id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2023:1906
Red Hat Security Advisory: java-1.8.0-openjdk security update
OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: incorrect enqueue of references in garbage collector (8298191) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)
[ "cpe:/a:redhat:rhel_eus:8.6::appstream", "cpe:/a:redhat:rhel_eus:8.6::crb" ]
null
3.7
null
null
null
CVE-2020-7786
Command Injection
This affects all versions of package macfromip. The injection point is located in line 66 in macfromip.js.
[ "cpe:2.3:a:macfromip_project:macfromip:*:*:*:*:*:node.js:*:*" ]
null
9.8
null
null
null
CVE-2024-56583
sched/deadline: Fix warning in migrate_enable for boosted tasks
In the Linux kernel, the following vulnerability has been resolved: sched/deadline: Fix warning in migrate_enable for boosted tasks When running the following command: while true; do stress-ng --cyclic 30 --timeout 30s --minimize --quiet done a warning is eventually triggered: WARNING: CPU: 43 PID: 2848 at kernel/sched/deadline.c:794 setup_new_dl_entity+0x13e/0x180 ... Call Trace: <TASK> ? show_trace_log_lvl+0x1c4/0x2df ? enqueue_dl_entity+0x631/0x6e0 ? setup_new_dl_entity+0x13e/0x180 ? __warn+0x7e/0xd0 ? report_bug+0x11a/0x1a0 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x14/0x70 ? asm_exc_invalid_op+0x16/0x20 enqueue_dl_entity+0x631/0x6e0 enqueue_task_dl+0x7d/0x120 __do_set_cpus_allowed+0xe3/0x280 __set_cpus_allowed_ptr_locked+0x140/0x1d0 __set_cpus_allowed_ptr+0x54/0xa0 migrate_enable+0x7e/0x150 rt_spin_unlock+0x1c/0x90 group_send_sig_info+0xf7/0x1a0 ? kill_pid_info+0x1f/0x1d0 kill_pid_info+0x78/0x1d0 kill_proc_info+0x5b/0x110 __x64_sys_kill+0x93/0xc0 do_syscall_64+0x5c/0xf0 entry_SYSCALL_64_after_hwframe+0x6e/0x76 RIP: 0033:0x7f0dab31f92b This warning occurs because set_cpus_allowed dequeues and enqueues tasks with the ENQUEUE_RESTORE flag set. If the task is boosted, the warning is triggered. A boosted task already had its parameters set by rt_mutex_setprio, and a new call to setup_new_dl_entity is unnecessary, hence the WARN_ON call. Check if we are requeueing a boosted task and avoid calling setup_new_dl_entity if that's the case.
[]
null
null
null
null
null
CVE-2024-47146
Ruijie Reyee OS Resource Leak
Ruijie Reyee OS versions 2.206.x up to but not including 2.320.x could allow an attacker to obtain the devices serial number if physically adjacent and sniffing the RAW WIFI signal.
[ "cpe:2.3:o:ruijienetworks:reyee_os:*:*:*:*:*:*:*:*" ]
7.1
6.5
null
null
null
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
3.3
null
2.1
null
CVE-2021-23330
Command Injection
All versions of package launchpad are vulnerable to Command Injection via stop.
[ "cpe:2.3:a:bitovi:launchpad:0.1.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.2.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.2.1:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.3.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.1:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.2:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.3:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.4:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.5:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.6:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.7:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.8:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.4.9:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.5.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.5.1:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.5.2:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.5.3:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.5.4:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.6.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.0:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.1:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.2:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.3:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.4:*:*:*:*:node.js:*:*", "cpe:2.3:a:bitovi:launchpad:0.7.5:*:*:*:*:node.js:*:*" ]
null
9.8
null
null
null
GHSA-4r6g-xhx7-fm36
Contao Core directory traversal vulnerability
Directory traversal vulnerability in Contao before 3.2.19, and 3.4.x before 3.4.4 allows remote authenticated backend users to view files outside their file mounts or the document root via unspecified vectors.
[]
null
null
4.3
null
null
CVE-2016-7431
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
[ "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*" ]
null
null
5.3
5
null
RHSA-2023:0113
Red Hat Security Advisory: postgresql:10 security update
postgresql: Extension scripts replace objects not belonging to the extension.
