated issue as non-exploitable."
|
[] | null | null | null | null | null |
|
GHSA-76w7-v877-3f6m
|
Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog.
|
[] | null | null | null | null | null |
|
RHSA-2010:0907
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: nfsd4: bug in read_buf
|
[
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null | null |
GHSA-q967-6vc6-rqr5
|
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
|
[] | null | 4.9 | null | null | null |
|
GHSA-6gx9-22p7-84wm
|
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) <math> tags or (2) Extension or <nowiki> sections that "bypass HTML style attribute restrictions" that are intended to protect against XSS vulnerabilities in Internet Explorer clients.
|
[] | null | null | null | null | null |
|
CVE-2024-10033
|
Aap-gateway: xss on aap-gateway
|
A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the "?next=" in a URL, which can lead to redirecting, injecting malicious script, stealing sessions and data.
|
[
"cpe:/a:redhat:ansible_automation_platform:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8",
"cpe:/a:redhat:ansible_automation_platform:2.5::el9",
"cpe:2.3:a:redhat:ansible_automation_platform:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_developer:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:ansible_inside:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
GHSA-hvp9-jp8f-v4wh
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.78, D6100 before 1.0.0.63, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DGN2200Bv4 before 1.0.0.109, DGN2200v4 before 1.0.0.110, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300 before 1.0.0.70, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, WNDR3400v3 before 1.0.1.24, WNR3500Lv2 before 1.2.0.62, and XR500 before 2.3.2.56.
|
[] | null | null | null | null | null |
|
CVE-2000-0585
|
ISC DHCP client program dhclient allows remote attackers to execute arbitrary commands via shell metacharacters.
|
[
"cpe:2.3:a:isc:dhcp_client:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp_client:3.0b1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-v6hw-hvgc-c65x
|
DVD X Player Standard 5.5.3.9 has a Buffer Overflow via a crafted .plf file, a related issue to CVE-2007-3068.
|
[] | null | null | 7.8 | null | null |
|
GHSA-qm74-8w86-q753
|
robdns commit d76d2e6 was discovered to contain a misaligned address at /src/zonefile-insertion.c.
|
[] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.