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.1
null
null
null
CVE-2005-3904
Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
[ "cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-34695
WOWS Karma vulnerable to a post submission bounce/timing attack
WOWS Karma is a reputation system for Wargaming's World of Warships. A user is able to click multiple times on "create" on a post creation prompt before the modal closes, which triggers sending several post creation API requests at once. Due to timing, sending multiple posts simultaneously requests bypasses the cooldown validation, however are not refreshing a user's metrics more than once, due to concurrent karma updates. This issue is fixed in 0.17.4.1.
[]
null
6.3
null
null
null
CVE-2024-53045
ASoC: dapm: fix bounds checker error in dapm_widget_list_create
In the Linux kernel, the following vulnerability has been resolved: ASoC: dapm: fix bounds checker error in dapm_widget_list_create The widgets array in the snd_soc_dapm_widget_list has a __counted_by attribute attached to it, which points to the num_widgets variable. This attribute is used in bounds checking, and if it is not set before the array is filled, then the bounds sanitizer will issue a warning or a kernel panic if CONFIG_UBSAN_TRAP is set. This patch sets the size of the widgets list calculated with list_for_each as the initial value for num_widgets as it is used for allocating memory for the array. It is updated with the actual number of added elements after the array is filled.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-56fh-6xpm-28x9
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the user/update_profile.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
null
9.8
null
null
null
GHSA-hmvw-rwmj-gphw
Uncontrolled Search Path Element vulnerability in OpenText Secure Content Manager on Windows allows DLL Side-Loading.This issue affects Secure Content Manager: 23.4.End-users can potentially exploit the vulnerability to execute malicious code in the trusted context of the thick-client application.
[]
7
null
null
null
null
GHSA-2wjp-9ppx-q29x
A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /pages/payment_add.php. The manipulation of the argument cid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.5
7.3
null
null
null
GHSA-ggmv-6q9p-9gm6
Cross-site Scripting in django-unicorn
The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.
[]
5.3
6.1
null
null
null
CVE-2022-3338
XXE in Trellix ePO server
An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API.
[ "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-qw6q-fffq-cj36
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
[]
null
9.8
null
null
null
CVE-2023-46545
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWsc.
[ "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-42742
In TOTOLINK X5000r v9.1.0cu.2350_b20230313, the file /cgi-bin/cstecgi.cgi contains an OS command injection vulnerability in setUrlFilterRules. Authenticated Attackers can send malicious packet to execute arbitrary commands.
[ "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-9qq8-mmh8-945v
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘opmode’ parameter of the setWiFiApConfig interface of the cstecgi .cgi.
[]
null
9.8
null
null
null
CVE-2005-4789
resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, does not properly enforce class-specific exclude rules in some situations, which allows local users to bypass intended access restrictions for USB devices that set their class ID at the interface level.
[ "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-63w7-j324-fm92
Multiple heap-based buffer overflows in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption.
[]
null
null
null
null
null
CVE-2024-28134
PHOENIX CONTACT: MitM attack gains privileges of the current logged in user in CHARX Series
An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected. 
[ "cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*", "cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*" ]
null
7
null
null
null
GHSA-7q9x-mv26-g233
Open redirect vulnerability in the web interface in Cisco Secure Access Control System (ACS) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an unspecified parameter, aka Bug ID CSCuq74150.
[]
null
null
null
null
null
RHSA-2024:7461
Red Hat Security Advisory: cups-filters security update
cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes cups: libppd: remote command injection via attacker controlled data in PPD file cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source cups-browsed: cups-filters: cups-browsed vulnerable to DDoS amplification attack
[ "cpe:/a:redhat:rhel_aus:8.2::appstream" ]
null
7.5
null
null
null
CVE-2006-7004
Cross-site scripting (XSS) vulnerability in email_request.php in PSY Auction allows remote attackers to inject arbitrary web script or HTML via the user_id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:php_script_tools:psy_auction:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2023-44839
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:dlink:dir-823g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-823g:a1:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2007-2768
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
[ "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-fr3q-v98q-fwq5
In the Linux kernel, the following vulnerability has been resolved:drm/sched: fix null-ptr-deref in init entityThe bug can be triggered by sending an amdgpu_cs_wait_ioctl to the AMDGPU DRM driver on any ASICs with valid context. The bug was reported by Joonkyo Jung <joonkyoj@yonsei.ac.kr>. For example the following code:The ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that the error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa modified the logic and allowed to have sched_rq equal to NULL.As a result when there is no job the ioctl AMDGPU_WAIT_CS returns success. The change fixes null-ptr-deref in init entity and the stack below demonstrates the error condition:[ +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028 [ +0.007086] #PF: supervisor read access in kernel mode [ +0.005234] #PF: error_code(0x0000) - not-present page [ +0.005232] PGD 0 P4D 0 [ +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI [ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G B W L 6.7.0+ #4 [ +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c [ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282 [ +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa [ +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0 [ +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c [ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010 [ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000 [ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000 [ +0.008236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0 [ +0.007175] Call Trace: [ +0.002561] <TASK> [ +0.002141] ? show_regs+0x6a/0x80 [ +0.003473] ? __die+0x25/0x70 [ +0.003124] ? page_fault_oops+0x214/0x720 [ +0.004179] ? preempt_count_sub+0x18/0xc0 [ +0.004093] ? __pfx_page_fault_oops+0x10/0x10 [ +0.004590] ? srso_return_thunk+0x5/0x5f [ +0.004000] ? vprintk_default+0x1d/0x30 [ +0.004063] ? srso_return_thunk+0x5/0x5f [ +0.004087] ? vprintk+0x5c/0x90 [ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.005807] ? srso_return_thunk+0x5/0x5f [ +0.004090] ? _printk+0xb3/0xe0 [ +0.003293] ? __pfx__printk+0x10/0x10 [ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ +0.005482] ? do_user_addr_fault+0x345/0x770 [ +0.004361] ? exc_page_fault+0x64/0xf0 [ +0.003972] ? asm_exc_page_fault+0x27/0x30 [ +0.004271] ? add_taint+0x2a/0xa0 [ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu] [ +0.009530] ? finish_task_switch.isra.0+0x129/0x470 [ +0.005068] ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu] [ +0.010063] ? __kasan_check_write+0x14/0x20 [ +0.004356] ? srso_return_thunk+0x5/0x5f [ +0.004001] ? mutex_unlock+0x81/0xd0 [ +0.003802] ? srso_return_thunk+0x5/0x5f [ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu] [ +0.009355] ? __pfx_ ---truncated---
[]
null
5.5
null
null
null
CVE-2014-3798
The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier allows remote attackers to cause a denial of service (guest OS crash) via a crafted Ethernet frame.
[ "cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*" ]
null
null
6.5
6.1
null
RHSA-2023:1109
Red Hat Security Advisory: kernel security and bug fix update
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_aus:8.2::baseos", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "cpe:/o:redhat:rhel_tus:8.2::baseos" ]
null
7.8
null
null
null
GHSA-j622-gh32-g6wm
Buffer overflow in the Mach-O input file loader in Hex-Rays IDA Pro 5.7 and 6.0 allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Macho-O file.
[]
null
null
null
null
null
CVE-2014-2650
Unify OpenStage / OpenScape Desk Phone IP before V3 R3.11.0 SIP has an OS command injection vulnerability in the web based management interface
[ "cpe:2.3:o:atos:openstage_80_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_80:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_80_g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_80_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_60_g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_60_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_60_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_60:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_40_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_40:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_40_g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_40_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_20_e_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_20_e:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_20_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_20:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_20_g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_20_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_15_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_15:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_15_g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_15_g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openstage_5_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openstage_5:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openscape_desk_phone_ip_35g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openscape_desk_phone_ip_35g:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openscape_desk_phone_ip_35g_eco_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openscape_desk_phone_ip_35g_eco:-:*:*:*:*:*:*:*", "cpe:2.3:o:atos:openscape_desk_phone_ip_55g_firmware:v3:r3.11.0:*:*:*:*:*:*", "cpe:2.3:h:atos:openscape_desk_phone_ip_55g:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2021-38545
Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.
[ "cpe:2.3:o:raspberrypi:raspberry_pi_4_model_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:raspberrypi:raspberry_pi_4_model_b:-:*:*:*:*:*:*:*", "cpe:2.3:o:raspberrypi:raspberry_pi_3_model_b\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:raspberrypi:raspberry_pi_3_model_b\\+:-:*:*:*:*:*:*:*" ]
null
5.9
null
4.3
null
CVE-2020-10207
Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.
[ "cpe:2.3:o:amino:ak45x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak45x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:ak5xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak5xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:ak65x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:ak65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:aria6xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:aria6xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:aria7xx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:aria7xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amino:kami7b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amino:kami7b:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-47877
Extract has insufficient checks allowing attacker to create symlinks outside the extraction directory.
Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. This vulnerability is fixed in 4.0.0. If you're using the Extractor.FS interface, then upgrading to /v4 will require to implement the new methods that have been added.
[ "cpe:2.3:a:codeclysm:extract:*:*:*:*:*:*:*:*", "cpe:2.3:a:codeclysm:extract:*:*:*:*:*:go:*:*" ]
6.9
null
null
null
null
GHSA-hfq3-j248-m7rx
The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors
[]
null
null
null
null
null
GHSA-4wm8-fjv7-j774
RubyGems Escape sequence injection in errors
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
[]
null
7.5
null
null
null
CVE-2025-5828
Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability
Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.
[]
null
null
6.8
null
null
GHSA-wwwg-6r7f-9c9h
Malicious Package in file-logging
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.RecommendationRemove the package from your environment. There are no indications of further compromise.
[]
null
9.8
null
null
null
CVE-2013-0670
CRLF injection vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
[ "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-pwvw-rggj-f74r
An issue was discovered in GitLab CE/EE affecting all versions before 17.6.0 in which users were unaware that files uploaded to comments on confidential issues and epics of public projects could be accessed without authentication via a direct link to the uploaded file URL.
[]
null
3.7
null
null
null
GHSA-wp6p-mq3v-vxf9
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
null
GHSA-3r8p-3x67-72v8
Unitronics Vision Series PLCs and HMIs use default administrative passwords. An unauthenticated attacker with network access to a PLC or HMI can take administrative control of the system.
[]
null
9.8
null
null
null
CVE-2005-4719
Multiple SQL injection vulnerabilities in Sysbotz Systems Panel 1.0.6 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the cid parameter in knowledgebase/index.php, (2) the aid parameter in knowledgebase/view.php, (3) the cid parameter in contact/update.php, (4) the letter parameter in links/index.php, (5) the mid parameter in messageboard/view.php, and (6) the tid parameter in tickets/view.php.
[ "cpe:2.3:a:sysbotz:systems_panel:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2016-10258
Unrestricted file upload vulnerability in the Symantec Advanced Secure Gateway (ASG) and ProxySG management consoles. A malicious appliance administrator can upload arbitrary malicious files to the management console and trick another administrator user into downloading and executing malicious code.
[ "cpe:2.3:a:broadcom:advanced_secure_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:*" ]
null
null
6.8
6
null
GHSA-8h2j-cgx8-6xv7
Cross-Site Request Forgery (CSRF) in FastAPI
ImpactFastAPI versions lower than `0.65.2` that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack.In versions lower than `0.65.2`, FastAPI would try to read the request payload as JSON even if the `content-type` header sent was not set to `application/json` or a compatible JSON media type (e.g. `application/geo+json`).So, a request with a content type of `text/plain` containing JSON data would be accepted and the JSON data would be extracted.But requests with content type `text/plain` are exempt from [CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) preflights, for being considered [Simple requests](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests). So, the browser would execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application.PatchesThis is fixed in FastAPI `0.65.2`.The request data is now parsed as JSON only if the `content-type` header is `application/json` or another JSON compatible media type like `application/geo+json`.WorkaroundsIt's best to upgrade to the latest FastAPI.But still, it would be possible to add a middleware or a dependency that checks the `content-type` header and aborts the request if it is not `application/json` or another JSON compatible content type.References[CORS on Mozilla web docs](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)[This answer on StackExchange](https://security.stackexchange.com/questions/157528/ways-to-bypass-browsers-cors-policy/157531#157531)[OWASP CSRF](https://owasp.org/www-community/attacks/csrf)Fixed in PR [#2118](https://github.com/tiangolo/fastapi/pull/2118)For more informationIf you have any questions or comments, write to [security@tiangolo.com](mailto:security@tiangolo.com)
[]
8.8
8.2
null
null
null
CVE-2024-3308
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Grid widget's attributes in all versions up to, and including, 2.4.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
RHSA-2013:0757
Red Hat Security Advisory: java-1.7.0-oracle security update
OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified JavaFX buffer overflow leading to JVM compromise (CanSecWest 2013, JavaFX) OpenJDK: JDBC driver manager improper toString calls (CanSecWest 2013, Libraries, 8009814) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: JAXP missing security restrictions (JAXP, 6657673) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) OpenJDK: java.beans.ThreadGroupContext missing restrictions (Beans, 7200507) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: temporary files created with insecure permissions (JAX-WS, 8003542) JDK: unspecified vulnerability fixed in 7u21 (Deployment) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: Hotspot MethodHandle lookup error (Hotspot, 8009699) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: incorrect setter access checks in MethodHandles (Hostspot, 8009677) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) JDK: unspecified vulnerability fixed in 7u21 (Install) OpenJDK: ConcurrentHashMap incorrectly calls defaultReadObject() method (Libraries, 8009063) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) OpenJDK: Hotspot intrinsic frames vulnerability (Hotspot, 8004336) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: Wrapper.convert insufficient type checks (Libraries, 8009049) JDK: multiple unspecified JavaFX vulnerabilities fixed in 7u21 (JavaFX) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
GHSA-f9w6-p4q8-xh77
NovaTech Orion Substation Automation Platform OrionLX DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier and Orion5/Orion5r DNP Master 1.27.38 and DNP Slave 1.23.10 and earlier allow physically proximate attackers to cause a denial of service (driver crash and process restart) via crafted input over a serial line.
[]
null
null
null
null
null
CVE-2021-2062
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: Web Server). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data as well as unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:business_intelligence_publisher:5.5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_intelligence_publisher:11.1.1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:business_intelligence_publisher:12.2.1.4.0:*:*:*:*:*:*:*" ]
null
7.6
null
null
null
GHSA-c88g-cp9r-j36m
Patrick Michaelis Wili-CMS allows remote attackers to obtain sensitive information via a direct request for (1) thumbnail.php, (2) functions/admin/all.php, (3) functions/admin/init_session.php, (4) functions/all.php, and (5) certain files in example-view/admin_templates/, which reveals the path in various error messages.
[]
null
null
null
null
null
CVE-2009-3882
Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
[ "cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:*:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update9:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-4486
Meteor Slides < 1.5.7 - Contributor+ Stored XSS
The Meteor Slides WordPress plugin before 1.5.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[ "cpe:2.3:a:meteor_slides_project:meteor_slides:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2023-7239
wp-dashboard-notes < 1.0.11 - Contributor+ Arbitrary Private Notes Update via IDOR
The WP Dashboard Notes WordPress plugin before 1.0.11 does not validate that the user has access to the post_id parameter in its wpdn_update_note AJAX action. This allows users with a role of contributor and above to update notes created by other users.
[]
null
7.5
null
null
null
RHSA-2011:0143
Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.3 - End Of Life
This is the End Of Life notification for Red Hat Enterprise Linux Extended Update Support Add-On (EUS) 5.3.
[ "cpe:/o:redhat:rhel_eus:5.3" ]
null
null
null
null
null
GHSA-97qf-jfmw-g24f
Cross-domain vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to change the location property of a frame via the String data type, and use a frame from a different domain to observe domain-independent events, as demonstrated by observing onkeydown events with caballero-listener. NOTE: according to Microsoft, this is a duplicate of CVE-2008-2947, possibly a different attack vector.
[]
null
null
null
null
null
GHSA-r9vw-9gvx-7g72
Avahi 0.8 allows a local denial of service (NULL pointer dereference and daemon crash) against avahi-daemon via the D-Bus interface or a "ping .local" command.
[]
null
null
null
null
null
CVE-2023-40635
In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
[ "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2023-46550
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDelDevice.
[ "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2020:1792
Red Hat Security Advisory: curl security update
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function curl: double free due to subsequent call of realloc() curl: heap buffer overflow in function tftp_receive_packet()
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7
6.3
null
null
GHSA-xr5q-pj6q-cgc5
Cross-site scripting (XSS) vulnerability in auth.php in Just For Fun Network Management System (JFFNMS) 0.8.3 allows remote attackers to inject arbitrary web script or HTML via the user parameter.
[]
null
null
null
null
null
CVE-2024-10281
Tenda RX9/RX9 Pro SetStaticRouteCfg sub_42EEE0 stack-based overflow
A vulnerability classified as critical has been found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected is the function sub_42EEE0 of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:tenda:rx9:*:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.20:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
GHSA-j3j5-ggrm-j5h2
NeoModus Direct Connect 1.0 build 9, and possibly other versions, allows remote attackers to cause a denial of service (connection and possibly memory exhaustion) via a flood of ConnectToMe requests containing arbitrary IP addresses and ports.
[]
null
null
null
null
null
GHSA-x4mf-ppgr-9fg2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpjobportal WP Job Portal allows Blind SQL Injection. This issue affects WP Job Portal: from n/a through 2.3.2.
[]
null
9.3
null
null
null
CVE-2016-7140
Multiple cross-site scripting (XSS) vulnerabilities in the ZMI page in Zope2 in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-mghj-97x2-4v8w
A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.
[]
null
null
null
null
null
GHSA-m5h8-m38m-3pw4
Improper neutralization of CRLF sequences in HTTP headers vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote unauthenticated attacker to obtain sensitive information via the server HTTP response spoofing.
[]
null
null
8.1
null
null
CVE-2024-1055
The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's buttons in all versions up to, and including, 2.7.14 due to insufficient input sanitization and output escaping on user supplied URL values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-fwx5-5fqj-jv98
Cross-Site Scripting in morris.js
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.RecommendationA patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
[]
null
null
null
null
null
CVE-2018-14806
Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker to execute arbitrary code.
[ "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2010-0117
RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows do not properly handle dimensions during YUV420 transformations, which might allow remote attackers to execute arbitrary code via crafted MP4 content.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
CVE-2003-0666
Buffer overflow in Microsoft Wordperfect Converter allows remote attackers to execute arbitrary code via modified data offset and data size parameters in a Corel WordPerfect file.
[ "cpe:2.3:a:microsoft:wordperfect_converter:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-83c5-hghm-jg6r
Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format
[]
null
9.8
null
null
null
GHSA-gwgq-76m9-ffw6
An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.
[]
null
7.5
null
null
null
GHSA-4jgr-5qw5-7m4m
Cross-site scripting (XSS) vulnerability in the ajaxswing webui in the Management Console server in the management server in Symantec Critical System Protection (SCSP) 5.2.9 through MP6 and Symantec Data Center Security: Server Advanced (SDCS:SA) 6.0.x through 6.0 MP1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
null
CVE-2025-46193
SourceCodester Client Database Management System 1.0 is vulnerable to Remote code execution via Arbitrary file upload in user_proposal_update_order.php.
[]
null
9.8
null
null
null
CVE-2014-8501
The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
[ "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2020-28119
Cross site scripting vulnerability in 53KF < 2.0.0.2 that allows for arbitrary code to be executed via crafted HTML statement inserted into chat window.
[ "cpe:2.3:a:53kf:53kf:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2024-55993
WordPress Job Board Manager plugin <= 2.1.60 - Broken Access Control vulnerability
Missing Authorization vulnerability in PickPlugins Job Board Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Job Board Manager: from n/a through 2.1.60.
[]
null
5.3
null
null
null
GHSA-5676-7chm-gxvm
An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.
[]
null
7.8
null
null
null
RHSA-2023:7712
Red Hat Security Advisory: tracker-miners security update
tracker-miners: sandbox escape
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
null
CVE-2024-20807
Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows local attacker to get sensitive information.
[ "cpe:2.3:a:samsung:email:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
GHSA-mcvw-344m-q7h7
Citrix EdgeSight 4.2 and 4.5 for Presentation Server, EdgeSight 4.2 and 4.5 for Endpoints, and EdgeSight for NetScaler 1.0 and 1.1 do not properly store database credentials in configuration files, which allows local users to obtain sensitive information.
[]
null
null
null
null
null
GHSA-f7w3-5qrp-w366
SmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service.
[]
null
9.8
null
null
null
CVE-2023-6253
Saved Uninstall Key in Digital Guardian Agent Uninstaller
A saved encryption key in the Uninstaller in Digital Guardian's Agent before version 7.9.4 allows a local attacker to retrieve the uninstall key and remove the software by extracting the uninstaller key from the memory of the uninstaller file.
[ "cpe:2.3:a:fortra:digital_guardian_agent:*:*:*:*:*:*:*:*" ]
null
6
null
null
null
CVE-2023-0116
The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability.
[ "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-454q-7qq2-3pwv
IrfanView 4.50 - 64bit with BabaCAD4Image plugin version 1.3 allows attackers to execute arbitrary code or cause a denial of service via a crafted .dwg file, related to a "User Mode Write AV near NULL starting at BabaCAD4Image!ShowPlugInOptions+0x000000000001b3f3."
[]
null
null
7.8
null
null
GHSA-wcwv-5qmw-xfpj
mate-screensaver before 1.20.2 in MATE Desktop Environment allows physically proximate attackers to view screen content and possibly control applications. By unplugging and re-plugging or power-cycling external output devices (such as additionally attached graphical outputs via HDMI, VGA, DVI, etc.) the content of a screensaver-locked session can be revealed. In some scenarios, the attacker can execute applications, such as by clicking with a mouse.
[]
null
null
6.1
null
null
GHSA-qwfr-2j72-wc9f
vmx86.sys in VMware Workstation 10.0.1 build 1379776 and VMware Player 6.0.1 build 1379776 on Windows might allow local users to cause a denial of service (read access violation and system crash) via a crafted buffer in an IOCTL call. NOTE: the researcher reports "Vendor rated issue as non-exploitable."
[]
null
null
null
null
null
GHSA-76w7-v877-3f6m
Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog.
[]
null
null
null
null
null
RHSA-2010:0907
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd4: bug in read_buf
[ "cpe:/o:redhat:rhel_eus:5.4" ]
null
null
null
null
null
GHSA-q967-6vc6-rqr5
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
[]
null
4.9
null
null
null
GHSA-6gx9-22p7-84wm
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) <math> tags or (2) Extension or <nowiki> sections that "bypass HTML style attribute restrictions" that are intended to protect against XSS vulnerabilities in Internet Explorer clients.
[]
null
null
null
null
null
CVE-2024-10033
Aap-gateway: xss on aap-gateway
A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the "?next=" in a URL, which can lead to redirecting, injecting malicious script, stealing sessions and data.
[ "cpe:/a:redhat:ansible_automation_platform:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8", "cpe:/a:redhat:ansible_automation_platform:2.5::el9", "cpe:2.3:a:redhat:ansible_automation_platform:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_developer:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_inside:1.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-hvp9-jp8f-v4wh
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.78, D6100 before 1.0.0.63, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DGN2200Bv4 before 1.0.0.109, DGN2200v4 before 1.0.0.110, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300 before 1.0.0.70, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, WNDR3400v3 before 1.0.1.24, WNR3500Lv2 before 1.2.0.62, and XR500 before 2.3.2.56.
[]
null
null
null
null
null
CVE-2000-0585
ISC DHCP client program dhclient allows remote attackers to execute arbitrary commands via shell metacharacters.
[ "cpe:2.3:a:isc:dhcp_client:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp_client:3.0b1:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-v6hw-hvgc-c65x
DVD X Player Standard 5.5.3.9 has a Buffer Overflow via a crafted .plf file, a related issue to CVE-2007-3068.
[]
null
null
7.8
null
null
GHSA-qm74-8w86-q753
robdns commit d76d2e6 was discovered to contain a misaligned address at /src/zonefile-insertion.c.
[]
null
7.5
null
null
null